Wireless Attacks: Part I