Technical requirements
To follow the examples in the first part of this chapter, you will need SSH access to a server running a Moodle instance, and site administration access to this Moodle instance. In the second part of this chapter, we will be using a version of Linux that comes pre-installed with a wide variety of cybersecurity testing tools called Kali Linux. Given the types of tools this contains and the nature of what they can do – for good or ill – Kali Linux is best installed as a sandboxed virtual machine (VM). Details on how to install Kali Linux are given later in this chapter, in the Using Kali Linux section.