The document discusses the methodology for wireless penetration testing. It covers reconnaissance of wireless networks to identify available networks and access points. Next, it discusses attacking wireless networks by breaking encryption like WEP, and manipulating wireless authentication. It also covers bypassing wireless isolation controls and deploying rogue access points. The goal of the testing is to determine if an attacker can access the production network over the wireless medium.