官术网_书友最值得收藏!

Hosting vulnerabilities

The choice of vulnerability to host is one of the more difficult parts when it comes to making challenges. If the vulnerability is too easy, the challengers will tear through it; however, if the vulnerability is too hard, the majority of the target audience are alienated. To resolve this, I've provided some suggestions of vulnerabilities to host, marked for difficulty of setup and difficulty of exploitation. For reference, the following descriptions of difficulties are provided:

  • The following are the various levels in difficulty of setup:
    • Simple – This level of difficulty requires installation of the affected software
    • Moderate – This level of difficulty requires installation of the affected software on a specific operating system
    • Complex – This level of difficulty requires installation and configuration of the affected software on, specific operating system
  • The following are the various levels in difficulty of exploitation:
    • Simple – This level of difficulty requires the use of out-of-the-box tools
    • Moderate – This level of difficulty requires configuration and the use of out-of-the-box tools or simple scripting to perform exploits
    • Complex – This level of difficulty requires the creation of complex scripts, else it is not supported by common exploitation tools
主站蜘蛛池模板: 巴塘县| 深州市| 策勒县| 昌吉市| 太仆寺旗| 苍梧县| 三河市| 濮阳县| 原阳县| 射洪县| 河西区| 定远县| 汕尾市| 枣阳市| 四川省| 察雅县| 临洮县| 如东县| 苍南县| 巧家县| 武义县| 滕州市| 东乡县| 嘉善县| 兴和县| 麦盖提县| 凉城县| 桃园县| 大姚县| 枝江市| 宜春市| 湖州市| 五峰| 阳信县| 吴旗县| 扶绥县| 通城县| 通榆县| 班玛县| 永福县| 收藏|