Wireless Ethical Hacking, Penetration Testing, and Defenses