An attack against Windows WEP where the attacker exploits windows’ wireless stack to obtain WEP key from remote clients.

  • Send flood of encrypted ARP requests to take advantage of shared key auth and message modification flaws
  • Uses ARP responses to recover WEP key