官术网_书友最值得收藏!

Chapter 1. Microsoft Environments

It makes sense to kick off this book with the most prevalent operating system in business. I'm sure the majority of penetration testers will agree that though both Linux and Windows have their benefits, the industry still falls heavily on Microsoft to provide the brunt of servers. Microsoft has provided testers with some of the most reliable vulnerabilities over the years, and I know that I'm always happy to see an MS reference whenever a scan completes.

By the end of the chapter, you should know at least three types of scenarios and have some idea about how to vary them for repeated tests. The chapter will aim to be as interactive as possible and follow-through as much as possible. In detail, we will cover the following topics:

  • The creation of basic vulnerable machines
  • A selection of suggestions for vulnerabilities to host
  • In-depth setup of a vulnerable Adobe ColdFusion installation
  • In-depth setup of a misconfigured MSSQL server
  • In-depth setup of TFTP
  • Flag setup and variations
  • Post-exploitation and pivot options
  • Exploitation guide for all three scenarios
主站蜘蛛池模板: 雷波县| 绍兴县| 股票| 惠州市| 清丰县| 芒康县| 南溪县| 台州市| 西盟| 淅川县| 正定县| 惠州市| 余江县| 河池市| 长海县| 巫溪县| 长宁区| 武鸣县| 二手房| 新乡市| 康保县| 建瓯市| 菏泽市| 松潘县| 紫金县| 汨罗市| 苗栗县| 富阳市| 丹江口市| 丹寨县| 兴文县| 东源县| 修水县| 灌阳县| 彭泽县| 康乐县| 两当县| 阳西县| 进贤县| 塔河县| 临潭县|