any successful attacks..?

Onder, Hulusi TUR honder
Thu Dec 4 11:11:33 PST 2003

i have read lots of papers talking about the possibilities of man in the middle attack, denial of service attack and session hijacking. is there anybody out there that could demonstarate any of these attacks on a wireless network?

More information about the Hostap mailing list