Book description
Build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linux
In Detail
As attackers develop more effective and complex ways to compromise computerized systems, penetration testing skills and tools are in high demand. A tester must have varied skills to combat these threats or fall behind. This book provides practical and customizable guides to set up a variety of exciting challenge projects that can then be tested with Kali Linux.
Learn how to create, customize, and exploit penetration testing scenarios and assault courses. Start by building flawed fortresses for Windows and Linux servers, allowing your testers to exploit common and not-so-common vulnerabilities to break down the gates and storm the walls. Mimic the human element with practical examples of social engineering projects. Facilitate vulnerable wireless and mobile installations and cryptographic weaknesses, and replicate the Heartbleed vulnerability. Finally, combine your skills and work to create a full red-team assessment environment that mimics the sort of corporate network encountered in the field.
What You Will Learn
- Set up vulnerable services for both Windows and Linux
- Create dummy accounts for social engineering manipulation
- Set up Heartbleed replication for vulnerable SSL servers
- Develop full-size labs to challenge current and potential testers
- Construct scenarios that can be applied to Capture the Flag style challenges
- Add physical components to your scenarios and fire USB missile launchers at your opponents
- Challenge your own projects with a best-practice exploit guide to each scenario
Table of contents
-
Kali Linux CTF Blueprints
- Kali Linux CTF Blueprints
- Credits
- About the Author
- About the Reviewers
- www.PacktPub.com
- Preface
- Table of Contents
- 1. Microsoft Environments
- 2. Linux Environments
- 3. Wireless and Mobile
- 4. Social Engineering
- 5. Cryptographic Projects
- 6. Red Teaming
- A. Appendix
- Index
Product information
- Title: Kali Linux CTF Blueprints
- Author(s):
- Release date: July 2014
- Publisher(s): Packt Publishing
- ISBN: 9781783985982
You might also like
book
Hands-On Penetration Testing on Windows
Master the art of identifying vulnerabilities within the Windows OS and develop the desired solutions for …
book
Windows Forensics and Incident Recovery
Praise for Windows Forensics and Incident Recovery " Windows Forensics and Incident Recovery doesn't just discuss …
book
Human Fatigue Risk Management
Human Fatigue Risk Management: Improving Safety in the Chemical Processing Industry teaches users everything they need …
book
Metasploit
"The best guide to the Metasploit Framework."HD Moore, Founder of the Metasploit Project The Metasploit Framework …