官术网_书友最值得收藏!

Chapter 1. Microsoft Environments

It makes sense to kick off this book with the most prevalent operating system in business. I'm sure the majority of penetration testers will agree that though both Linux and Windows have their benefits, the industry still falls heavily on Microsoft to provide the brunt of servers. Microsoft has provided testers with some of the most reliable vulnerabilities over the years, and I know that I'm always happy to see an MS reference whenever a scan completes.

By the end of the chapter, you should know at least three types of scenarios and have some idea about how to vary them for repeated tests. The chapter will aim to be as interactive as possible and follow-through as much as possible. In detail, we will cover the following topics:

  • The creation of basic vulnerable machines
  • A selection of suggestions for vulnerabilities to host
  • In-depth setup of a vulnerable Adobe ColdFusion installation
  • In-depth setup of a misconfigured MSSQL server
  • In-depth setup of TFTP
  • Flag setup and variations
  • Post-exploitation and pivot options
  • Exploitation guide for all three scenarios
主站蜘蛛池模板: 汉中市| 达孜县| 重庆市| 临夏县| 西和县| 孝感市| 永济市| 呼图壁县| 甘谷县| 内黄县| 闵行区| 桑日县| 胶南市| 道孚县| 安丘市| 白水县| 庆云县| 蓝田县| 平原县| 拜城县| 南康市| 祁东县| 水城县| 车险| 泗洪县| 邵阳市| 平邑县| 旌德县| 桓台县| 龙游县| 濮阳县| 苍山县| 永年县| 南汇区| 西藏| 岢岚县| 精河县| 武川县| 任丘市| 盐池县| 城市|