Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Kali Linux CTF Blueprints

Buy
Kali Linux CTF Blueprints, 9781783985982 (1783985984), Packt Publishing, 2014

Build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linux

About This Book

  • Put the skills of the experts to the test with these tough and customisable pentesting projects
  • Develop each challenge to suit your specific training, testing, or client engagement needs
  • Hone your skills, from wireless attacks to social engineering, without the need to access live systems

Who This Book Is For

If you are a penetration testing team leader or individual who wishes to challenge yourself or your friends in the creation of penetration testing assault courses, this is the book for you. The book assumes a basic level of penetration skills and familiarity with the Kali Linux operating system.

What You Will Learn

  • Set up vulnerable services for both Windows and Linux
  • Create dummy accounts for social engineering manipulation
  • Set up Heartbleed replication for vulnerable SSL servers
  • Develop full-size labs to challenge current and potential testers
  • Construct scenarios that can be applied to Capture the Flag style challenges
  • Add physical components to your scenarios and fire USB missile launchers at your opponents
  • Challenge your own projects with a best-practice exploit guide to each scenario

In Detail

As attackers develop more effective and complex ways to compromise computerized systems, penetration testing skills and tools are in high demand. A tester must have varied skills to combat these threats or fall behind. This book provides practical and customizable guides to set up a variety of exciting challenge projects that can then be tested with Kali Linux.

Learn how to create, customize, and exploit penetration testing scenarios and assault courses. Start by building flawed fortresses for Windows and Linux servers, allowing your testers to exploit common and not-so-common vulnerabilities to break down the gates and storm the walls. Mimic the human element with practical examples of social engineering projects. Facilitate vulnerable wireless and mobile installations and cryptographic weaknesses, and replicate the Heartbleed vulnerability. Finally, combine your skills and work to create a full red-team assessment environment that mimics the sort of corporate network encountered in the field.

(HTML tags aren't allowed.)

Plastic Analysis and Design of Steel Structures
Plastic Analysis and Design of Steel Structures
Simple introduction to plastic analysis of complex steel structures

The plastic analysis method has been used extensively by engineers for designing steel structures. Simpler structures can be analyzed using the basic virtual work formulation, but more complex frames are evaluated with specialist computer software. This new
...
Gradle in Action
Gradle in Action

Summary

Gradle in Action is a comprehensive guide to end-to-end project automation with Gradle. Starting with the basics, this practical, easy-to-read book discusses how to build a full-fledged, real-world project. Along the way, it touches on advanced topics like testing, continuous integration, and...

Focus On Curves and Surfaces (Focus on Game Development)
Focus On Curves and Surfaces (Focus on Game Development)
This guide provides clear, practical explanations of curves and surfaces with the minimum of esoteric mathematical notation, making it far more accessible to work along with the material for a better understanding of the concepts.

This book is aimed at anyone
...

The Electrical Engineering Handbook, First Edition
The Electrical Engineering Handbook, First Edition
The purpose of The Electrical Engineering Handbook is to provide a comprehensive reference work covering the broad spectrum of electrical engineering in a single volume. It is written and developed for the practicing electrical engineers in industry, government, and academia. The goal is to provide the most up-to-date information in classical...
Enterprise Integration with WSO2 ESB
Enterprise Integration with WSO2 ESB

Over 15 recipes to calibrate seamless modularity to SOA and address commonly-faced enterprise integration challenges with a zero-code approach

Overview

  • Learn how to implement the mostly-used Enterprise Integration Patterns with WSO2 ESB
  • Discover how to integrate WSO2 ESB with FIX, HL7, and...
Professional Windows Workflow Foundation
Professional Windows Workflow Foundation

If you want to gain the skills to build Windows Workflow Foundation solutions, then this is the book for you. It provides you with a clear, practical guide on how to develop workflow-based software and integrate it into existing technology landscapes. Throughout the pages, you'll also find numerous real-world examples and sample code that...

©2019 LearnIT (support@pdfchm.net) - Privacy Policy