Afterword
We hope that after finishing this book your knowledge about real-world 802.11 security is improved and you are ready to face the security challenges presented by modern wireless networking. You now might even want to build some wireless security-related tools, discover and patch new vulnerabilities, or deploy custom-built 802.11a/b/g gateways, access points, or IDS sensors. If this is the case, this work has reached its goal and our time writing it was not spent in vain while there are so many interesting packets in the air to take care of.
|