This document provides an overview of attacking WPA-Enterprise wireless networks. It discusses the history of wireless security including WEP and the development of WPA/WPA2. It then explains how 802.1X authentication works with EAP types like PEAP and TTLS. Specific misconfigurations of PEAP are demonstrated that could allow attackers to capture credentials by spoofing the network. Defensive techniques like validating certificates and hardening infrastructure/clients are recommended. Regular security assessments are advised to check vulnerabilities.