An attack against Windows WEP where the attacker exploits windowsâ wireless stack to obtain WEP key from remote clients. Send flood of encrypted ARP requests to take advantage of shared key auth and message modification flaws Uses ARP responses to recover WEP key