- Kali Linux CTF Blueprints
- Cameron Buchanan
- 123字
- 2021-12-08 12:34:30
A warning
This book is based around the creation of vulnerable machines that are to be exploited in controlled environments. The methods contained for exploitation are of industry standard and are therefore well known. Please follow the ensuing rules:
- Do not host any vulnerable software on Internet-facing machines; you will get pregnant and you will die.
- Do not use a computer that is used for daily usage as a target. Exploitation can permanently damage machines and personal files can be lost. Your parents/spouse/children will not forgive you easily if you lose their cherished documents.
- Do not use personal passwords or credentials on test devices. Even without being the target, they can be inadvertently exposed to testers and used for mischievous or malicious purposes.
推薦閱讀
- Node Security
- Extending Symfony2 Web Application Framework
- CTF實(shí)戰(zhàn):技術(shù)、解題與進(jìn)階
- Mobile Forensics Cookbook
- SASE原理、架構(gòu)與實(shí)踐
- Practical Network Scanning
- 網(wǎng)絡(luò)空間安全:管理者讀物
- Web安全與攻防入門很輕松(實(shí)戰(zhàn)超值版)
- 計(jì)算機(jī)病毒原理與防范(第2版)
- 可信計(jì)算3.0工程初步(第二版)
- 從實(shí)踐中學(xué)習(xí)密碼安全與防護(hù)
- 先進(jìn)云安全研究與實(shí)踐
- 黑客攻擊與防范實(shí)戰(zhàn)從入門到精通
- 信息內(nèi)容安全管理及應(yīng)用
- 黑客攻防從入門到精通:命令版