Over the course of this chapter, we learned a lot about 802.11 packets. We covered tools such as airodump-ng, learned about the packet types and subtypes and locating rogue access points using time delta analysis, and tagged parameters and changes in MAC addresses. We looked at a variety of attack types and worked with deauthentication packets.
In the next chapter, we will look at summarizing and automating tools and scripts to perform network forensics quickly.