官术网_书友最值得收藏!

  • Kali Linux CTF Blueprints
  • Cameron Buchanan
  • 123字
  • 2021-12-08 12:34:30

A warning

This book is based around the creation of vulnerable machines that are to be exploited in controlled environments. The methods contained for exploitation are of industry standard and are therefore well known. Please follow the ensuing rules:

  • Do not host any vulnerable software on Internet-facing machines; you will get pregnant and you will die.
  • Do not use a computer that is used for daily usage as a target. Exploitation can permanently damage machines and personal files can be lost. Your parents/spouse/children will not forgive you easily if you lose their cherished documents.
  • Do not use personal passwords or credentials on test devices. Even without being the target, they can be inadvertently exposed to testers and used for mischievous or malicious purposes.
主站蜘蛛池模板: 天镇县| 荔浦县| 织金县| 商都县| 金山区| 芦溪县| 清镇市| 和平区| 开化县| 永州市| 湖南省| 老河口市| 浦县| 青州市| 揭西县| 勃利县| 东山县| 英山县| 弋阳县| 鲜城| 绥德县| 泰兴市| 武川县| 温泉县| 佛坪县| 宁津县| 清水河县| 儋州市| 瓦房店市| 石景山区| 鄱阳县| 深州市| 施秉县| 同江市| 武穴市| 阿勒泰市| 揭阳市| 申扎县| 华容县| 龙胜| 宁德市|