There is plenty of information about this on the wiki. WEP uses IV's and does crypt-analysis with -k(Korek Attack(s)) and -w(PTW by default). Neither of those options apply to WPA/2 cracking which attacks a handshake. The person in that thread was conf...
↧