Case 1. Default setting with WPA2
Method 1. (Dallas). Examine their default firmware to figure out a basic attack.
Method 2. Examine their source code to see if we can confirm we learn from the firmware.
Case 2. Disable WPA2. So, we can see what commends and packets they exchange.