Unless you’re a computer security and networking ninja, chances are you don’t have all the tools on hand to get this job done. Here’s what you’ll need:
First run the following to get a list of your network interfaces:
Now, run the following four commands. See the output that I got for them in the screenshot below.

If you don’t get the same results from these commands as pictured here, most likely your network adapter won’t work with this particular crack. If you do, you’ve successfully “faked” a new MAC address on your network interface, 00:11:22:33:44:55.
Now it’s time to pick your network. Run:

Like I said, hit Ctrl+C to stop this listing. (I had to do this once or twice to find the network I was looking for.) Once you’ve got it, highlight the BSSID and copy it to your clipboard for reuse in the upcoming commands.
Now we’re going to watch what’s going on with that network you chose and capture that information to a file. Run:

You’ll get output like what’s in the window in the background pictured below. Leave that one be. Open a new Konsole window in the foreground, and enter this command:

You’re almost there. Now it’s time for:
Depending on the power of your network (mine is inexplicably low at -32 in that screenshot, even though the

Once you’ve collected enough data, it’s the moment of truth. Launch a third Konsole window and run the following to crack that data you’ve collected:
If you didn’t get enough data, aircrack will fail and tell you to try again with more. If it succeeds, it will look like this:

The WEP key appears next to “KEY FOUND.” Drop the colons and enter it to log onto the network.
Hope you found this article useful enough. Do write to us if you have any more inquiry regarding this topic. We are always there to help you out.
source: http://tech.gaeatimes.com/index.php/archive/how-to-crack-a-wi-fi-networks-wep-password-with-backtrack/
- A compatible wireless adapter :This is the biggest requirement. You’ll need a wireless adapter that’s capable of packet injection, and chances are the one in your computer is not.
- A BackTrack 3 Live CD : We already took you on a full screenshot tour of how to install and use BackTrack 3, the Linux Live CD that lets you do all sorts of security testing and tasks. Download yourself a copy of the CD and burn it, or load it up in VMware to get started. (I tried the BackTrack 4 pre-release, and it didn’t work as well as BT3. Do yourself a favor and stick with BackTrack 3 for now.)
- A nearby WEP-enabled Wi-Fi network : The signal should be strong and ideally people are using it, connecting and disconnecting their devices from it. The more use it gets while you collect the data you need to run your crack, the better your chances of success.
- Patience with the command line: This is an ten-step process that requires typing in long, arcane commands and waiting around for your Wi-Fi card to collect data in order to crack the password. Like the doctor said to the short person, be a little patient.
Crack That WEP
To crack WEP, you’ll need to launch Konsole, BackTrack’s built-in command line. It’s right there on the taskbar in the lower left corner, second button to the right. Now, the commands.First run the following to get a list of your network interfaces:
airmon-ngra0. Yours may be different; take note of the label and write it down. From here on in, substitute it in everywhere a command includes (interface).Now, run the following four commands. See the output that I got for them in the screenshot below.
airmon-ng stop (interface)
ifconfig (interface) down
macchanger --mac 00:11:22:33:44:55 (interface)
airmon-ng start (interface)If you don’t get the same results from these commands as pictured here, most likely your network adapter won’t work with this particular crack. If you do, you’ve successfully “faked” a new MAC address on your network interface, 00:11:22:33:44:55.
Now it’s time to pick your network. Run:
airodump-ng (interface)Like I said, hit Ctrl+C to stop this listing. (I had to do this once or twice to find the network I was looking for.) Once you’ve got it, highlight the BSSID and copy it to your clipboard for reuse in the upcoming commands.
Now we’re going to watch what’s going on with that network you chose and capture that information to a file. Run:
airodump-ng -c (channel) -w (file name) --bssid (bssid)  (interface)You’ll get output like what’s in the window in the background pictured below. Leave that one be. Open a new Konsole window in the foreground, and enter this command:
aireplay-ng -1 0 -a (bssid) -h 00:11:22:33:44:55 -e (essid)  (interface)yoyo.  What you want to get after this command is the reassuring “Association  successful” message with that smiley face.You’re almost there. Now it’s time for:
aireplay-ng -3 -b (bssid) -h 00:11:22:33:44:55 (interface)yoyo network on a separate computer while this was going on.) Here’s the part where you might have to grab yourself a cup of coffee or take a walk. Basically you want to wait until enough data has been collected to run your crack. Watch the number in the “#Data”  column you want it to go above 10,000. (Pictured below it’s only at  854.)Depending on the power of your network (mine is inexplicably low at -32 in that screenshot, even though the
yoyo AP was in the  same room as my adapter), this process could take some time. Wait until  that #Data goes over 10k, though because the crack won’t work if it doesn’t. In fact, you may need more than 10k, though that seems to be a working threshold for many.Once you’ve collected enough data, it’s the moment of truth. Launch a third Konsole window and run the following to crack that data you’ve collected:
aircrack-ng -b (bssid) (file name-01.cap)If you didn’t get enough data, aircrack will fail and tell you to try again with more. If it succeeds, it will look like this:
The WEP key appears next to “KEY FOUND.” Drop the colons and enter it to log onto the network.
Hope you found this article useful enough. Do write to us if you have any more inquiry regarding this topic. We are always there to help you out.
source: http://tech.gaeatimes.com/index.php/archive/how-to-crack-a-wi-fi-networks-wep-password-with-backtrack/