Even with the best encryption in the world, a wireless password is useless if it’s known to someone with malicious intent. A wireless password is not hard to obtain. Since many wireless routers and access points broadcast on two frequencies (or at least have the capability to do so), one of them can be blocked with a jammer. The jammer would block all traffic on that frequency range to the point where the SSID would not show up in your list of available wireless networks because your computer or mobile device wouldn’t be able to detect the signal through the interference. Then the attacker could use their own device to broadcast on a frequency that is not jammed, and your device will pick up the new signal. The new signal would be called the same SSID as the original so you wouldn’t know the difference. Your computer or mobile device would know the difference though. It would disconnect from the jammed signal because it can’t reach it anymore. However you would see that you are no offline and try to reconnect to the SSID with the name you are used to. It will ask you for a password and you will enter it, thinking that you trust this access point because you always use it. It will seem strange but you’ll do it anyway. The password won’t work so you will re-enter it a few times.
Now the criminal knows what the password for the jammed signal should be. Jamming will discontinue and you will be reconnected to your network automatically by your wireless device. You will think it will think it unusual but move on with your life. Meanwhile, the criminal now has access to your wireless network. They can monitor all unencrypted traffic traversing it, and try to access any network resources connected to it.
In addition to that, all of this equipment could be physically connected to a drone, which could be flown onto the property at night and tucked away in some hidden corner during the day, allowing a bypass of all physical security. The attacker could be many miles away as drones can be controlled via the same wireless technology cell phones use.
For increased security wireless access points should not be able to access sensitive network equipment/information. Additionally, if wireless needs that access then wireless devices can be manually added to the access point or router via MAC address, so that no devices other than the ones that are physically approved by the administrator will be able to connect to it. Two Factor Authentication can also be used and has been shown to be effective at reducing the security vulnerabilities associated with wireless access. https://img2.insight.com/graphics/uk/media/pdf/securing_wlans.pdf