Wire less hacking Tools
the focus of this analysis of wireless hacking is in regard to 802.11 and bluetooth in particular the attack tools cover the 3 key areas of hacking
1> confidentiality these focus on the content of the data and are best known for encryption cracking 2> Integrity used mainly for data transmission include frame insertion, man in the middle, and replay attack
- availability Finally, availability attack tools focus on Denial of Service (DoS) attacks.