In this chapter, we discussed various wireless topologies, as it is important for a penetration tester to have an understanding of the landscape prior to and during the attacking phase. We covered current wireless authentication modes and encryption standards, and looked at their similarities and differences. Furthermore, we dived into discussing wireless threats and explored a variety of penetration testing attacks. Finally, we covered various Bluetooth attacks.
In the next chapter, we'll discuss avoiding detection. You'll learn about various way to be stealthy during a penetration test.