an entry point into many? Despite the configuration of encryption and MAC filtering wireless networks provide an entry point into many small company networks. how attackers could exploit this weakness to access information traveling across the companies wired networks identifying hardware and software which they might use.
software might use, Cain and able, Sharkwire
software might use, Cain and able, Sharkwire