Contents: ch. 1 Wireless Penetration Testing Fundamentals ch. 2 Wireless Network Scanning ch. 3 Exploiting Wireless Devices ch. 4 Wireless Cracking ch. 6 Man-in-the-Middle Attacks Using Evil Twin Access Points ch. 7 Advanced Wireless Sniffing ch. 8 Denial of Service Attacks ch. 9 Wireless Pentesting from Non-Traditional Platforms