A book like this would not be possible without many years of dedicated work on the part of the information security community. The tools and techniques discussed throughout this book are some of the ones my col-leagues and I use regularly on engagements, and they’ve been developed through the combined efforts of pentesters and other security experts all over the world