Summary
In the first part of this chapter, we learned how to choose our tools, including an operating system, interception proxy, and browser. Then, we learned how to install and use common tools and write a few lines of Python.
In the second part of the second chapter, we learned how to install VirtualBox and Docker.
After finishing the preparation, we will turn to scenarios in the second and third parts, starting by attacking the authentication layer, specifically Security Assertion Markup Language (SAML).