The only tools I know of, that the poster seems concerned about mentioning are tools like aircrack-ng. It's loaded in the Backtrack CD set. (Which I highly recommend as a tool to audit your own networks) He is correct, you can crack a WPA2-AES password. It's not easy, and it takes time. Basically what you do is start dumping the stuff you see in the air, identify a target network, send a disassociation notice to the client that's connected to the AP, spoofing the MAC of the AP, a bunch of times. You record the traffic its sending back. The password will be in that traffic, encrypted, of course. Then you do a re-play and dictionary attack against the replayed traffic. It does work, but it doesn't work against long, complex, and random passwords in a short period of time.