Wireless Man in the Middle Attack: Attacks Man-inthe-
Middle trick done with the connection between
your computer and the access point authorized users
by entering another computer in between them as a
provocation. The program used is also the same,
except for their wireless devices. Through the
program, the intruder is able to position itself in
between the traffic data communication in wireless
networks.