Wireless network are easier to infiltrate given that physical access to a network device is to eliminate as long as the attacks is within range including ones we've already covered as the following are possible vectors:
- Network access with MAC spoofing
- Spoofing packets and protocol for
- Remote obstruction or manipulation of users data
- Credential harvesting
- Denial of service attack to specific host or the entire network
- Network injection and payload delivery