The first stage is to gather all the information around your target.
As long as you filled with enough faith for youself,you can start to 'play' with your target.
After you getting tired for little tricks,let's make it easy.
2001, Fluhrer, Mantin and Shamirt in their paper "the Weaknesses in the Key Scheduling Algorithm of RC4 " put forward two methods of analysis for RC4 Algorithm : Invariance Weakness and IV Weakness analysis (also called the FMS analysis method).After that, before the WPA series occupy the market, the analysis methods of the FMS, make the whole 802.11 wireless market began to face the risk of unsafety for a long time...