Introduction

What?

Notes on tools used for wireless hacking, and experimenting with new tools.

Why?

Simulating hacker-style attacks on network assets.

How?