This document provides instructions for cracking wireless networks encrypted with WEP and WPA. It discusses the theoretical vulnerabilities in WEP that can be exploited to decrypt the network key. For WEP cracking, it describes how to use airodump to capture initialization vectors (IVs), aircrack to crack the key using the IVs, and aireplay to force traffic if needed. It also covers differences between WPA and WEP, capturing the handshake for WPA networks, and dictionary attacks to crack weak WPA passwords.