
134 Wireless Security
In addition to those the following aspects are pertinent:
In the rst place an attacker has at his disposal a panoply of
technical possibilities to circumvent authentication routines. By
this he not only enters the device itself but he then has all the
options to penetrate internal and external applications. In any case
he has a new launching pad for getting into network applications
belonging to a speci c organization. He has surmounted a rst
obstacle. Using further technical means he can try to conceal his
illegal access by manipulation in a way that network administrators
or communication o cers will not spot his ...