Wireless Attacks Part II