1. Your first task is to recover secret WEP key from captured IVs. You can use file pv079.ivs. 2. Download file from cap_files directory with your uco. This file contains few encrypted packets. Packets were encrypted with a key that can be recovered from IVs. Your second task is to decrypt this file. 3. Find IP address that was echo-requested, time of the request and a source IP. You will find this information in the decrypted cap file. You are expected to report the WEP key used (2 pts), MAC address of the access point that the traffic was captured from (2 pts), echo-requested IP address, time of the request and a source IP address (6 pts). Your final report has to follow this structure: WEP_key MAC_address_of_the_access_point filename_of_your_cap_file echo-requested_IP_address time_of_the_request source_IP_address For those (but not necessarily) who have already passed this type of assignment in PV079 there is an option to get some extra points. Use a wifi equipped laptop and any kind of sw for wifi exploration (like netstumbler or kismet) to scan available networks along some tram lines (preferably line number 1 or 8) in Brno. Process your results in a similar way as it was done in the document provided. This option will be awarded by 4 extra points.