To get the most out of this book
While many of the tools mentioned throughout this book are services commonly found online, we do utilize several pieces of software. When we examine software, it's advisable to run the software in virtualized environments, using software such as VirtualBox. Specifically, in the instances where we mention software usage, the basic requirements are as follows:
If you are using the digital version of this book, we advise you to type the code yourself or access the code from the book's GitHub repository (a link is available in the next section). Doing so will help you avoid any potential errors related to the copying and pasting of code.
All of the examples used throughout this book use free-to-use accounts on commonly available threat intelligence tools, such as RiskIQ's PassiveTotal. In cases where there is additional paid-for functionality in those tools, such as advanced search features, we ensure that it's mentioned.