Talk Outline
Introduction
WEP/WEP2
IP
Walker/Berkeley Attacks
Attack Overview
Attack Details
Conclusions