- Kali Linux CTF Blueprints
- Cameron Buchanan
- 181字
- 2021-12-08 12:34:31
Chapter 1. Microsoft Environments
It makes sense to kick off this book with the most prevalent operating system in business. I'm sure the majority of penetration testers will agree that though both Linux and Windows have their benefits, the industry still falls heavily on Microsoft to provide the brunt of servers. Microsoft has provided testers with some of the most reliable vulnerabilities over the years, and I know that I'm always happy to see an MS reference whenever a scan completes.
By the end of the chapter, you should know at least three types of scenarios and have some idea about how to vary them for repeated tests. The chapter will aim to be as interactive as possible and follow-through as much as possible. In detail, we will cover the following topics:
- The creation of basic vulnerable machines
- A selection of suggestions for vulnerabilities to host
- In-depth setup of a vulnerable Adobe ColdFusion installation
- In-depth setup of a misconfigured MSSQL server
- In-depth setup of TFTP
- Flag setup and variations
- Post-exploitation and pivot options
- Exploitation guide for all three scenarios
推薦閱讀
- RESTful Java Web Services Security
- 白話網絡安全2:網安戰略篇
- 黑客攻防與電腦安全從新手到高手(微視頻+火力升級版)
- 網絡安全保障能力研究
- 黑客攻防技巧
- 開發者的Web安全戒律:真實威脅與防御實踐
- 云原生安全與DevOps保障
- 局域網交換機安全
- Digital Forensics with Kali Linux
- 學電腦安全與病毒防范
- 網絡安全設計、配置與管理大全
- 信息安全等級保護測評與整改指導手冊
- 信息內容安全管理及應用
- 交換機·路由器·防火墻(第2版)
- CPK通向賽博安全之路:理論與實踐CPK Solution to Cyber Security:Theory and Practice