The preceding resources will be installed on a variety of different methods that are beyond the scope of this book. But I will quickly mention some of the deployment options:
- Virtual machines that, can be installed in VirtualBox
- Scripts that can be run on standard Linux machines to build applications and make them specifically vulnerable to attacks
- Resources that you may attack over the internet
- Complete self contained hacking environments
Please ensure that as you are working with these sites, you read carefully the terms of service and understand all requirements and limitations of the environment or tools you are working with. Also be careful if you are remotely hacking sites across the internet. Although there are some ...