- Kali Linux CTF Blueprints
- Cameron Buchanan
- 197字
- 2021-12-08 12:34:31
Hosting vulnerabilities
The choice of vulnerability to host is one of the more difficult parts when it comes to making challenges. If the vulnerability is too easy, the challengers will tear through it; however, if the vulnerability is too hard, the majority of the target audience are alienated. To resolve this, I've provided some suggestions of vulnerabilities to host, marked for difficulty of setup and difficulty of exploitation. For reference, the following descriptions of difficulties are provided:
- The following are the various levels in difficulty of setup:
- Simple – This level of difficulty requires installation of the affected software
- Moderate – This level of difficulty requires installation of the affected software on a specific operating system
- Complex – This level of difficulty requires installation and configuration of the affected software on, specific operating system
- The following are the various levels in difficulty of exploitation:
- Simple – This level of difficulty requires the use of out-of-the-box tools
- Moderate – This level of difficulty requires configuration and the use of out-of-the-box tools or simple scripting to perform exploits
- Complex – This level of difficulty requires the creation of complex scripts, else it is not supported by common exploitation tools
推薦閱讀
- Mobile Forensics Cookbook
- Practical Network Scanning
- INSTANT Burp Suite Starter
- 工業控制網絡安全技術
- 數字化轉型浪潮下的數據安全最佳實踐指南
- 移動APT:威脅情報分析與數據防護
- 博弈論與數據安全
- 捍衛隱私
- 網絡攻防實戰研究:MySQL數據庫安全
- 網絡空間安全實戰基礎
- 黑客攻防從入門到精通:黑客與反黑客工具篇(第2版)
- 從實踐中學習Nmap滲透測試
- CPK通向賽博安全之路:理論與實踐CPK Solution to Cyber Security:Theory and Practice
- Hands-On Bug Hunting for Penetration Testers
- CCNA Security 210-260 Certification Guide