To get the most out of this book
To get the most out of this book, you should be interested in web application security and vulnerability research. We also suggest having a good knowledge of web technologies and related protocols and a basic understanding of reverse engineering.
Software/hardware covered in the book |
Operating system requirements |
Burp |
The host system can be Windows, macOS, or Linux, with enough power to run two or three Linux-based containers. |
Python |
|
Bash |
Having physical GL.iNet devices such as the Mango or the Shadow is preferable for recreating the scenario in Chapter 5.
If you are using the digital version of this book, we advise you to type the code yourself or access the code from the book’s GitHub repository (a link is available in the next section). Doing so will help you avoid any potential errors in copying and pasting code.
We suggest that you not only read the book but also recreate the scenarios included in it by trying them out locally, either by following the directions in the book or by finding solutions on your own.