In this chapter, we covered the requirements for assembling a virtualized lab to practice penetration testing, the reason for choosing each component, and finally put the pieces together during the assembly phase. I hope this chapter has been informative and you are able to add a lot more virtual machines to increase the size of your lab while becoming better at penetration testing. Now, you are able to build your very own lab at home.
In the next chapter, we will look at how to select various options for a Kali device and hardware.