- Kali Linux CTF Blueprints
- Cameron Buchanan
- 123字
- 2021-12-08 12:34:30
A warning
This book is based around the creation of vulnerable machines that are to be exploited in controlled environments. The methods contained for exploitation are of industry standard and are therefore well known. Please follow the ensuing rules:
- Do not host any vulnerable software on Internet-facing machines; you will get pregnant and you will die.
- Do not use a computer that is used for daily usage as a target. Exploitation can permanently damage machines and personal files can be lost. Your parents/spouse/children will not forgive you easily if you lose their cherished documents.
- Do not use personal passwords or credentials on test devices. Even without being the target, they can be inadvertently exposed to testers and used for mischievous or malicious purposes.
推薦閱讀
- 云原生安全:攻防實踐與體系構建
- Web漏洞分析與防范實戰(zhàn):卷1
- 工業(yè)互聯(lián)網(wǎng)安全防護與展望
- 網(wǎng)絡空間攻防技術原理
- 網(wǎng)絡安全保障能力研究
- 等級保護測評理論及應用
- Testing and Securing Android Studio Applications
- 云原生安全與DevOps保障
- Falco云原生安全:Falco原理、實踐與擴展
- Web安全之深度學習實戰(zhàn)
- Learning Pentesting for Android Devices
- Mastering Python for Networking and Security
- 捍衛(wèi)隱私
- 黑客攻防從入門到精通:命令版
- 聯(lián)邦學習原理與算法