Kali LInux CTF blueprints: build, test, and customize your own Capture the Flag challenges across mulitiple platforms designed to be attacked with Kali Linux
Build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linux In Detail As attackers develop more effective and complex ways to compromise computerized systems, penetration testing skills and tools are in high demand. A tester must...
Saved in:
Main Author: | |
---|---|
Format: | Electronic eBook |
Language: | English |
Published: |
Birmingham, UK
Packt Pub.
2014
|
Series: | Community experience distilled
|
Subjects: | |
Links: | https://learning.oreilly.com/library/view/-/9781783985982/?ar |
Summary: | Build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linux In Detail As attackers develop more effective and complex ways to compromise computerized systems, penetration testing skills and tools are in high demand. A tester must have varied skills to combat these threats or fall behind. This book provides practical and customizable guides to set up a variety of exciting challenge projects that can then be tested with Kali Linux. Learn how to create, customize, and exploit penetration testing scenarios and assault courses. Start by building flawed fortresses for Windows and Linux servers, allowing your testers to exploit common and not-so-common vulnerabilities to break down the gates and storm the walls. Mimic the human element with practical examples of social engineering projects. Facilitate vulnerable wireless and mobile installations and cryptographic weaknesses, and replicate the Heartbleed vulnerability. Finally, combine your skills and work to create a full red-team assessment environment that mimics the sort of corporate network encountered in the field. What You Will Learn Set up vulnerable services for both Windows and Linux Create dummy accounts for social engineering manipulation Set up Heartbleed replication for vulnerable SSL servers Develop full-size labs to challenge current and potential testers Construct scenarios that can be applied to Capture the Flag style challenges Add physical components to your scenarios and fire USB missile launchers at your opponents Challenge your own projects with a best-practice exploit guide to each scenario. |
Item Description: | Includes bibliographical references at the end of each chapters and index. - Online resource; title from cover image (Safari, viewed August 12, 2014) |
Physical Description: | 1 online resource (1 volume) illustrations |
ISBN: | 9781783985999 1783985992 1783985984 9781783985982 |
Staff View
MARC
LEADER | 00000cam a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047688017 | ||
003 | DE-627-1 | ||
005 | 20240228115624.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2014 xx |||||o 00| ||eng c | ||
020 | |a 9781783985999 |9 978-1-78398-599-9 | ||
020 | |a 1783985992 |9 1-78398-599-2 | ||
020 | |a 1783985984 |9 1-78398-598-4 | ||
020 | |a 9781783985982 |9 978-1-78398-598-2 | ||
020 | |a 9781783985982 |9 978-1-78398-598-2 | ||
035 | |a (DE-627-1)047688017 | ||
035 | |a (DE-599)KEP047688017 | ||
035 | |a (ORHE)9781783985982 | ||
035 | |a (DE-627-1)047688017 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.8 |2 23 | |
100 | 1 | |a Buchanan, Cameron |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Kali LInux CTF blueprints |b build, test, and customize your own Capture the Flag challenges across mulitiple platforms designed to be attacked with Kali Linux |c Cameron Buchanan |
264 | 1 | |a Birmingham, UK |b Packt Pub. |c 2014 | |
300 | |a 1 online resource (1 volume) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
490 | 0 | |a Community experience distilled | |
500 | |a Includes bibliographical references at the end of each chapters and index. - Online resource; title from cover image (Safari, viewed August 12, 2014) | ||
520 | |a Build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linux In Detail As attackers develop more effective and complex ways to compromise computerized systems, penetration testing skills and tools are in high demand. A tester must have varied skills to combat these threats or fall behind. This book provides practical and customizable guides to set up a variety of exciting challenge projects that can then be tested with Kali Linux. Learn how to create, customize, and exploit penetration testing scenarios and assault courses. Start by building flawed fortresses for Windows and Linux servers, allowing your testers to exploit common and not-so-common vulnerabilities to break down the gates and storm the walls. Mimic the human element with practical examples of social engineering projects. Facilitate vulnerable wireless and mobile installations and cryptographic weaknesses, and replicate the Heartbleed vulnerability. Finally, combine your skills and work to create a full red-team assessment environment that mimics the sort of corporate network encountered in the field. What You Will Learn Set up vulnerable services for both Windows and Linux Create dummy accounts for social engineering manipulation Set up Heartbleed replication for vulnerable SSL servers Develop full-size labs to challenge current and potential testers Construct scenarios that can be applied to Capture the Flag style challenges Add physical components to your scenarios and fire USB missile launchers at your opponents Challenge your own projects with a best-practice exploit guide to each scenario. | ||
546 | |a English. | ||
650 | 0 | |a Penetration testing (Computer security) | |
650 | 0 | |a Computer networks | |
650 | 0 | |a Linux device drivers (Computer programs) | |
650 | 0 | |a Open source software | |
650 | 4 | |a Tests d'intrusion | |
650 | 4 | |a Réseaux d'ordinateurs | |
650 | 4 | |a Pilotes de périphérique pour Linux (Logiciels) | |
650 | 4 | |a Logiciels libres | |
650 | 4 | |a COMPUTERS ; Security ; Networking | |
650 | 4 | |a COMPUTERS ; Security ; Online Safety & Privacy | |
650 | 4 | |a COMPUTERS ; Programming ; Open Source | |
650 | 4 | |a Computer networks | |
650 | 4 | |a Linux device drivers (Computer programs) | |
650 | 4 | |a Open source software | |
650 | 4 | |a Penetration testing (Computer security) | |
776 | 1 | |z 9781783985982 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781783985982 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781783985982/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Record in the Search Index
DE-BY-TUM_katkey | ZDB-30-ORH-047688017 |
---|---|
_version_ | 1833357069809352704 |
adam_text | |
any_adam_object | |
author | Buchanan, Cameron |
author_facet | Buchanan, Cameron |
author_role | aut |
author_sort | Buchanan, Cameron |
author_variant | c b cb |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047688017 (DE-599)KEP047688017 (ORHE)9781783985982 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04025cam a22006132c 4500</leader><controlfield tag="001">ZDB-30-ORH-047688017</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228115624.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2014 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781783985999</subfield><subfield code="9">978-1-78398-599-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1783985992</subfield><subfield code="9">1-78398-599-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1783985984</subfield><subfield code="9">1-78398-598-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781783985982</subfield><subfield code="9">978-1-78398-598-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781783985982</subfield><subfield code="9">978-1-78398-598-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047688017</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047688017</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781783985982</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047688017</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Buchanan, Cameron</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Kali LInux CTF blueprints</subfield><subfield code="b">build, test, and customize your own Capture the Flag challenges across mulitiple platforms designed to be attacked with Kali Linux</subfield><subfield code="c">Cameron Buchanan</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham, UK</subfield><subfield code="b">Packt Pub.</subfield><subfield code="c">2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (1 volume)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Community experience distilled</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references at the end of each chapters and index. - Online resource; title from cover image (Safari, viewed August 12, 2014)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linux In Detail As attackers develop more effective and complex ways to compromise computerized systems, penetration testing skills and tools are in high demand. A tester must have varied skills to combat these threats or fall behind. This book provides practical and customizable guides to set up a variety of exciting challenge projects that can then be tested with Kali Linux. Learn how to create, customize, and exploit penetration testing scenarios and assault courses. Start by building flawed fortresses for Windows and Linux servers, allowing your testers to exploit common and not-so-common vulnerabilities to break down the gates and storm the walls. Mimic the human element with practical examples of social engineering projects. Facilitate vulnerable wireless and mobile installations and cryptographic weaknesses, and replicate the Heartbleed vulnerability. Finally, combine your skills and work to create a full red-team assessment environment that mimics the sort of corporate network encountered in the field. What You Will Learn Set up vulnerable services for both Windows and Linux Create dummy accounts for social engineering manipulation Set up Heartbleed replication for vulnerable SSL servers Develop full-size labs to challenge current and potential testers Construct scenarios that can be applied to Capture the Flag style challenges Add physical components to your scenarios and fire USB missile launchers at your opponents Challenge your own projects with a best-practice exploit guide to each scenario.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Penetration testing (Computer security)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Linux device drivers (Computer programs)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Open source software</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Tests d'intrusion</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Pilotes de périphérique pour Linux (Logiciels)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Logiciels libres</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Security ; Networking</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Security ; Online Safety & Privacy</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Programming ; Open Source</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Linux device drivers (Computer programs)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Open source software</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Penetration testing (Computer security)</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9781783985982</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781783985982</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781783985982/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047688017 |
illustrated | Illustrated |
indexdate | 2025-05-28T09:45:50Z |
institution | BVB |
isbn | 9781783985999 1783985992 1783985984 9781783985982 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 online resource (1 volume) illustrations |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Packt Pub. |
record_format | marc |
series2 | Community experience distilled |
spelling | Buchanan, Cameron VerfasserIn aut Kali LInux CTF blueprints build, test, and customize your own Capture the Flag challenges across mulitiple platforms designed to be attacked with Kali Linux Cameron Buchanan Birmingham, UK Packt Pub. 2014 1 online resource (1 volume) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Community experience distilled Includes bibliographical references at the end of each chapters and index. - Online resource; title from cover image (Safari, viewed August 12, 2014) Build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linux In Detail As attackers develop more effective and complex ways to compromise computerized systems, penetration testing skills and tools are in high demand. A tester must have varied skills to combat these threats or fall behind. This book provides practical and customizable guides to set up a variety of exciting challenge projects that can then be tested with Kali Linux. Learn how to create, customize, and exploit penetration testing scenarios and assault courses. Start by building flawed fortresses for Windows and Linux servers, allowing your testers to exploit common and not-so-common vulnerabilities to break down the gates and storm the walls. Mimic the human element with practical examples of social engineering projects. Facilitate vulnerable wireless and mobile installations and cryptographic weaknesses, and replicate the Heartbleed vulnerability. Finally, combine your skills and work to create a full red-team assessment environment that mimics the sort of corporate network encountered in the field. What You Will Learn Set up vulnerable services for both Windows and Linux Create dummy accounts for social engineering manipulation Set up Heartbleed replication for vulnerable SSL servers Develop full-size labs to challenge current and potential testers Construct scenarios that can be applied to Capture the Flag style challenges Add physical components to your scenarios and fire USB missile launchers at your opponents Challenge your own projects with a best-practice exploit guide to each scenario. English. Penetration testing (Computer security) Computer networks Linux device drivers (Computer programs) Open source software Tests d'intrusion Réseaux d'ordinateurs Pilotes de périphérique pour Linux (Logiciels) Logiciels libres COMPUTERS ; Security ; Networking COMPUTERS ; Security ; Online Safety & Privacy COMPUTERS ; Programming ; Open Source 9781783985982 Erscheint auch als Druck-Ausgabe 9781783985982 |
spellingShingle | Buchanan, Cameron Kali LInux CTF blueprints build, test, and customize your own Capture the Flag challenges across mulitiple platforms designed to be attacked with Kali Linux Penetration testing (Computer security) Computer networks Linux device drivers (Computer programs) Open source software Tests d'intrusion Réseaux d'ordinateurs Pilotes de périphérique pour Linux (Logiciels) Logiciels libres COMPUTERS ; Security ; Networking COMPUTERS ; Security ; Online Safety & Privacy COMPUTERS ; Programming ; Open Source |
title | Kali LInux CTF blueprints build, test, and customize your own Capture the Flag challenges across mulitiple platforms designed to be attacked with Kali Linux |
title_auth | Kali LInux CTF blueprints build, test, and customize your own Capture the Flag challenges across mulitiple platforms designed to be attacked with Kali Linux |
title_exact_search | Kali LInux CTF blueprints build, test, and customize your own Capture the Flag challenges across mulitiple platforms designed to be attacked with Kali Linux |
title_full | Kali LInux CTF blueprints build, test, and customize your own Capture the Flag challenges across mulitiple platforms designed to be attacked with Kali Linux Cameron Buchanan |
title_fullStr | Kali LInux CTF blueprints build, test, and customize your own Capture the Flag challenges across mulitiple platforms designed to be attacked with Kali Linux Cameron Buchanan |
title_full_unstemmed | Kali LInux CTF blueprints build, test, and customize your own Capture the Flag challenges across mulitiple platforms designed to be attacked with Kali Linux Cameron Buchanan |
title_short | Kali LInux CTF blueprints |
title_sort | kali linux ctf blueprints build test and customize your own capture the flag challenges across mulitiple platforms designed to be attacked with kali linux |
title_sub | build, test, and customize your own Capture the Flag challenges across mulitiple platforms designed to be attacked with Kali Linux |
topic | Penetration testing (Computer security) Computer networks Linux device drivers (Computer programs) Open source software Tests d'intrusion Réseaux d'ordinateurs Pilotes de périphérique pour Linux (Logiciels) Logiciels libres COMPUTERS ; Security ; Networking COMPUTERS ; Security ; Online Safety & Privacy COMPUTERS ; Programming ; Open Source |
topic_facet | Penetration testing (Computer security) Computer networks Linux device drivers (Computer programs) Open source software Tests d'intrusion Réseaux d'ordinateurs Pilotes de périphérique pour Linux (Logiciels) Logiciels libres COMPUTERS ; Security ; Networking COMPUTERS ; Security ; Online Safety & Privacy COMPUTERS ; Programming ; Open Source |
work_keys_str_mv | AT buchanancameron kalilinuxctfblueprintsbuildtestandcustomizeyourowncapturetheflagchallengesacrossmulitipleplatformsdesignedtobeattackedwithkalilinux |