In this chapter, we opened with a discussion of the importance of having our own isolated lab environment for practicing offensive security training. We delved into the concepts of virtualization and looked at how it's going to help us now and in the future. Later in the chapter, we covered configuring a virtual network on both Oracle VM VirtualBox and VMware Workstation, as these networks will be used to interconnect all of our virtual machines (our attacker and victim machines). We then walked through deploying Kali Linux and Android to our penetration testing lab.
Now that we have a fundamental understanding of designing and building our lab environment, let's continue deploying both Windows and Linux-based operating systems in our next chapter.