In this chapter, we saw how we could compromise the security of a WPA-Enterprise network running PEAP or EAP-TTLS, the two most common authentication mechanisms used in Enterprises.
In the next chapter, we will take a look at how to put all that we have learned into use during an actual penetration test.