Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Building a Pentesting Lab for Wireless Networks
Building a Pentesting Lab for Wireless Networks

Building a Pentesting Lab for Wireless Networks: Build your own secure enterprise or home penetration testing lab to dig into the various hacking techniques

Arrow left icon
Profile Icon Woody Profile Icon Fadyushin Profile Icon Popov
Arrow right icon
NZ$14.99 NZ$57.99
eBook Mar 2016 264 pages 1st Edition
eBook
NZ$14.99 NZ$57.99
Paperback
NZ$71.99
Subscription
Free Trial
Arrow left icon
Profile Icon Woody Profile Icon Fadyushin Profile Icon Popov
Arrow right icon
NZ$14.99 NZ$57.99
eBook Mar 2016 264 pages 1st Edition
eBook
NZ$14.99 NZ$57.99
Paperback
NZ$71.99
Subscription
Free Trial
eBook
NZ$14.99 NZ$57.99
Paperback
NZ$71.99
Subscription
Free Trial

What do you get with eBook?

Product feature icon Instant access to your Digital eBook purchase
Product feature icon Download this book in EPUB and PDF formats
Product feature icon Access this title in our online reader with advanced features
Product feature icon DRM FREE - Read whenever, wherever and however you want
OR
Modal Close icon
Payment Processing...
tick Completed

Billing Address

Table of content icon View table of contents Preview book icon Preview Book

Building a Pentesting Lab for Wireless Networks

Chapter 2. Planning Your Lab Environment

As with any building, software, device, or other type of technical and non-technical projects, you need to start with a proper planning before proceeding to build a lab. This order is necessary to get the most benefits from your lab environment and at the same time to stay safe from any kinds of unwanted attacks. Preliminary planning also helps to avoid an unnecessary repetition of some installation and configuration tasks that can suddenly arise during the implementation phase if you realize that something is missing or some significant changes should be done in an almost finished lab environment.

In this chapter, we will guide you through the whole planning phase from understanding what do you need a lab for to choosing the lab components and topology based on your own requirements. To reach this goal, we will cover the following topics in this chapter:

  • Understanding what tasks your lab should fulfill
  • Planning the network topology
  • Choosing...

Understanding what tasks your lab should fulfill

Under this topic, we are going to help you to determine your needs and what you want to achieve with your lab. After understanding your needs, you will be able to set requirements for your lab—stating what should it contain and how should its components interact. This step allows you to prepare the basis of the next step—deciding which lab components do you need to include in a lab and which roles to assign them.

Objectives of a lab

Let's start from listing the typical purposes for having a lab:

  • Learn practical penetration testing: It is essential for a beginner to have an environment where they can practice penetration testing techniques they learn and consolidate newly learned information. During this education, you most likely will want to have a model of a real-world corporate network and you can emulate it in a lab.
  • Improve and maintain penetration testing skills: Experienced professionals also need a lab to periodically...

Planning the network topology

An essential step in building a network is developing a network topology. A network topology determines how lab components can be interconnected physically and logically, significantly influences data flows inside a network and sets requirements and limitations on network protocols usage.

Network segmentation is another important mechanism to think about in the planning stage. A network segmentation allows us to implement network management protocols to practice more network layer attacks, and it allows us to use integrated security features of network devices and dedicated network-based firewalls to provide better inter-segment isolation and network access control.

Thus, if you want to implement certain network protocols operating in a lab, which make sense with practicing certain attack types and provide security to the lab at the same time, we need to plan a segmental lab's network with several subnets and virtual LANs instead of just connecting all lab...

Choosing appropriate components

Under this topic, we are going to decide which lab components can fulfill the tasks determined in the previous topic.

As it is not always easy to get enough budget and hardware to build a penetration testing lab in an enterprise environment and even harder to do it at home, we are going to use virtualization and free software as much as possible in this book. That decision influences the next topics significantly, because it sets additional requirements for a lab.

Virtualization has also another significant advantage—flexibility to quickly modify the lab environment content according to current tasks by simply turning virtual hosts on and off.

For a virtual lab, you will need a computer powerful enough to run three to four virtual machines at the same time. We would recommend having at least four cores CPU and 8 GB of RAM. Additionally, you will need at least 150 GB of free space on a hard drive. Of course, if you have a bigger hard drive and if it is...

Planning lab security

After defining the lab topology and choosing the lab components, it is time to have a closer look at the security. Obviously, we do not want to become somebody's victim due to the fact that we intentionally leave a lot of vulnerabilities in a lab environment.

At the same time, practicing security evasion techniques is definitely important for penetration testers and security specialists, especially for developing their skills to the advanced level.

According to our general security requirements and the purpose of building a lab, we are going to configure maximal security at the entry points to our lab network: at the gateway and at the trusted WLAN.

Further, we want to define the lab security requirements in detail and group them by areas.

Access control

Access control is a powerful measure that allows us to enforce security if it is designed and configured properly. At the same time, it increases network complexity making attacks more sophisticated and providing the...

Understanding what tasks your lab should fulfill


Under this topic, we are going to help you to determine your needs and what you want to achieve with your lab. After understanding your needs, you will be able to set requirements for your lab—stating what should it contain and how should its components interact. This step allows you to prepare the basis of the next step—deciding which lab components do you need to include in a lab and which roles to assign them.

Objectives of a lab

Let's start from listing the typical purposes for having a lab:

  • Learn practical penetration testing: It is essential for a beginner to have an environment where they can practice penetration testing techniques they learn and consolidate newly learned information. During this education, you most likely will want to have a model of a real-world corporate network and you can emulate it in a lab.

  • Improve and maintain penetration testing skills: Experienced professionals also need a lab to periodically try some new attack...

Planning the network topology


An essential step in building a network is developing a network topology. A network topology determines how lab components can be interconnected physically and logically, significantly influences data flows inside a network and sets requirements and limitations on network protocols usage.

Network segmentation is another important mechanism to think about in the planning stage. A network segmentation allows us to implement network management protocols to practice more network layer attacks, and it allows us to use integrated security features of network devices and dedicated network-based firewalls to provide better inter-segment isolation and network access control.

Thus, if you want to implement certain network protocols operating in a lab, which make sense with practicing certain attack types and provide security to the lab at the same time, we need to plan a segmental lab's network with several subnets and virtual LANs instead of just connecting all lab components...

Left arrow icon Right arrow icon

Key benefits

  • Design and build an extendable penetration testing lab with wireless access suitable for home and enterprise use
  • Fill the lab with various components and customize them according to your own needs and skill level
  • Secure your lab from unauthorized access and external attacks

Description

Starting with the basics of wireless networking and its associated risks, we will guide you through the stages of creating a penetration testing lab with wireless access and preparing your wireless penetration testing machine. This book will guide you through configuring hardware and virtual network devices, filling the lab network with applications and security solutions, and making it look and work like a real enterprise network. The resulting lab protected with WPA-Enterprise will let you practice most of the attack techniques used in penetration testing projects. Along with a review of penetration testing frameworks, this book is also a detailed manual on preparing a platform for wireless penetration testing. By the end of this book, you will be at the point when you can practice, and research without worrying about your lab environment for every task.

Who is this book for?

If you are a beginner or a security professional who wishes to learn to build a home or enterprise lab environment where you can safely practice penetration testing techniques and improve your hacking skills, then this book is for you. No prior penetration testing experience is required, as the lab environment is suitable for various skill levels and is used for a wide range of techniques from basic to advance. Whether you are brand new to online learning or you are a seasoned expert, you will be able to set up your own hacking playground depending on your tasks.

What you will learn

  • Determine your needs and choose the appropriate lab components for them
  • Build a virtual or hardware lab network
  • Imitate an enterprise network and prepare intentionally vulnerable software and services
  • Secure wired and wireless access to your lab
  • Choose a penetration testing framework according to your needs
  • Arm your own wireless hacking platform
  • Get to know the methods to create a strong defense mechanism for your system

Product Details

Country selected
Publication date, Length, Edition, Language, ISBN-13
Publication date : Mar 28, 2016
Length: 264 pages
Edition : 1st
Language : English
ISBN-13 : 9781785286063
Category :

What do you get with eBook?

Product feature icon Instant access to your Digital eBook purchase
Product feature icon Download this book in EPUB and PDF formats
Product feature icon Access this title in our online reader with advanced features
Product feature icon DRM FREE - Read whenever, wherever and however you want
OR
Modal Close icon
Payment Processing...
tick Completed

Billing Address

Product Details

Publication date : Mar 28, 2016
Length: 264 pages
Edition : 1st
Language : English
ISBN-13 : 9781785286063
Category :

Packt Subscriptions

See our plans and pricing
Modal Close icon
$19.99 billed monthly
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Simple pricing, no contract
$199.99 billed annually
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Choose a DRM-free eBook or Video every month to keep
Feature tick icon PLUS own as many other DRM-free eBooks or Videos as you like for just NZ$7 each
Feature tick icon Exclusive print discounts
$279.99 billed in 18 months
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Choose a DRM-free eBook or Video every month to keep
Feature tick icon PLUS own as many other DRM-free eBooks or Videos as you like for just NZ$7 each
Feature tick icon Exclusive print discounts

Frequently bought together


Stars icon
Total NZ$ 249.97
Mastering Wireshark
NZ$80.99
Advanced Penetration Testing for Highly-Secured Environments, Second Edition
NZ$96.99
Building a Pentesting Lab for Wireless Networks
NZ$71.99
Total NZ$ 249.97 Stars icon
Banner background image

Table of Contents

9 Chapters
1. Understanding Wireless Network Security and Risks Chevron down icon Chevron up icon
2. Planning Your Lab Environment Chevron down icon Chevron up icon
3. Configuring Networking Lab Components Chevron down icon Chevron up icon
4. Designing Application Lab Components Chevron down icon Chevron up icon
5. Implementing Security Chevron down icon Chevron up icon
6. Exploring Hacking Toolkits Chevron down icon Chevron up icon
7. Preparing a Wireless Penetration Testing Platform Chevron down icon Chevron up icon
8. What's Next? Chevron down icon Chevron up icon
Index Chevron down icon Chevron up icon
Get free access to Packt library with over 7500+ books and video courses for 7 days!
Start Free Trial

FAQs

How do I buy and download an eBook? Chevron down icon Chevron up icon

Where there is an eBook version of a title available, you can buy it from the book details for that title. Add either the standalone eBook or the eBook and print book bundle to your shopping cart. Your eBook will show in your cart as a product on its own. After completing checkout and payment in the normal way, you will receive your receipt on the screen containing a link to a personalised PDF download file. This link will remain active for 30 days. You can download backup copies of the file by logging in to your account at any time.

If you already have Adobe reader installed, then clicking on the link will download and open the PDF file directly. If you don't, then save the PDF file on your machine and download the Reader to view it.

Please Note: Packt eBooks are non-returnable and non-refundable.

Packt eBook and Licensing When you buy an eBook from Packt Publishing, completing your purchase means you accept the terms of our licence agreement. Please read the full text of the agreement. In it we have tried to balance the need for the ebook to be usable for you the reader with our needs to protect the rights of us as Publishers and of our authors. In summary, the agreement says:

  • You may make copies of your eBook for your own use onto any machine
  • You may not pass copies of the eBook on to anyone else
How can I make a purchase on your website? Chevron down icon Chevron up icon

If you want to purchase a video course, eBook or Bundle (Print+eBook) please follow below steps:

  1. Register on our website using your email address and the password.
  2. Search for the title by name or ISBN using the search option.
  3. Select the title you want to purchase.
  4. Choose the format you wish to purchase the title in; if you order the Print Book, you get a free eBook copy of the same title. 
  5. Proceed with the checkout process (payment to be made using Credit Card, Debit Cart, or PayPal)
Where can I access support around an eBook? Chevron down icon Chevron up icon
  • If you experience a problem with using or installing Adobe Reader, the contact Adobe directly.
  • To view the errata for the book, see www.packtpub.com/support and view the pages for the title you have.
  • To view your account details or to download a new copy of the book go to www.packtpub.com/account
  • To contact us directly if a problem is not resolved, use www.packtpub.com/contact-us
What eBook formats do Packt support? Chevron down icon Chevron up icon

Our eBooks are currently available in a variety of formats such as PDF and ePubs. In the future, this may well change with trends and development in technology, but please note that our PDFs are not Adobe eBook Reader format, which has greater restrictions on security.

You will need to use Adobe Reader v9 or later in order to read Packt's PDF eBooks.

What are the benefits of eBooks? Chevron down icon Chevron up icon
  • You can get the information you need immediately
  • You can easily take them with you on a laptop
  • You can download them an unlimited number of times
  • You can print them out
  • They are copy-paste enabled
  • They are searchable
  • There is no password protection
  • They are lower price than print
  • They save resources and space
What is an eBook? Chevron down icon Chevron up icon

Packt eBooks are a complete electronic version of the print edition, available in PDF and ePub formats. Every piece of content down to the page numbering is the same. Because we save the costs of printing and shipping the book to you, we are able to offer eBooks at a lower cost than print editions.

When you have purchased an eBook, simply login to your account and click on the link in Your Download Area. We recommend you saving the file to your hard drive before opening it.

For optimal viewing of our eBooks, we recommend you download and install the free Adobe Reader version 9.