官术网_书友最值得收藏!

Chapter 1. Microsoft Environments

It makes sense to kick off this book with the most prevalent operating system in business. I'm sure the majority of penetration testers will agree that though both Linux and Windows have their benefits, the industry still falls heavily on Microsoft to provide the brunt of servers. Microsoft has provided testers with some of the most reliable vulnerabilities over the years, and I know that I'm always happy to see an MS reference whenever a scan completes.

By the end of the chapter, you should know at least three types of scenarios and have some idea about how to vary them for repeated tests. The chapter will aim to be as interactive as possible and follow-through as much as possible. In detail, we will cover the following topics:

  • The creation of basic vulnerable machines
  • A selection of suggestions for vulnerabilities to host
  • In-depth setup of a vulnerable Adobe ColdFusion installation
  • In-depth setup of a misconfigured MSSQL server
  • In-depth setup of TFTP
  • Flag setup and variations
  • Post-exploitation and pivot options
  • Exploitation guide for all three scenarios
主站蜘蛛池模板: 武冈市| 彰化市| 太仓市| 县级市| 宽甸| 沾益县| 潼南县| 凤山县| 新密市| 女性| 绿春县| 利辛县| 新龙县| 长乐市| 墨脱县| 原平市| 宁阳县| 新晃| 宝坻区| 贵溪市| 扎鲁特旗| 临澧县| 贡嘎县| 泰来县| 临海市| 高密市| 万州区| 习水县| 沿河| 海淀区| 罗山县| 巨野县| 洞口县| 海宁市| 马鞍山市| 瑞金市| 布尔津县| 枣强县| 洪雅县| 西青区| 宁都县|