To get the most out of this book
To fully benefit from this book, it helps to have a basic understanding of certain technical concepts and familiarity with various technologies. These include HTTP and HTTPS protocols, REST and SOAP APIs, JSON and XML data formats, OAuth and API keys, network security fundamentals, common vulnerabilities, programming basics (especially in languages such as Python, JavaScript, or Java), and version control systems such as Git. Additionally, experience with specific tools will greatly enhance your ability to grasp the material and apply the techniques discussed effectively. Here are the key tools you should know, many of which come pre-installed in Kali Linux.
Software/hardware covered in the book |
Operating system requirements |
Postman |
Windows, macOS, or Linux |
Burp Suite |
Windows, macOS, or Linux |
Applitools |
Windows, macOS, or Linux |
Web browser (chrome/firefox) |
Windows, macOS, or Linux |
Gatling |
Windows, macOS, or Linux |
American Fuzzy Lop (AFL) |
Windows, macOS, or Linux |
Arjun |
Linux |
Amass |
Linux |
Metasploit |
Windows, macOS, or Linux |
Kiterunner |
Linux |
Faster You Fool (FFUF) |
Linux |
FoxyProxy |
Linux |
Steghide |
Linux |
Elasticsearch |
Windows, macOS, or Linux |
Kibana |
Windows, macOS, or Linux |
Elastic SIEM |
Windows, macOS, or Linux |
OWASP ZAP |
Windows, macOS, or Linux |
Nessus |
Windows, macOS, or Linux |
ModSecurity |
Linux |
Splunk |
Windows, macOS, or Linux |
Specific requirements and tools are detailed in the Technical requirements section of each chapter. This ensures you have the necessary tools and knowledge to meet the expectations of each chapter.
If you are using the digital version of this book, we advise you to type the code yourself or access the code from the book’s GitHub repository (a link is available in the next section). Doing so will help you avoid any potential errors related to the copying and pasting of code.