To get the most out of this book
To get the most out of this book, you should have a fundamental understanding of networking, specifically TCP/IP, UDP, and their respective protocols. Furthermore, given the nature of the techniques covered in the book, you should have basic familiarity with the workings and functionality of Windows and Linux.
The hardware required to follow the techniques and exploits in this book is fairly standard. You can use a laptop or desktop computer that supports virtualization and is capable of running Oracle VirtualBox. As per the hardware and operating system specifications, the following configuration is recommended:
- Operating system (Windows): Windows 7 or later, preferably 64-bit
- Operating system (Linux): Ubuntu, Debian, Fedora, or any stable distribution based on Debian or Fedora
- Processor: Intel i5 or higher
- RAM: 8 GB or higher
- HDD: 500 GB hard drive
If you are using the digital version of this book, we advise you to type the code yourself or access the code from the book's GitHub repository (a link is available in the next section). Doing so will help you avoid any potential errors related to the copying and pasting of code.