... WEP,WPA, and LEAP are well known. Although there are tools to automate these attacks, to be a successful pen tester, it is important to understand the tools that performthese attacks, and how ... Chapter 12 395 Attacking WEP Using Weak Initialization Vectors (FMS Attacks)FMS attacks are based on a weakness in WEP’s implementation of the RC4 encryp-tion algorithm. Fluhrer, Mantin, and Shamir ... ofintelligence gathering. Assume that your target is in a large building or office com-plex where several other organizations are located and multiple WLANs aredeployed. At this point, you want to take all...