Chapter 3: Setting Up for Advanced Hacking Techniques
Learning the methodology and techniques of performing penetration testing is always exciting. While many professionals may focus on specific types of penetration testing, such as internal assessment, external assessment, social engineering assessment, or even web application security testing, it's always good to understand how to perform wireless penetration testing on wireless enterprise networks and how to compromise a Microsoft Windows domain.
During this chapter, you will learn how to set up your very own Active Directory (AD) lab environment, which will allow you to perform advanced red teaming techniques, such as discovering how to compromise an organization's Windows Domain Controller (DC). Furthermore, you will also learn how to create a wireless penetration testing lab environment to simulate advanced wireless hacking techniques.
In this chapter, we will cover the following topics:
- Building an...