官术网_书友最值得收藏!

What this book covers

Chapter 1, Microsoft Environments, contains instructions to create vulnerable servers and desktops, covers the most prevalent vulnerabilities, and contains suggestions on more complicated scenarios for advanced users of Microsoft environments.

Chapter 2, Linux Environments, similar to the first chapter, is focused on generating generic vulnerabilities in Linux environments, providing the basic concepts of CTF creation along with suggestions for more advanced setups.

Chapter 3, Wireless and Mobile, contains projects targeting Wi-Fi-enabled devices, including a section specifically targeting portable devices such as tablets and smartphones.

Chapter 4, Social Engineering, contains scenarios ranging from the creation of XSS attackable pages to unmask online personas through social media and e-mail accounts.

Chapter 5, Cryptographic Projects, contains attacks against encryption deployments such as flawed encryption, deciphering encoded text, and replication of the well-known Heartbleed attack.

Chapter 6, Red Teaming, contains two full-scale vulnerable deployments designed to test all areas covered in the previous chapters, mimicking corporate environments encountered across the world.

Appendix, covers references to various books for further reading, blogs, competitions, conferences, and so on.

主站蜘蛛池模板: 凤城市| 临颍县| 囊谦县| 四平市| 宜良县| 乐业县| 庆元县| 靖边县| 贵定县| 马公市| 新干县| 阜新市| 弥渡县| 临颍县| 吉木萨尔县| 邵阳县| 汝城县| 洛隆县| 安国市| 赤壁市| 廉江市| 固安县| 永嘉县| 象州县| 天柱县| 商南县| 准格尔旗| 太湖县| 汝南县| 新化县| 乌拉特中旗| 宣汉县| 锦州市| 东光县| 柘荣县| 思茅市| 霍林郭勒市| 正宁县| 靖安县| 普格县| 古浪县|