From ethicalhacker.net
In the previous article of this series, “Wireless Pentesting Part 2 – Building a WiFi Hacking Rig”, we discussed building a WiFi hacking rig. We covered the hardware, operating systems, and software requirements for setting up your own wireless pentesting rig. In this third part of the series, we are going to introduce common wireless attacks and the tools you use to perform them which will prepare you for the fourth and final part of the series, where we will take look at how to conduct a wireless pentest.