Wireless Hacking

  1. What tools do black hat hackers use to attack wireless traffic? 200 words minimum.
  2. What are some possible attacks against WPA encrypted traffic? 200 words minimum.
  3. What is the evil twin attack? 200 words minimum.
  4. How can you authenticate, authorize, and audit wireless traffic on a Windows Active Directory Network? Please detail the actual setup. 500 words minimum.