5.1 Introduction To WEP hacking