This document summarizes wireless security assessments. It outlines the methodology, which includes pre-planning, locating wireless devices, validating their locations, identifying vulnerabilities, exploiting weaknesses, documenting findings, and communicating results. It describes cracking WEP encryption and Cisco LEAP authentication. Specific attacks against wireless networks are also detailed, such as sniffing traffic and spoofing access points. The document recommends using strong encryption, authentication, and monitoring over insecure protocols like WEP. Future trends may include increased policy/compliance challenges and network segmentation.