I have been working on decrypting a WEP .cap file using crunch. It has 1268 IVs. I am wondering:
Can I get a clue from the captured file to speed the process of brute-forcing?
If not, what other ways I can try to decrypt the packet?
It is a captured 802.11 file; consisting of data transmission and a part of de-authentication (not an attack). Needless to say, it has a large part of acknowledgment packets as well. I have used aircrack-ng without a dictionary and what it said was this: "Failed. Next, try with 5000 IVs." Since I do not have access to the source transmitter (it is just a .cap file), all I have is the captured file.