Hello again,
In the article you are providing it is described how to decrypt messages, modify messages, inject messages, spoof messages, spoof authentication but no description whatsoever on how to obtain the key. Perhaps what I am missing is how to retrieve the key once you have obtained the WEP cyphertext:
RC4(K || IV)
First of all I think I am missing something important which probably is the key of it. In every WEP documentation it is explained that the Cypherstream is calculated:
RC4(k||IV). Where || is the concatenation operator.
But RC4 is a function which takes as arguments a plaintext and a key. RC4(M,k). So hoy is it done exactly? RC4(k||IV, k)?
In this case obtaining the cyphertex RC4(k||IV, k) will be impossible to obtain the key from it! I am a bit lost with this! Thanks so much! Carlos