Wireless and RF-Based Vulnerabilities Evil Twin Karma Attack Downgrade Attack Deauthentication Attacks Fragmentation Attacks Credential Harvesting WPS Implementation Weakness Bluejacking Bluesnarfing RFID Cloning Jamming Repeating