See this section above, it makes you look like a script kiddie.
No actually, I am not trying to steal the neighbors wifi. I know that through my experience, not only as working for one of the biggest DSL providers in the country, but from my IN THE WILD testing, that phone numbers are the password in about 75+% of what I have tested (here in Los Angeles at least)...
Every one and their dog knows that wep is broken. As such one should follow industry best practices and use something like wpa2 etc.
I was just wondering if there were anyone or anyway of using predictive key cracking methods while going at WEP? This would be easy to cat a dictionary file to prefix the first 3 digits of all words in the dictionary file for running an attack against WPA. But I am not talking about throwing a dictionary at WEP. Was think along the lines of the creation of new ideas and methods of how the code can be broken.
WEP has been cracked in under 5 minutes. What more could be asked for.
Thinking that if aircrack knew 3 of the 10 digits to to crack it might take a third of the time off of the cracking.. I am sure that if not now, that soon something can take advantage of predictive key cracking in this fashion.