- Kali Linux CTF Blueprints
- Cameron Buchanan
- 176字
- 2021-12-08 12:34:29
What this book covers
Chapter 1, Microsoft Environments, contains instructions to create vulnerable servers and desktops, covers the most prevalent vulnerabilities, and contains suggestions on more complicated scenarios for advanced users of Microsoft environments.
Chapter 2, Linux Environments, similar to the first chapter, is focused on generating generic vulnerabilities in Linux environments, providing the basic concepts of CTF creation along with suggestions for more advanced setups.
Chapter 3, Wireless and Mobile, contains projects targeting Wi-Fi-enabled devices, including a section specifically targeting portable devices such as tablets and smartphones.
Chapter 4, Social Engineering, contains scenarios ranging from the creation of XSS attackable pages to unmask online personas through social media and e-mail accounts.
Chapter 5, Cryptographic Projects, contains attacks against encryption deployments such as flawed encryption, deciphering encoded text, and replication of the well-known Heartbleed attack.
Chapter 6, Red Teaming, contains two full-scale vulnerable deployments designed to test all areas covered in the previous chapters, mimicking corporate environments encountered across the world.
Appendix, covers references to various books for further reading, blogs, competitions, conferences, and so on.
- 網(wǎng)絡(luò)安全與管理
- 為你護航:網(wǎng)絡(luò)空間安全科普讀本(第2版)
- 黑客攻防與電腦安全從新手到高手(微視頻+火力升級版)
- Getting Started with FortiGate
- 走進新安全:讀懂網(wǎng)絡(luò)安全威脅、技術(shù)與新思想
- Penetration Testing with Perl
- Computer Forensics with FTK
- 網(wǎng)絡(luò)運維親歷記 (網(wǎng)絡(luò)運維紀實文學)
- ARM匯編與逆向工程:藍狐卷·基礎(chǔ)知識
- 隱私計算
- 數(shù)據(jù)安全領(lǐng)域指南
- Web安全之深度學習實戰(zhàn)
- INSTANT Apple Configurator How-to
- Bug Bounty Hunting Essentials
- 華為Anti-DDoS技術(shù)漫談