The attacks that target authentication on wireless networks are varied, with each having its own advantages and disadvantages that make them useful or not useful in any given situation.
Before we start exploring each one of our attacks, let's first lay out the attacks that will be covered in this chapter:
- Bluesmacking
- Bluejacking
- Bluesnarfing
- MAC spoofing
- Man-in-the-middle
Remember, these are just a few of the types of attacks that can be used to subvert the authentication of a wireless network; they should never be considered the only types of attacks.