In this tutorial, we will introduce you to common techniques used to exploit weaknesses in wireless network security implementations.. We will also look at some of the countermeasures you can put in place to protect against such attacks.. A MAC address is merely an identifier for wireless routers One cannot “hack” a router with a MAC address. Shared Key Authentication (SKA) – This method sends t..