Hmmmm what you\'re trying is very \"simple\", I mean, what is the big deal? You just add a Z to make it look more... \"cool\"?
[EDIT] I mean you\'re asking us to teach you to \"hack\", but you\'re adding a Z to the equation trying to make your request look less bad. Like asking in a Ferrari forum if someone can teach you to rob a bank using a Ferrari as a get away car... (does this make any sense?)
I\'m just explaining why people make negative comments to that kind of requests... I know you\'ll understand.
[/EDIT]
Most people who\'d like to brake into your network, would almost certainly use a laptop. Therefore they\'d have far more software to play with network than you can have in your Z. Be it netstumbler, retina (others) on Winblow$, nessus, saint, nmap, airsnort, and the likes on linux...
Using the Z you\'d have to map the network with nmap, find possible flawed services on those M$ machines, and then find (write) exploits for those flaws to get access to them, or their content. SMB is a good thing to look at. There\'re more.
I guess that by cutting access to your network with encryption on the AP, and with a firewall after it would be enough. Having the machines fully patched, etc, maybe moving some to Linux... ehehe