eBooks-it.org Logo
eBooks-IT.org Inner Image

Kali Linux CTF Blueprints

Kali Linux CTF Blueprints Image

Book Details:

Publisher:Packt Publishing
Series: Packt , Blueprints
Author:Cameron Buchanan
Edition:1
ISBN-10:1783985984
ISBN-13:9781783985982
Pages:243
Published:Jul 24 2014
Posted:Nov 19 2014
Language:English
Book format:PDF
Book size:3.48 MB

Book Description:

Build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linux Overview Put the skills of the experts to the test with these tough and customisable pentesting projects Develop each challenge to suit your specific training, testing, or client engagement needs Hone your skills, from wireless attacks to social engineering, without the need to access live systems In Detail As attackers develop more effective and complex ways to compromise computerized systems, penetration testing skills and tools are in high demand. A tester must have varied skills to combat these threats or fall behind. This book provides practical and customizable guides to set up a variety of exciting challenge projects that can then be tested with Kali Linux. Learn how to create, customize, and exploit penetration testing scenarios and assault courses. Start by building flawed fortresses for Windows and Linux servers, allowing your testers to exploit common and not-so-common vulnerabilities to break down the gates and storm the walls. Mimic the human element with practical examples of social engineering projects. Facilitate vulnerable wireless and mobile installations and cryptographic weaknesses, and replicate the Heartbleed vulnerability. Finally, combine your skills and work to create a full red-team assessment environment that mimics the sort of corporate network encountered in the field. What you will learn from this book Set up vulnerable services for both Windows and Linux Create dummy accounts for social engineering manipulation Set up Heartbleed replication for vulnerable SSL servers Develop full-size labs to challenge current and potential testers Construct scenarios that can be applied to Capture the Flag style challenges Add physical components to your scenarios and fire USB missile launchers at your opponents Challenge your own projects with a best-practice exploit guide to each scenario Approach Taking a highly practical approach and a playful tone, Kali Linux CTF Blueprints provides step-by-step guides to setting up vulnerabilities, in-depth guidance to exploiting them, and a variety of advice and ideas to build and customize your own challenges. Who this book is written for If you are a penetration testing team leader or individual who wishes to challenge yourself or your friends in the creation of penetration testing assault courses, this is the book for you. The book assumes a basic level of penetration skills and familiarity with the Kali Linux operating system.

Download Link:

Related Books:

Kali Linux Social Engineering

Kali Linux Social Engineering Image
Effectively perform effi cient and organized social engineering tests and penetration testing using Kali Linux Overview Learn about various attacks and tips and tricks to avoid them Get a grip on efficient ways to perform penetration testing. Use advanced techniques to bypass security controls and remain hidden while performing social engineering testing In Detail Kali Linux has a specific toolkit that incorporates numerous social-engineering attacks all into one simplified interface. The main purpose of SET (social engineering toolkit) is to automate and improve on many of the social engineering attacks currently out there. This book is based on current advanced social engineering attacks using SET that help you learn how security can be breached ...

Web Penetration Testing with Kali Linux

Web Penetration Testing with Kali Linux Image
A practical guide to implementing penetration testing strategies on websites, web applications, and standard web protocols with Kali Linux Overview Learn key reconnaissance concepts needed as a penetration tester Attack and exploit key features, authentication, and sessions on web applications Learn how to protect systems, write reports, and sell web penetration testing services In Detail Kali Linux is built for professional penetration testing and security auditing. It is the next-generation of BackTrack, the most popular open-source penetration toolkit in the world. Readers will learn how to think like real attackers, exploit systems, and expose vulnerabilities. Even though web applications are developed in a very secure environment and have an ...

Kali Linux

Assuring Security By Penetration Testing
Kali Linux Image
2nd Edition
Master the art of penetration testing with Kali Linux Overview Learn penetration testing techniques with an in-depth coverage of Kali Linux distribution Explore the insights and importance of testing your corporate network systems before the hackers strike Understand the practical spectrum of security tools by their exemplary usage, configuration, and benefits In Detail Kali Linux is a comprehensive penetration testing platform with advanced tools to identify, detect, and exploit the vulnerabilities uncovered in the target network environment. With Kali Linux, you can apply appropriate testing methodology with defined business objectives and a sche...



2007 - 2021 © eBooks-IT.org