In this chapter, we explored different ways to compromise the security of the Wireless LAN infrastructure:
Compromising default accounts and credentials on access points
Denial of service attacks
Evil twins and MAC Spoofing
Rogue access points in the enterprise network
In the next chapter, we will take a look at different attacks on the wireless LAN client. Interestingly, most administrators feel that the client has no security problems to worry about. We will see how nothing could be furthers from the truth.