Daftar isi: Chapter I Backtrack, kali linux, and ethical hacking Chapter II Using virtual machine Chapter III Connecting to a network Chapter IV Wireless TX power Chapter V Uncovering hidden SSID of wireless access point Chapter VI Bypassing MAC filters on AP Chapter VII Breaking WPA2 wireless Chapter VIII Rogue wireless access point and evil twins Chapter IX …