Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Kali Linux CTF Blueprints

Buy
Kali Linux CTF Blueprints, 9781783985982 (1783985984), Packt Publishing, 2014

Build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linux

About This Book

  • Put the skills of the experts to the test with these tough and customisable pentesting projects
  • Develop each challenge to suit your specific training, testing, or client engagement needs
  • Hone your skills, from wireless attacks to social engineering, without the need to access live systems

Who This Book Is For

If you are a penetration testing team leader or individual who wishes to challenge yourself or your friends in the creation of penetration testing assault courses, this is the book for you. The book assumes a basic level of penetration skills and familiarity with the Kali Linux operating system.

What You Will Learn

  • Set up vulnerable services for both Windows and Linux
  • Create dummy accounts for social engineering manipulation
  • Set up Heartbleed replication for vulnerable SSL servers
  • Develop full-size labs to challenge current and potential testers
  • Construct scenarios that can be applied to Capture the Flag style challenges
  • Add physical components to your scenarios and fire USB missile launchers at your opponents
  • Challenge your own projects with a best-practice exploit guide to each scenario

In Detail

As attackers develop more effective and complex ways to compromise computerized systems, penetration testing skills and tools are in high demand. A tester must have varied skills to combat these threats or fall behind. This book provides practical and customizable guides to set up a variety of exciting challenge projects that can then be tested with Kali Linux.

Learn how to create, customize, and exploit penetration testing scenarios and assault courses. Start by building flawed fortresses for Windows and Linux servers, allowing your testers to exploit common and not-so-common vulnerabilities to break down the gates and storm the walls. Mimic the human element with practical examples of social engineering projects. Facilitate vulnerable wireless and mobile installations and cryptographic weaknesses, and replicate the Heartbleed vulnerability. Finally, combine your skills and work to create a full red-team assessment environment that mimics the sort of corporate network encountered in the field.

(HTML tags aren't allowed.)

MCSE: Windows 2000 Network Infrastructure Design Study Guide
MCSE: Windows 2000 Network Infrastructure Design Study Guide

Here’s the book you need to prepare for Exam 70-221, Designing a Microsoft Windows 2000 Network Infrastructure:

  • Comprehensive and in-depth coverage of every exam objective
  • Practical information on designing a Windows 2000 network infrastructure...
Mechanical Testing of Bone and the Bone-Implant Interface
Mechanical Testing of Bone and the Bone-Implant Interface

The mechanical properties of whole bones, bone tissue, and the bone-implant interfaces are as important as their morphological and structural aspects. Mechanical Testing of Bone and the Bone-Implant Interface helps you assess these properties by explaining how to do mechanical testing of bone and the bone-implant interface for bone-related...

Mastering Gradle
Mastering Gradle

Master the technique of developing, migrating, and building automation using Gradle

About This Book

  • Create new plugins to get customized features to suit your needs
  • Build projects like Java, Scala, and web applications using Gradle
  • A step-by-step guide that will help you to...

Beginning Java Data Structures and Algorithms: Sharpen your problem solving skills by learning core computer science concepts in a pain-free manner
Beginning Java Data Structures and Algorithms: Sharpen your problem solving skills by learning core computer science concepts in a pain-free manner

Though your application serves its purpose, it might not be a high performer. Learn techniques to accurately predict code efficiency, easily dismiss inefficient solutions, and improve the performance of your application.

Key Features

  • Explains in detail different algorithms and data...
Fundamentals of Electric Propulsion: Ion and Hall Thrusters (JPL Space Science and Technology Series)
Fundamentals of Electric Propulsion: Ion and Hall Thrusters (JPL Space Science and Technology Series)

This important new book explains the fundamentals of electric propulsion for spacecraft and describes in detail the physics and characteristics of the two major electric thrusters in use today, ion and Hall thrusters. The authors provide an introduction to plasma physics in order to allow readers to understand the models and derivations used...

MCTS 70-662 Rapid Review: Configuring Microsoft Exchange Server 2010
MCTS 70-662 Rapid Review: Configuring Microsoft Exchange Server 2010
This Rapid Review is designed to help you assess—and complete—your readiness for MCTS exam 70-662: Microsoft Exchange Server 2010, Configuring. The Rapid Review series is intended for exam candidates who already have a solid grasp on the exam objectives through a combination of experience, skills, and...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy