1 00:00:06,700 --> 00:00:07,670 - There are many reasons 2 00:00:07,670 --> 00:00:09,640 that you want to build your own lab, 3 00:00:09,640 --> 00:00:12,080 but let me actually highlight three of the main reasons. 4 00:00:12,080 --> 00:00:13,583 So the first one is knowledge. 5 00:00:17,680 --> 00:00:19,223 The second one is testing. 6 00:00:23,140 --> 00:00:25,843 And the third one is for legal reasons. 7 00:00:27,660 --> 00:00:28,920 So let me explain. 8 00:00:28,920 --> 00:00:29,870 So first, knowledge. 9 00:00:29,870 --> 00:00:32,170 You actually, of course, want to build your own knowledge, 10 00:00:32,170 --> 00:00:33,260 practice your skills, 11 00:00:33,260 --> 00:00:36,190 develop your skills in a safe environment. 12 00:00:36,190 --> 00:00:38,850 So you can put an attacker box, 13 00:00:38,850 --> 00:00:42,910 or Kali Linux, perhaps in a VM or in bare metal. 14 00:00:42,910 --> 00:00:44,260 It actually doesn't matter. 15 00:00:45,392 --> 00:00:46,550 But you have a safe environment 16 00:00:46,550 --> 00:00:48,930 that you can actually launch attacks against victims. 17 00:00:48,930 --> 00:00:51,963 So one of the things that I actually want to highlight 18 00:00:51,963 --> 00:00:55,430 is that we put a lot of material in the GitHub repository 19 00:00:55,430 --> 00:00:57,980 that we actually have for you. 20 00:00:57,980 --> 00:01:02,980 So it has links to attack boxes or victim boxes if you will, 21 00:01:04,286 --> 00:01:07,430 that you can actually just download from the internet, 22 00:01:07,430 --> 00:01:09,823 that provides again, disposable VMs 23 00:01:09,823 --> 00:01:11,760 that you can play with them 24 00:01:11,760 --> 00:01:14,950 and actually dispose of them later, and so on. 25 00:01:14,950 --> 00:01:17,616 The other one, of course, is testing. 26 00:01:17,616 --> 00:01:21,460 You can actually replicate your client's environment 27 00:01:21,460 --> 00:01:24,580 in a safe environment, using exactly the same code 28 00:01:24,580 --> 00:01:26,940 that they're actually using, perhaps the same gear. 29 00:01:26,940 --> 00:01:29,120 And in this case, actually, we're talking about wireless. 30 00:01:29,120 --> 00:01:33,430 So you can actually mimic exactly the same infrastructure 31 00:01:33,430 --> 00:01:36,930 that you will encounter in your client environments. 32 00:01:36,930 --> 00:01:38,592 And as a matter of fact, 33 00:01:38,592 --> 00:01:42,613 some enterprises will ask you to verify 34 00:01:43,875 --> 00:01:48,370 that you're not gonna be able to do any fully disruptive 35 00:01:48,370 --> 00:01:51,150 or denial of service conditions in their network. 36 00:01:51,150 --> 00:01:52,835 And in some cases, 37 00:01:52,835 --> 00:01:54,610 actually they will require you to build your own lab, 38 00:01:54,610 --> 00:01:57,668 and they will provide you with different versions 39 00:01:57,668 --> 00:02:00,170 of software that might be running and different hardware. 40 00:02:00,170 --> 00:02:02,400 So that's another part of it. 41 00:02:02,400 --> 00:02:04,150 And then, of course, legal reasons. 42 00:02:05,291 --> 00:02:06,770 So you don't want to actually start playing 43 00:02:06,770 --> 00:02:08,780 with your neighbors router. 44 00:02:08,780 --> 00:02:12,240 You don't want to start playing in the public domain 45 00:02:12,240 --> 00:02:14,970 or in the coffee shop and actually be able 46 00:02:14,970 --> 00:02:17,105 to actually launch these attacks. 47 00:02:17,105 --> 00:02:19,030 Of course, we're talking about ethical hacking here. 48 00:02:19,030 --> 00:02:22,200 So the legal aspects of it is extremely important. 49 00:02:22,200 --> 00:02:25,600 And as a matter of fact, one of the best resources, 50 00:02:25,600 --> 00:02:29,553 or an easy way to remember this, is by visiting Wireless. 51 00:02:30,740 --> 00:02:33,420 So wireless.theartofhacking.org. 52 00:02:33,420 --> 00:02:35,923 That will redirect you to the GitHub repository. 53 00:02:37,900 --> 00:02:42,210 And in there, you will find additional information on, 54 00:02:42,210 --> 00:02:44,470 of course, how to build your own lab. 55 00:02:44,470 --> 00:02:46,910 The information that I shared with you in previous lessons 56 00:02:46,910 --> 00:02:50,600 related to the different type of adapters, antennas, 57 00:02:50,600 --> 00:02:54,130 and some tips that will actually make your life easier 58 00:02:54,130 --> 00:02:55,860 whenever you're actually building your lab 59 00:02:55,860 --> 00:02:59,083 or actually preparing for your penetration testing event.