Summary

In this chapter, you saw an overview of several popular security assessment toolkits used in numerous hacking tasks and projects along with examples of their utilization in the lab environment. You now have a brief understanding of their capabilities and a foundation for further learning.

Apart from that, there are a variety of other frameworks and standalone tools for almost every task that a penetration tester can encounter or imagine during a project. So, do not hesitate to explore new tools when you have time and try them in your lab—that is one of the reasons why you have built it.

There are a huge number of tools for wireless security analysis, yet sometimes it is hard to find one on the Internet when needed. But there is a repository ...

Get Building a Pentesting Lab for Wireless Networks now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.