It gets into techniques commonly used in WarDriving, with packet sniffers.
To summarize, the method involves sitting around, and collecting enough stray packets to gather the encryption info using programs to look at/analyze the data in the packets. Wireless networks are inherently flawed in this manner, because rather than just transmitting data to/from the access point and access card, it sends data everywhere within its range. All the good software, that I'm aware of, requires an Orinoco card and Linux, though.
|