舉報

會員
Kali Linux CTF Blueprints
最新章節:
Index
Takingahighlypracticalapproachandaplayfultone,KaliLinuxCTFBlueprintsprovidesstep-by-stepguidestosettingupvulnerabilities,in-depthguidancetoexploitingthem,andavarietyofadviceandideastobuildandcustomizeyourownchallenges.Ifyouareapenetrationtestingteamleaderorindividualwhowishestochallengeyourselforyourfriendsinthecreationofpenetrationtestingassaultcourses,thisisthebookforyou.ThebookassumesabasiclevelofpenetrationskillsandfamiliaritywiththeKaliLinuxoperatingsystem.
目錄(72章)
倒序
- 封面
- 版權頁
- Credits
- About the Author
- About the Reviewers
- www.PacktPub.com
- Support files eBooks discount offers and more
- Preface
- What this book covers
- What you need for this book
- Who this book is for
- Reading guide
- A warning
- Conventions
- Reader feedback
- Customer support
- Chapter 1. Microsoft Environments
- Creating a vulnerable machine
- Creating a secure network
- Hosting vulnerabilities
- Scenario 1 – warming Adobe ColdFusion
- Scenario 2 – making a mess with MSSQL
- Scenario 3 – trivializing TFTP
- Flag placement and design
- Post-exploitation and pivoting
- Exploitation guides
- Challenge modes
- Summary
- Chapter 2. Linux Environments
- Differences between Linux and Microsoft
- Scenario 1 – learn Samba and other dance forms
- Scenario 2 – turning on a LAMP
- Scenario 3 – destructible distros
- Scenario 4 – tearing it up with Telnet
- Flag placement and design
- Exploitation guides
- Summary
- Chapter 3. Wireless and Mobile
- Wireless environment setup
- Scenario 1 – WEP that's me done for the day
- Scenario 2 – WPA-2
- Scenario 3 – pick up the phone
- Exploitation guides
- Summary
- Chapter 4. Social Engineering
- Scenario 1 – maxss your haxss
- Scenario 2 – social engineering: do no evil
- Scenario 3 – hunting rabbits
- Scenario 4 – I am a Stegosaurus
- Exploitation guides
- Summary
- Chapter 5. Cryptographic Projects
- Crypto jargon
- Scenario 1 – encode-ageddon
- Scenario 2 – encode + Python = merry hell
- Scenario 3 – RC4 my god what are you doing?
- Scenario 4 – Hishashin
- Scenario 5 – because Heartbleed didn't get enough publicity as it is
- Exploitation guides
- Summary
- Chapter 6. Red Teaming
- Chapter guide
- Scoring systems
- Setting scenarios
- Reporting
- CTF-style variations
- Scenario 1 – ladders why did it have to be ladders?
- Scenario 2 – that's no network it's a space station
- Summary
- Appendix A. Appendix
- Further reading
- Index 更新時間:2021-12-08 12:34:46
推薦閱讀
- 數字身份與元宇宙信任治理
- 零信任網絡:在不可信網絡中構建安全系統
- 網絡空間安全:管理者讀物
- Preventing Digital Extortion
- Applied Network Security
- Computer Forensics with FTK
- CTF競賽權威指南(Pwn篇)
- 解密數據恢復
- CTF那些事兒
- 先進云安全研究與實踐
- End to End GUI Development with Qt5
- 空間群組密鑰管理研究:基于自主的深空DTN密鑰管理
- 隱私計算:推進數據“可用不可見”的關鍵技術
- 交換機·路由器·防火墻(第2版)
- Practical Mobile Forensics
- 云計算安全技術與應用
- 零信任安全從入門到精通
- 網絡安全技術及應用實踐教程
- Hack-A-Sat太空信息安全挑戰賽深度題解
- Linux安全實戰
- 商用密碼發展報告(2012—2017年)
- 云安全實用指南
- 從實踐中學習Nessus與OpenVAS漏洞掃描
- Kali Linux Network Scanning Cookbook
- 大模型安全、監管與合規
- 可信計算標準導論
- FreeRTOS內核實現與應用開發實戰指南:基于STM32
- 密碼技術與物聯網安全:mbedtls開發實戰
- 網絡安全態勢感知:提取、理解和預測
- 網絡安全防御技術與實踐