-
Book Overview & Buying
-
Table Of Contents
Building a Pentesting Lab for Wireless Networks
By :
After defining the lab topology and choosing the lab components, it is time to have a closer look at the security. Obviously, we do not want to become somebody's victim due to the fact that we intentionally leave a lot of vulnerabilities in a lab environment.
At the same time, practicing security evasion techniques is definitely important for penetration testers and security specialists, especially for developing their skills to the advanced level.
According to our general security requirements and the purpose of building a lab, we are going to configure maximal security at the entry points to our lab network: at the gateway and at the trusted WLAN.
Further, we want to define the lab security requirements in detail and group them by areas.
Access control is a powerful measure that allows us to enforce security if it is designed and configured properly. At the same time, it increases network complexity making attacks more sophisticated and providing the...
Change the font size
Change margin width
Change background colour