i have read lots of papers talking about the possibilities of man in the middle attack, denial of service attack and session hijacking. is there anybody out there that could demonstarate any of these attacks on a wireless network? thanks.