Attack Description Methods and Tools 802.11 Data Deletion Jamming an intended receiver to prevent delivery while simultaneously spoofing ACKs for deleted data frames. Jamming + Injection Tools X EAP Replay Capturing X Extensible Authentication Protocols (e.g., EAP Identity, Success, Failure) for later replay. Wireless Capture + Injection Tools between station and AP X RADIUS Replay Capturing RADIUS Access-Accept or Reject messages for later replay. Ethernet Capture + Injection Tools between AP and authentication ser Confidentiality attacks These attacks attempt to intercept private or sensitive information sent over wireless associations - whether sent in the clear or encrypted by 802.11 or higher layer protocols. Eavesdropping, WEP Key Cracking, Evil Twin AP (poorly-understood attack) and Man- in-the-Middle (a form of active eavesdropping) are the most common attacks in this category. As shown in general taxonomy of WLAN security attacks (figure 8), eavesdropping is classified as passive attack whereas the rest are members of active attack class.