Research Article

Design of Cyberwar Laboratory Exercises to Implement Common Security Attacks against IEEE 802.11 Wireless Networks

Figure 5

Console application at the victim side to verify the network configuration.
218271.fig.005