官术网_书友最值得收藏!

What this book covers

Chapter 1, Microsoft Environments, contains instructions to create vulnerable servers and desktops, covers the most prevalent vulnerabilities, and contains suggestions on more complicated scenarios for advanced users of Microsoft environments.

Chapter 2, Linux Environments, similar to the first chapter, is focused on generating generic vulnerabilities in Linux environments, providing the basic concepts of CTF creation along with suggestions for more advanced setups.

Chapter 3, Wireless and Mobile, contains projects targeting Wi-Fi-enabled devices, including a section specifically targeting portable devices such as tablets and smartphones.

Chapter 4, Social Engineering, contains scenarios ranging from the creation of XSS attackable pages to unmask online personas through social media and e-mail accounts.

Chapter 5, Cryptographic Projects, contains attacks against encryption deployments such as flawed encryption, deciphering encoded text, and replication of the well-known Heartbleed attack.

Chapter 6, Red Teaming, contains two full-scale vulnerable deployments designed to test all areas covered in the previous chapters, mimicking corporate environments encountered across the world.

Appendix, covers references to various books for further reading, blogs, competitions, conferences, and so on.

主站蜘蛛池模板: 深州市| 阳西县| 禄丰县| 新营市| 苏尼特右旗| 静宁县| 阿勒泰市| 旅游| 富平县| 西和县| 大渡口区| 鹤峰县| 陆河县| 岳西县| 榆中县| 遂宁市| 濮阳县| 巴林右旗| 玛纳斯县| 林口县| 门头沟区| 白玉县| 永安市| 波密县| 金门县| 百色市| 元氏县| 十堰市| 平罗县| 修水县| 蒲城县| 北辰区| 无极县| 抚顺县| 焉耆| 廉江市| 行唐县| 山阴县| 铜鼓县| 凌云县| 高邮市|