If a wireless network uses weak encryption (e.g., WEP), attackers can capture and analyze packets to extract sensitive data. Tools like Wireshark, Aircrack-ng, and Kismet capture network packets. Attackers analyze captured traffic to decrypt WEP encryption or extract plaintext credentials.