Table of Contents
- Introduction to wireless penetration testing
- Setting up your machine with Kali Linux
- WLAN reconnaissance
- WEP cracking
- WPA/WPA2 cracking
- Attacking access points and the infrastructure
- Wireless clients attacks
- Reporting and conclusions
- Appendix

