<s>
Network	B-Protocol
encryption	I-Protocol
cracking	I-Protocol
is	O
the	O
breaching	O
of	O
network	O
encryptions	O
(	O
e.g.	O
,	O
WEP	O
,	O
WPA	O
,	O
...	O
)	O
,	O
usually	O
through	O
the	O
use	O
of	O
a	O
special	O
encryption	B-Application
cracking	I-Application
software	I-Application
.	O
</s>
<s>
Gathering	O
packets	O
may	O
be	O
done	O
through	O
tools	O
such	O
as	O
WireShark	B-Language
or	O
Prismdump	O
and	O
cracking	O
may	O
be	O
done	O
through	O
tools	O
such	O
as	O
WEPCrack	O
,	O
AirSnort	O
,	O
AirCrack	O
,	O
and	O
WEPLab	O
.	O
</s>
<s>
This	O
command	O
generates	O
a	O
log-file	O
(	O
ivfile.log	O
)	O
from	O
a	O
captured	O
packet	O
obtained	O
by	O
WireShark	B-Language
or	O
prismdump	O
A	O
packet	O
with	O
at	O
least	O
5	O
million	O
frames	O
is	O
required	O
.	O
</s>
