In this chapter I introduced some of the methods that a cracker might use when attacking your WLAN. These included:
How a cracker might hijack a user’s Wi-Fi session
How crackers use spoofing to gain access to wireless networks
What rogue access points are, and how crackers use them to steal user logon information
Denial of service (DoS) attacks, including how crackers use them to disrupt wireless networks
These are just some of the attacks that are possible against wireless networks. In the next chapter, I will present some others, including attacks that target WLAN clients like your notebook or even your PDA.