This document discusses wireless attacks using IoT devices. It describes Wi-Fi deauthentication attacks, beacon flooding attacks, and probe request attacks. It provides technical details on how each attack works, such as how a deauthentication attack can force a client to disconnect from a wireless access point. Potential uses of these attacks are also mentioned, such as deauthenticating surveillance cameras or forcing clients to connect to an evil twin access point. The document then discusses using probe request techniques in social engineering attacks. It also introduces the NodeMCU ESP8266 as an inexpensive IoT device that could potentially be misused for wireless attacks and demonstrates related tools.