官术网_书友最值得收藏!

  • Kali Linux CTF Blueprints
  • Cameron Buchanan
  • 123字
  • 2021-12-08 12:34:30

A warning

This book is based around the creation of vulnerable machines that are to be exploited in controlled environments. The methods contained for exploitation are of industry standard and are therefore well known. Please follow the ensuing rules:

  • Do not host any vulnerable software on Internet-facing machines; you will get pregnant and you will die.
  • Do not use a computer that is used for daily usage as a target. Exploitation can permanently damage machines and personal files can be lost. Your parents/spouse/children will not forgive you easily if you lose their cherished documents.
  • Do not use personal passwords or credentials on test devices. Even without being the target, they can be inadvertently exposed to testers and used for mischievous or malicious purposes.
主站蜘蛛池模板: 靖安县| 宝山区| 吉林市| 嘉鱼县| 宁海县| 高尔夫| 报价| 元谋县| 十堰市| 固安县| 客服| 玛曲县| 太湖县| 宜君县| 茶陵县| 淄博市| 东源县| 昌黎县| 浮梁县| 淳安县| 稷山县| 潞城市| 邹城市| 江陵县| 大姚县| 云梦县| 昌邑市| 桃园县| 富平县| 漯河市| 余姚市| 文昌市| 丹阳市| 镇沅| 乐都县| 郓城县| 瑞安市| 武汉市| 河北区| 广州市| 镇雄县|