I thank all who have responded to my questions! Computer Hope is a tremendous resource. It is a noble thing you all do - and for free. Thanks to you all. I have learned a couple new and very interesting things that I have to thank you all for. I never would have searched for this information on my own.
To wit:
Cameron, my friend, thanks for your time and effort; I think you might enjoy reading up on cracking WPA encryption with Reaver and it's newer variants. It might change your view of how "the only known way to break in to a WPA2 network is through brute force." Geek-9pm gets it, and might help with any of your questions.
#############################################################################
BC Programmer, my friend; I think this article might entertain you. Given your comment from; Reply #8 on: May 26, 2016, 05:04:52 PM »
Quote
"I'm not aware of the Brother Pocketjet being a particularly well-used hacking tool, myself."
http://arstechnica.com/security/2014/09/hacker-exploits-printer-web-interface-to-install-run-doom/Although the article starts by describing Doom being played on a hacked IP-enabled printer, what I found much more interesting was the part where they describe cracking the encryption in 8 steps, and then using the printer as a gateway for hacking into devices on the network that the printer lives on.