In this chapter, we were able to cover a lot of practical content, such as breaking both WEP and WPA wireless encryption standards to recover the key (passphrase). Having exploited wireless security, best practices were discussed and demonstrated so that we can secure wireless networks from potential hackers.
Furthermore, a practical approach to penetration testing on both Microsoft's RDP and Citrix services was covered. Lastly, we covered the uses of various network implants and how they can maintain remote access to a corporate network.
You now have the skills to gain access to a wireless network, perform exploitation on target systems, and gain access to both the Linux and Windows operating systems.
In Chapter 11, Network Penetration Testing - Post-Connection Attacks, we'll explore various tools in the post-connection phase.