Wireless attack and defense - crack the full solution of the WEP key process