舉報

會員
Kali Linux CTF Blueprints
最新章節:
Index
Takingahighlypracticalapproachandaplayfultone,KaliLinuxCTFBlueprintsprovidesstep-by-stepguidestosettingupvulnerabilities,in-depthguidancetoexploitingthem,andavarietyofadviceandideastobuildandcustomizeyourownchallenges.Ifyouareapenetrationtestingteamleaderorindividualwhowishestochallengeyourselforyourfriendsinthecreationofpenetrationtestingassaultcourses,thisisthebookforyou.ThebookassumesabasiclevelofpenetrationskillsandfamiliaritywiththeKaliLinuxoperatingsystem.
目錄(72章)
倒序
- 封面
- 版權頁
- Credits
- About the Author
- About the Reviewers
- www.PacktPub.com
- Support files eBooks discount offers and more
- Preface
- What this book covers
- What you need for this book
- Who this book is for
- Reading guide
- A warning
- Conventions
- Reader feedback
- Customer support
- Chapter 1. Microsoft Environments
- Creating a vulnerable machine
- Creating a secure network
- Hosting vulnerabilities
- Scenario 1 – warming Adobe ColdFusion
- Scenario 2 – making a mess with MSSQL
- Scenario 3 – trivializing TFTP
- Flag placement and design
- Post-exploitation and pivoting
- Exploitation guides
- Challenge modes
- Summary
- Chapter 2. Linux Environments
- Differences between Linux and Microsoft
- Scenario 1 – learn Samba and other dance forms
- Scenario 2 – turning on a LAMP
- Scenario 3 – destructible distros
- Scenario 4 – tearing it up with Telnet
- Flag placement and design
- Exploitation guides
- Summary
- Chapter 3. Wireless and Mobile
- Wireless environment setup
- Scenario 1 – WEP that's me done for the day
- Scenario 2 – WPA-2
- Scenario 3 – pick up the phone
- Exploitation guides
- Summary
- Chapter 4. Social Engineering
- Scenario 1 – maxss your haxss
- Scenario 2 – social engineering: do no evil
- Scenario 3 – hunting rabbits
- Scenario 4 – I am a Stegosaurus
- Exploitation guides
- Summary
- Chapter 5. Cryptographic Projects
- Crypto jargon
- Scenario 1 – encode-ageddon
- Scenario 2 – encode + Python = merry hell
- Scenario 3 – RC4 my god what are you doing?
- Scenario 4 – Hishashin
- Scenario 5 – because Heartbleed didn't get enough publicity as it is
- Exploitation guides
- Summary
- Chapter 6. Red Teaming
- Chapter guide
- Scoring systems
- Setting scenarios
- Reporting
- CTF-style variations
- Scenario 1 – ladders why did it have to be ladders?
- Scenario 2 – that's no network it's a space station
- Summary
- Appendix A. Appendix
- Further reading
- Index 更新時間:2021-12-08 12:34:46
推薦閱讀
- unidbg逆向工程:原理與實踐
- 科技安全:戰略實踐與展望
- Metasploit Penetration Testing Cookbook(Third Edition)
- 黑客攻防與電腦安全從新手到高手(微視頻+火力升級版)
- 代碼審計:企業級Web代碼安全架構
- .NET安全攻防指南(上冊)
- 局域網交換機安全
- 數據安全與流通:技術、架構與實踐
- 持續集成:軟件質量改進和風險降低之道
- 黑客攻防實戰從入門到精通
- Bug Bounty Hunting Essentials
- Mastering Linux Security and Hardening
- 云計算安全防護技術
- 黑客攻防從入門到精通:實戰篇(第2版)
- 2010年中國互聯網網絡安全報告
- 數據中心安全防護技術
- 0day安全
- Hands-On Application Penetration Testing with Burp Suite
- 云安全實用指南
- Burp Suite Essentials
- Active Directory Administration Cookbook
- Hands-On Web Penetration Testing with Metasploit
- 威脅建模:安全設計中的風險識別和規避
- Microsoft Forefront Identity Manager 2010 R2 Handbook
- 計算機網絡安全
- 大模型安全、監管與合規
- 信息系統等級保護安全建設技術方案設計實現與應用
- Kali Linux Intrusion and Exploitation Cookbook
- 身邊的網絡安全:互聯網時代的生活安全攻略
- 互聯網安全建設從0到1