Evil Twin (Wireless Vulnerability)
Deauthentication attack (Wireless Vulnerability)
Fragmentation Attack (Wireless Vulnerability)
Credential Harvesting (Wireless Vulnerability)
WPS Implementation Attacks (Wireless Vulnerability)
Bluetooth Attacks (Wireless Vulnerability)
RFID Cloning (Wireless Vulnerability)
Jamming (Wireless Vulnerability)
*wireless DOS attack that prevents devices from communicating with each other by occupying the frequency
Repeating (Wireless Vulnerability)
*used to capture existing wireless signal and rebroadcast it to extend range, can be an attack vector if not properly configured
Fake Cell Phone Towers (Wireless Vulnerability)