Lab Summary
In this lab we have learned how to hack wireless networks via Evil Twin attack. This was an introductory lab, so please take some time to explore the tools mentioned in the book to help you understand the red and blue team tactics better.
The next chapter will take an in-depth look at reconnaissance to fully understand how Threat Actors collect information about users and systems using social media, compromised websites, emails, and scanning tools.