In this chapter, we learned that even the wireless client is susceptible to attacks. These include the Honeypot and other Misassociation attacks; Caffe Latte attack, to retrieve the key from the wireless client, deauthentication and disassociation attacks causing a Denial of Service, Hirte attack as an alternative to retrieve the WEP key from a roaming client, and, finally, cracking the WPA-Personal passphrase with just the client.
In the next chapter, we will use what we've learned so far to conduct various advanced wireless attacks on both the client and infrastructure side. So, quickly flip the page to the next chapter!