Table of Contents
- Wireless Lab Set-up
- WLAN and Its Inherent Securities
- Bypassing WLAN Authentication
- WLAN Encryption Flaws
- Attacks on WLAN Infrastructure
- Attacking the Client
- Advanced WLAN Attacks
- Attacking WPA-Enterprise and RADIUS
- Wireless Testing Methodology
- WPS, Probes and Pineapples

