Once an attacker has access to wireless networks, it will be a starting point for further incursions into other systems. Many networks have a carefully set of security devices as the network shell, to prevent an unlawful attack, but was really inside the protected network’s vulnerability to attack. Wireless networks can be achieved by simple configuration to quickly access network backbone, but it makes your network exposed in front of the attacker. Even if there is a certain boundaries network security devices, also makes network exposed and attacked.