Attacks

9. O/S/M Vulnerabilities
10. WEP Encryption
11. Passive Attacks
12. Active Attacks
13. IV Replay Attack
14. Bit-flipping Attack
15. MITM Attack
16. Cisco LEAP
17. LEAP weaknesses
18. LEAP attack
19. WPA PSK attacks