官术网_书友最值得收藏!

Hosting vulnerabilities

The choice of vulnerability to host is one of the more difficult parts when it comes to making challenges. If the vulnerability is too easy, the challengers will tear through it; however, if the vulnerability is too hard, the majority of the target audience are alienated. To resolve this, I've provided some suggestions of vulnerabilities to host, marked for difficulty of setup and difficulty of exploitation. For reference, the following descriptions of difficulties are provided:

  • The following are the various levels in difficulty of setup:
    • Simple – This level of difficulty requires installation of the affected software
    • Moderate – This level of difficulty requires installation of the affected software on a specific operating system
    • Complex – This level of difficulty requires installation and configuration of the affected software on, specific operating system
  • The following are the various levels in difficulty of exploitation:
    • Simple – This level of difficulty requires the use of out-of-the-box tools
    • Moderate – This level of difficulty requires configuration and the use of out-of-the-box tools or simple scripting to perform exploits
    • Complex – This level of difficulty requires the creation of complex scripts, else it is not supported by common exploitation tools
主站蜘蛛池模板: 织金县| 商水县| 松潘县| 南投县| 札达县| 蒙阴县| 家居| 买车| 乌兰浩特市| 武胜县| 米泉市| 天镇县| 安溪县| 五河县| 苍南县| 霍邱县| 东城区| 新巴尔虎左旗| 文安县| 郎溪县| 山阴县| 怀安县| 中西区| 师宗县| 盱眙县| 花莲市| 沾化县| 大厂| 宜丰县| 罗城| 闽侯县| 临颍县| 金堂县| 镇雄县| 海安县| 通山县| 札达县| 洪洞县| 大厂| 上虞市| 滦南县|