Summary
This chapter covered quite a bit, so please go back through it if you feel the need to. We learned about what pentesting is and how to set up Kali Linux locally on our machine and use various tools within the operating system, and we looked at various operating systems.
In the next chapter, we will be moving into the next section of this book and begin looking at AWS and how to conduct pentesting and security assessments within our own environment.