What is the first step that needs to be carried out to investigate wireless attacks?