Well it seems like the devs fixed it up a bit. It looks like they added a help file and fixed it up, as well as added more firmwares and devices. From what it seems this has improved significantly. It seems it allows tcpdump to capture the raw 802.11 Ethernet headers. You use the script to patch your driver (depending on your device) and then tcpdump can capture the frames. You pass the output file tcpdump wrote to monitor_mode_magic_pcap.py, which then extracts the headers and writes them to a new pcap file. Now, I do not have one of the supported devices, but theoretically it should be possible to use this outputed packet capture with aircrack to begin trying to crack the password. SHOULD be able to, I am not 100% sure. If someone has a supported iDevice, it would be greatly appreciated if you would test thi out.