Access Control Attacks
Such attacks are used to infiltrate a wireless network by bypassing the access control measures. Below is a brief description of such attacks, along with their name and various tools & methods used.
War driving involves listening for wireless networks using either a PDA or a computer. The main purpose of war driving attack is to find a launch point to initiate the main attack.
DStumbler, MacStumbler, Airmon-ng, Wellenreiter, KisMAC, WiFiFoFum and NetStumbler
Rogue Access Points
Instead of searching for free wireless networks, an attacker establishes a connection with an enterprise and uses their network to initiate its attack. Here, the enterprise acts as a launch point.
Can be any software or hardware access point
Ad Hoc Associations
With this technique, the attacker can connect to any unsecured access point or station.
USB adapter or a wireless card
With this technique, the attacker changes the MAC address of any computer allowing it to bypass the server or routers to treat as a trusted and authorized access point or use it to hide the computer from the network.
Wellenreiter , MacChanger, SMAC, SirMACsAlot and wicontrol