Building a Pentesting Lab for Wireless Networks
by Andrey Popov, Vyacheslav Fadyushin, Aaron Woody
Summary
In this chapter, you saw an overview of several popular security assessment toolkits used in numerous hacking tasks and projects along with examples of their utilization in the lab environment. You now have a brief understanding of their capabilities and a foundation for further learning.
Apart from that, there are a variety of other frameworks and standalone tools for almost every task that a penetration tester can encounter or imagine during a project. So, do not hesitate to explore new tools when you have time and try them in your lab—that is one of the reasons why you have built it.
There are a huge number of tools for wireless security analysis, yet sometimes it is hard to find one on the Internet when needed. But there is a repository ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access