This document discusses wormhole attacks in wireless networks. It begins by defining a wormhole attack as when a malicious node captures packets from one location and tunnels them to another malicious node in a distant location. It then describes different modes of wormhole attacks including using encapsulation, out-of-band channels, high power transmission, packet relay, and protocol deviations. It classifies wormholes as open, half-open, or closed and compares the different attack modes from an attacker's perspective in terms of advantages, disadvantages, challenges, and possible solutions. Finally, it provides references for further research on wormhole attack detection and prevention techniques.