In this chapter, we will cover the following topics:
- Scanning for wireless networks
- Bypassing MAC-based authentication
- Breaking WEP encryption
- Obtaining WPA/WPA2 keys
- Exploiting guest access
- Rogue AP deployment
- Using wireless networks to scan and attack internal networks