Kali Linux CTF Blueprints

2019-09-17 21:24:21 1 3173
As attackers develop more effective and complex ways to compromise computerized systems, penetration testing skills and tools are in high demand. A tester must have varied skills to combat these threats or fall behind. This book provides practical and customizable guides to set up a variety of exciting challenge projects that can then be tested with Kali Linux.

Learn how to create, customize, and exploit penetration testing scenarios and assault courses. Start by building flawed fortresses for Windows and Linux servers, allowing your testers to exploit common and not-so-common vulnerabilities to break down the gates and storm the walls. Mimic the human element with practical examples of social engineering projects. Facilitate vulnerable wireless and mobile installations and cryptographic weaknesses, and replicate the Heartbleed vulnerability. Finally, combine your skills and work to create a full red-team assessment environment that mimics the sort of corporate network encountered in the field.

What You Will Learn

    Set up vulnerable services for both Windows and Linux
    Create dummy accounts for social engineering manipulation
    Set up Heartbleed replication for vulnerable SSL servers
    Develop full-size labs to challenge current and potential testers
    Construct scenarios that can be applied to Capture the Flag style challenges
    Add physical components to your scenarios and fire USB missile launchers at your opponents
    Challenge your own projects with a best-practice exploit guide to each scenario


关于作者

whoami69篇文章108篇回复

勤快的搬运工。

评论1次

要评论?请先  登录  或  注册