I. Introduction
Efficiency of securing and protecting information stored or transferred using wireless networks is very important. When somebody wants to effectively protect information in the organization, he has to have methods which allow to test the strength of data protection being used in community complex system to prevent unauthorized access to that information. These methods are used also for recovering lost passwords (or changed by attacker), forensic examination and data recovery.