... using the access point’s MAC address as the source Wireless Security, Advanced Wireless LAN HackingAdvanced 802.11 Attack Wireless Best Practices Wireless Hacking Toolswlan-jack, essid-jack, monkey-jack, ... monkey-jack, kracker-jackNetStrumblerAttack Scenarios – WLAN-Jack Wireless Security Mark NakropManaging DirectornForce Security SystemsAttack Scenarios – WLAN-Jack Airopeek TraceAttack Scenarios ... Driving.?Equipped with wireless devices and related tools, and driving around in a vehicle or parking at interesting places with a goal of discovering easy-to-get-into wireless networks is known...