Preferred Network List Attack
Typically, operating systems will maintain a list of trusted networks known as the preferred network list (PNL). This includes the SSID and either the plaintext password or WEP/WPA password. It is possible for an attacker to listen to client requests and impersonate the trusted network.
Last updated