It's me again, I've set my router up as WPA TKIP. I have followed Xploitz (wonderful) walkthrough video at hxxp://forums.remote-exploit.org/showthread.php?t=8230&page=33

So far it's been easy to follow, and I'm pretty sure I understand it, but I am stuck at the handshake. Here's what I've got so far..

I have started the airodump in a shell, according to one of the first steps in the video. Next I try this in a second shell:
Code:
aireplay-ng -0 1 -a (Target AP's mac) -c (my faked mac, did it with mac changer) wlan0
It has 2 lines after that..
Waiting for beacon frame (BSSID: AP mac here) on channel 11
Sending 64 directed DeAuth. STMAC: [Faked mac] [ 0|11 ACKs]

So after that I look back in the first shell.. No handshake. I've tried it like, 30 times, and no luck. I've also used this tutorial: hxxp://xxx.macpirate.ch/uploads/Cellys_WPA2_Hack_EN.pdf
It's practially the same, with the same results. Help? I'm going to bed btw, so goodnight, I'll check this tomorrow.