ehsan 08
aircrack 2.1 - <C> 2004 Christophe Devine
usage: aircrack <pcap filename<s>>
5 : debug - specify beginning of the key 4 : bruteforce fudge factor <current: 4> 3 : packet MAC f ilter: 00:16:B6:32:D5:E0 2 : WEP key length in bits, carrent: 64 1 : read IUs fron a specified pcap file 0 : start cracking <with 159205 WEP IUs>
so now it should look like this. Notę you can't tell if the wireless point is a 124 or 64 so you just have to try, and you can run mutiples of aircrack at the same time but don't run multiples of ariodump