- Management, Control, and Data.
- SSID, security capabilities, and MAC address of the access point.
- WPA still uses WEP as an encryption algorithm. WPA2 also uses a stronger encryption of AES.
- Rogue Access Points, Evil Twin, Frame injection, and WPA2 key cracking.
- Airgeddon, airodump-ng, and aireplay-ng.