LEADER 03693nam 2200637 450 001 9910813428903321 005 20200520144314.0 010 $a1-78398-599-2 035 $a(CKB)2550000001338642 035 $a(OCoLC)885020720 035 $a(CaPaEBR)ebrary10900535 035 $a(SSID)ssj0001375839 035 $a(PQKBManifestationID)11861612 035 $a(PQKBTitleCode)TC0001375839 035 $a(PQKBWorkID)11361211 035 $a(PQKB)11489649 035 $a(Au-PeEL)EBL1688607 035 $a(CaPaEBR)ebr10900535 035 $a(CaONFJC)MIL631928 035 $a(CaSebORM)9781783985982 035 $a(MiAaPQ)EBC1688607 035 $a(PPN)228032946 035 $a(EXLCZ)992550000001338642 100 $a20140809h20142014 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt 182 $cc 183 $acr 200 10$aKali Linux CTF Blueprints $ebuild, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linux /$fCameron Buchanan 205 $a1st edition 210 1$aBirmingham, England :$c[Packt] Publishing,$d2014. 210 4$dİ2014 215 $a1 online resource (190 p.) 225 1 $aCommunity Experience Distilled 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a1-78398-598-4 311 $a1-322-00677-6 320 $aIncludes bibliographical references at the end of each chapters and index. 330 $aBuild, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linux In Detail As attackers develop more effective and complex ways to compromise computerized systems, penetration testing skills and tools are in high demand. A tester must have varied skills to combat these threats or fall behind. This book provides practical and customizable guides to set up a variety of exciting challenge projects that can then be tested with Kali Linux. Learn how to create, customize, and exploit penetration testing scenarios and assault courses. Start by building flawed fortresses for Windows and Linux servers, allowing your testers to exploit common and not-so-common vulnerabilities to break down the gates and storm the walls. Mimic the human element with practical examples of social engineering projects. Facilitate vulnerable wireless and mobile installations and cryptographic weaknesses, and replicate the Heartbleed vulnerability. Finally, combine your skills and work to create a full red-team assessment environment that mimics the sort of corporate network encountered in the field. What You Will Learn Set up vulnerable services for both Windows and Linux Create dummy accounts for social engineering manipulation Set up Heartbleed replication for vulnerable SSL servers Develop full-size labs to challenge current and potential testers Construct scenarios that can be applied to Capture the Flag style challenges Add physical components to your scenarios and fire USB missile launchers at your opponents Challenge your own projects with a best-practice exploit guide to each scenario 410 0$aCommunity experience distilled. 606 $aComputer security 606 $aComputers$xAccess control 606 $aComputer networks$xSecurity measures 615 0$aComputer security. 615 0$aComputers$xAccess control. 615 0$aComputer networks$xSecurity measures. 676 $a005.8 700 $aBuchanan$b Cameron$01642074 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910813428903321 996 $aKali Linux CTF Blueprints$94012482 997 $aUNINA