I know this post is now a month old so the OP may have found the answers elsewhere, but I figured I would reply with some help anyway. Also note that while I am not completely new to Backtrack, Linux, and security, I'm still learning.
One big thing I want to bring up before I start is that there is a ton of information on using ipw2200 cards with the aircrack suite, so if you haven't already done so, try Google.
1. When you post, try to clarify things as much as possible. For instance, when you say:
I'm not sure if "fake mac" means your own spoofed MAC address, or the MAC address of an authed client on your network/network you have permission to audit. If "fake mac" refers to your own MAC address, then you are running the deauth against yourself.
aireplay-ng -0 10 -a 001CDF402A01 (BSSID of target) -c 000102030405 (fake mac) eth1
2. Check the command for your ARP replay attack. Normally this would be alright, but since you're using the ipw2200 you'll need to go about it differently:
The -b switch right, but you want to make sure the MAC address specified in -h is that of a client that is already associated with the targeted access point. Since you've got an ipw2200 card you cannot actively monitor and inject at the same time, so we use the -i switch to monitor on the rtap0 interface. I noticed you haven't mentioned rtap0 at all yet, and this is essential to speedy WEP cracking using an ipw2200, so if you don't know about it, find out what it is, what it does, and how to use it to make your life easier.
aireplay-ng -3 -b <TARGET_AP> -h <ASSOCIATED_MAC> -i rtap0 eth1
3. When you're running airodump-ng you have to tailor your syntax to the ipw2200 workarounds. Again, research the rtap0 interface.
It would be best to do some research on the ipw2200 because there are a lot of limitations to it. That's not to say it's useless hardware, but the more you know, the less trouble you'll have solving these problems.
- I didn't mention it above, but ipw2200 doesn't allow for injection of management frames, so the deauth attack will not work.
- Check aircrack-ng's site for documentation on the techniques that are used, as well as for ipw2200 specific information.
- Remember that Google is your best friend.