- Kali Linux CTF Blueprints
- Cameron Buchanan
- 393字
- 2021-12-08 12:34:31
Creating a vulnerable machine
The purpose of this book may seem counterintuitive to the majority of practices that security professionals carry out each day, but most core ideas to create a secure machine are the same as those to create a vulnerable machine.
Servers can be thought of as being created to serve a specific purpose—for example, to provide DNS services, host an Exchange environment, or manage a domain. This idea can be applied to the practice of hosting vulnerable services as well. The aim is to expose the server in one very particular way and secure it in every other aspect. You may treat them as authentication methods for the overthinking masochists of the world if you wish; that may help you envision the end result a little more clearly. To that end, the following tenets should be abided by:
- Unless the scenario aims require it, ensure that any other services that you require to run on the system are fully patched and up to date.
- Unless the scenario requires it, a proper antivirus solution with a firewall should be in place to secure other services.
- Run the scenario on a separate network to any production or sensitive systems. This is quite simple to achieve by setting up a new network on a LAN connection without Internet access or through the use of virtual machines.
Securing a machine
Virtual or physical, your machine needs to be secure, and there's a simple process to achieve this. Build a fresh operating system. This is easy with a LiveCD when you have a spare Windows OS, but that's not always possible. At the time of this writing, TechNet provides 180-day accounts of the Windows operating system for testing purposes ( Microsoft Developer Network (MSDN) account, which will enable you to set up multiple environments for testing purposes.
Note
At this point, if you're aiming to host a vulnerable Windows product, don't perform the following step.
So, you have a fresh install—what now? Ensure everything is up to date. As you don't have anything other than the OS installed, you should just run Start | Search | Windows Update. Let it run, finish, and restart. Have a look through your build and remove any unnecessary programs that may have come with the install. You are now working with a clean slate. Wonderful.
- 云原生安全:攻防實(shí)踐與體系構(gòu)建
- 信息安全導(dǎo)論(在線實(shí)驗(yàn)+在線自測(cè))
- SASE原理、架構(gòu)與實(shí)踐
- 工業(yè)互聯(lián)網(wǎng)安全防護(hù)與展望
- Metasploit Penetration Testing Cookbook(Second Edition)
- Kali Linux CTF Blueprints
- 安全實(shí)戰(zhàn)之滲透測(cè)試
- 反黑命令與攻防從新手到高手(微課超值版)
- CTF特訓(xùn)營(yíng):技術(shù)詳解、解題方法與競(jìng)賽技巧
- 黑客攻防從入門到精通
- Mastering Python for Networking and Security
- 網(wǎng)絡(luò)空間安全:拒絕服務(wù)攻擊檢測(cè)與防御
- 信息內(nèi)容安全管理及應(yīng)用
- 黑客攻擊與防范實(shí)戰(zhàn)從入門到精通
- Practical Mobile Forensics