万本电子书0元读

万本电子书0元读

顶部广告

Kali Linux CTF Blueprints电子书

售       价:¥

127人正在读 | 0人评论 6.2

作       者:Cameron Buchanan

出  版  社:Packt Publishing

出版时间:2014-07-24

字       数:120.8万

所属分类: 进口书 > 外文原版书 > 电脑/网络

温馨提示:数字商品不支持退换货,不提供源文件,不支持导出打印

为你推荐

  • 读书简介
  • 目录
  • 累计评论(0条)
  • 读书简介
  • 目录
  • 累计评论(0条)
Taking a highly practical approach and a playful tone, Kali Linux CTF Blueprints provides step-by-step guides to setting up vulnerabilities, in-depth guidance to exploiting them, and a variety of advice and ideas to build and customize your own challenges. If you are a penetration testing team leader or individual who wishes to challenge yourself or your friends in the creation of penetration testing assault courses, this is the book for you. The book assumes a basic level of penetration skills and familiarity with the Kali Linux operating system.
目录展开

Kali Linux CTF Blueprints

Table of Contents

Kali Linux CTF Blueprints

Credits

About the Author

About the Reviewers

www.PacktPub.com

Support files, eBooks, discount offers, and more

Why subscribe?

Free access for Packt account holders

Preface

What this book covers

What you need for this book

Who this book is for

Reading guide

A warning

Conventions

Reader feedback

Customer support

Downloading the example code

Errata

Piracy

Questions

1. Microsoft Environments

Creating a vulnerable machine

Securing a machine

Creating a secure network

Basic requirements

Setting up a Linux network

Setting up a Windows network

Hosting vulnerabilities

Scenario 1 – warming Adobe ColdFusion

Setup

Variations

Scenario 2 – making a mess with MSSQL

Setup

Variations

Scenario 3 – trivializing TFTP

Vulnerabilities

Flag placement and design

Testing your flags

Making the flag too easy

Making your finding too hard

Alternate ideas

Post-exploitation and pivoting

Exploitation guides

Scenario 1 – traverse the directories like it ain't no thing

Scenario 2 – your database is bad and you should feel bad

Scenario 3 – TFTP is holier than the Pope

Challenge modes

Summary

2. Linux Environments

Differences between Linux and Microsoft

The setup

Scenario 1 – learn Samba and other dance forms

Setup

Configuration

Testing

Variations

Information disclosure

File upload

Scenario 2 – turning on a LAMP

Setup

The PHP

Variations

Out-of-date versions

Login bypass

SQL injection

Dangerous PHP

PHPMyAdmin

Scenario 3 – destructible distros

Setup

Variations

Scenario 4 – tearing it up with Telnet

Setup

Variations

Default credentials

Buffer overflows

Flag placement and design

Exploitation guides

Scenario 1 – smashing Samba

Scenario 2 – exploiting XAMPP

Scenario 3 – like a privilege

Scenario 4 – tampering with Telnet

Summary

3. Wireless and Mobile

Wireless environment setup

Software

Hardware

Scenario 1 – WEP, that's me done for the day

Code setup

Network setup

Scenario 2 – WPA-2

Setup

Scenario 3 – pick up the phone

Setup

Important things to remember

Exploitation guides

Scenario 1 – rescue the WEP key

Scenario 2 – potentiating partial passwords

Scenario 3.1 – be a geodude with geotagging

Scenario 3.2 – ghost in the machine or man in the middle

Scenario 3.3 – DNS spoof your friends for fun and profit

Summary

4. Social Engineering

Scenario 1 – maxss your haxss

Code setup

Scenario 2 – social engineering: do no evil

Setup

Variations

Scenario 3 – hunting rabbits

Core principles

Potential avenues

Connecting methods

Creating an OSINT target

Scenario 4 – I am a Stegosaurus

Visual steganography

Exploitation guides

Scenario 1 – cookie theft for fun and profit

Scenario 2 – social engineering tips

Scenario 3 – exploitation guide

Scenario 4 – exploitation guide

Summary

5. Cryptographic Projects

Crypto jargon

Scenario 1 – encode-ageddon

Generic encoding types

Random encoding types

Scenario 2 – encode + Python = merry hell

Setup

Substitution cipher variations

Scenario 3 – RC4, my god, what are you doing?

Setup

Implementations

Scenario 4 – Hishashin

Setup

Hashing variations

Scenario 5 – because Heartbleed didn't get enough publicity as it is

Setup

Variations

Exploitation guides

Scenario 1 – decode-alypse now

Scenario 2 – trans subs and other things that look awkward in your history

Automatic methods

Scenario 3 – was that a 1 or a 0 or a 1?

Scenario 4 – hash outside of Colorado

Scenario 5 – bleeding hearts

Summary

6. Red Teaming

Chapter guide

Scoring systems

Setting scenarios

Reporting

Reporting example

Reporting explanation

CTF-style variations

DEFCON game

Physical components

Attack and defense

Jeopardy

Scenario 1 – ladders, why did it have to be ladders?

Network diagram

Brief

Setting up virtual machines

DMZ

missileman

secret1

secret2

secret3

Attack guide

Variations

Dummy devices

Combined OSINT trail

The missile base scenario summary

Scenario 2 – that's no network, it's a space station

Network diagram

Brief

Setting up a basic network

Attack of the clones

Customizing cloned VMs

Workstation1

Workstation2

Workstation3

Workstation4

Workstation5

Attack guide

Variations

The network base scenario summary

Summary

A. Appendix

Further reading

Recommended competitions

Existing vulnerable VMs

Index

累计评论(0条) 0个书友正在讨论这本书 发表评论

发表评论

发表评论,分享你的想法吧!

买过这本书的人还买过

读了这本书的人还在读

回顶部