This paper provides a step by step walk-through of popular wireless attacks. It also describes how to perform the new AP Impersonation attack using FreeRADIUS-WPE, the new EAP-MD5 Brute force attack, and a variety of other not-so documented attacks.
42a7ff7f286496f8417cfa70abc4a67d3d2149f5bb50e623e09c0ea73a33a0cb