- Kali Linux CTF Blueprints
- Cameron Buchanan
- 176字
- 2021-12-08 12:34:29
What this book covers
Chapter 1, Microsoft Environments, contains instructions to create vulnerable servers and desktops, covers the most prevalent vulnerabilities, and contains suggestions on more complicated scenarios for advanced users of Microsoft environments.
Chapter 2, Linux Environments, similar to the first chapter, is focused on generating generic vulnerabilities in Linux environments, providing the basic concepts of CTF creation along with suggestions for more advanced setups.
Chapter 3, Wireless and Mobile, contains projects targeting Wi-Fi-enabled devices, including a section specifically targeting portable devices such as tablets and smartphones.
Chapter 4, Social Engineering, contains scenarios ranging from the creation of XSS attackable pages to unmask online personas through social media and e-mail accounts.
Chapter 5, Cryptographic Projects, contains attacks against encryption deployments such as flawed encryption, deciphering encoded text, and replication of the well-known Heartbleed attack.
Chapter 6, Red Teaming, contains two full-scale vulnerable deployments designed to test all areas covered in the previous chapters, mimicking corporate environments encountered across the world.
Appendix, covers references to various books for further reading, blogs, competitions, conferences, and so on.
- Node Security
- 數(shù)字身份與元宇宙信任治理
- Kali Linux Social Engineering
- Penetration Testing with Perl
- 計(jì)算機(jī)病毒原理與防范(第2版)
- Testing and Securing Android Studio Applications
- Computer Forensics with FTK
- Falco云原生安全:Falco原理、實(shí)踐與擴(kuò)展
- 軟件安全保障體系架構(gòu)
- Advanced Penetration Testing for Highly:Secured Environments(Second Edition)
- 網(wǎng)絡(luò)用戶行為的安全可信分析與控制
- 網(wǎng)絡(luò)安全態(tài)勢(shì)感知
- 實(shí)用黑客攻防技術(shù)
- Metasploit 5.0 for Beginners
- Developing Applications with Salesforce Chatter