To get the most from this book, readers should have some technical information security experience and be familiar with common administrative tools in Windows and Linux. Readers should read this book actively; in other words, after being exposed to new information or tools, it is highly recommended to practice and search for more scenarios and capabilities.
Read the book with a goal in mind and try to use it or a part of it as an action plan toward making your infrastructure more secure.
The following are the requirements:
- Microsoft Windows OS
- Kali Linux (installed or hosted in a virtual machine)
- 2 GB RAM or more
- Internet access
- Wireless card or adapter supporting Kali Linux