You must have solid experience of the core concepts of information security and a working knowledge of computer networks and network operating systems.
In order to utilize the tools and platforms discussed in the book, make sure you have a computer/laptop with a modern processor that has between 8 and 16 GB of RAM.
Software/hardware covered in the book |
OS requirements |
A computer/laptop with a modern processor that has between 8 and 16 GB of RAM |
Windows/macOS |
Download the color images
We also provide a PDF file that has color images of the screenshots/diagrams used in this book. You can download it here: http://www.packtpub.com/sites/default/files/downloads/Bookname_ColorImages.pdf
Conventions used
There are a number of text conventions used throughout this book.
CodeInText: Indicates code words in text, database table names, folder names, filenames, file extensions, pathnames, dummy URLs, user input, and Twitter handles. Here is an example: "Mount the downloaded WebStorm-10*.dmg disk image file as another disk in your system."
A block of code is set as follows:
html, body, #map {
height: 100%;
margin: 0;
padding: 0
}
When we wish to draw your attention to a particular part of a code block, the relevant lines or items are set in bold:
[default]
exten => s,1,Dial(Zap/1|30)
exten => s,2,Voicemail(u100)
exten => s,102,Voicemail(b100)
exten => i,1,Voicemail(s0)
Any command-line input or output is written as follows:
set rhosts 192.168.43.74
run
Bold: Indicates a new term, an important word, or words that you see on screen. For example, words in menus or dialog boxes appear in the text like this. Here is an example: "As soon as you click on the Submit button, the script gets stored on the server."