This chapter covered all of the known attacks against WPA/802.11i. The security enhancements offered by 802.11i are vastly superior to its predecessor (WEP). These improvements come at a price, which is the complexity involved in the 802.11i protocol. Fortunately, the complexity is hidden from end-users, and connecting to a WPA- or 802.11i-protected network on any modern operating system is as easy as connecting to a WEP-protected network.