1. you can use airodump-ng as the sniffer. You can use airdecap-ng to unpack captured packets (for example, airdecap-ng-W wepkey file. and then use Wireshark to open the captured content ., autorization is a base64-encoded router user name and password, or you can use the WEP decryption function provided by Wireshark. however, if Cain is used for decryption, the obtained data packets cannot be well identified.
2. Just like Zhao Ge's analysis on WPA incorrect password login (second figure)
3. if you want to get the AP password by running the dictionary without a client, note that if the other party uses 10 hexadecimal numbers instead of ASCII characters as the password, the command option must be prefixed with "H:" Before the dictionary file. The dictionary format is XX: XX, of course, you can also use the hexadecimal editor to create a dictionary, so you don't need to add the "h:" command item, but it is troublesome to create a dictionary, such as the second figure.
Updated 2010.8.8