Page 18 - Hands-On Bug Hunting for Penetration Testers
P. 18
Preface
To get the most out of this book
To get the full experience following through the exercises, you should have a basic
background in web application development - understanding the general patterns that
power the modern web at a high level (for example, server-client, cookies as authentication,
HTTP as a stateless protocol) as well as being comfortable with basic web technologies such
as HTML/CSS, JavaScript, the browser, TCP/IP, and others. Having some penetration
testing experience is helpful, but not strictly required. We also make regular use of the
command line in this work, but there are often GUI-related workarounds.
If you have gaps in any of the above topics, I encourage you to still give the book a try.
Additional resources, illustrative examples, and links to outside pentesting resources are
designed to provide more context if you're stumped on any particular section.
Download the example code files
You can download the example code files for this book from your account at
XXX QBDLU DPN. If you purchased this book elsewhere, you can visit
XXX QBDLU DPN TVQQPSU and register to have the files emailed directly to you.
You can download the code files by following these steps:
1. Log in or register at XXX QBDLUQVC DPN.
2. Select the SUPPORT tab.
3. Click on Code Downloads & Errata.
4. Enter the name of the book in the Search box and follow the onscreen
instructions.
Once the file is downloaded, please make sure that you unzip or extract the folder using the
latest version of:
WinRAR/7-Zip for Windows
Zipeg/iZip/UnRarX for Mac
7-Zip/PeaZip for Linux
The code bundle for the book is also hosted on GitHub at IUUQT HJUIVC DPN
1BDLU1VCMJTIJOH )BOET 0O #VH )VOUJOH GPS 1FOFUSBUJPO 5FTUFST. In case there's an
update to the code, it will be updated on the existing GitHub repository.
We also have other code bundles from our rich catalog of books and videos available
at IUUQT HJUIVC DPN 1BDLU1VCMJTIJOH . Check them out!
[ 3 ]