Summary

In this chapter, we have shown readers how to protect the lab network from an unauthorized access and external attacks by installing and configuring network- and host-based security solutions. In addition to securing the lab network, we have prepared it to practice such important penetration testing topics as bypassing and evading security mechanisms and assessing their effectiveness.

The lab environment is ready for practicing now and in the next chapter we would like to give a brief overview of various penetration testing and security assessment frameworks and toolkits along with some examples of their usage in the lab.

Get Building a Pentesting Lab for Wireless Networks now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.