Cargando…

Kali Linux CTF Blueprints /

In Detail As attackers develop more effective and complex ways to compromise computerized systems, penetration testing skills and tools are in high demand. A tester must have varied skills to combat these threats or fall behind. This book provides practical and customizable guides to set up a variet...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Buchanan, Cameron
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Birmingham : Packt Publishing, 2014.
Colección:Community experience distilled.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 a 4500
001 EBOOKCENTRAL_ocn885020720
003 OCoLC
005 20240329122006.0
006 m o d
007 cr cnu---unuuu
008 140801s2014 enk ob 001 0 eng d
040 |a IDEBK  |b eng  |e pn  |c IDEBK  |d EBLCP  |d N$T  |d E7B  |d DEBSZ  |d OCLCQ  |d YDXCP  |d COO  |d OCLCO  |d OCLCF  |d OCLCQ  |d TEFOD  |d OCLCQ  |d FEM  |d AGLDB  |d OCLCQ  |d ICA  |d OCLCQ  |d XFH  |d ZCU  |d MERUC  |d OCLCQ  |d D6H  |d OCLCQ  |d VTS  |d ICG  |d AU@  |d OCLCQ  |d STF  |d DKC  |d OCLCQ  |d AJS  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCQ 
019 |a 968014808  |a 969012870 
020 |a 9781783985999  |q (electronic bk.) 
020 |a 1783985992  |q (electronic bk.) 
020 |a 1322006776  |q (electronic bk.) 
020 |a 9781322006772  |q (electronic bk.) 
020 |z 9781783985982 
020 |z 1783985984 
029 1 |a AU@  |b 000062545538 
029 1 |a CHNEW  |b 000689779 
029 1 |a CHNEW  |b 000689781 
029 1 |a CHNEW  |b 000887591 
029 1 |a CHVBK  |b 374465088 
029 1 |a DEBBG  |b BV043609258 
029 1 |a DEBSZ  |b 410546267 
029 1 |a DEBSZ  |b 484726471 
029 1 |a AU@  |b 000067106395 
035 |a (OCoLC)885020720  |z (OCoLC)968014808  |z (OCoLC)969012870 
037 |a B0858E96-BE71-4C7D-93BC-AA7DF473AEBB  |b OverDrive, Inc.  |n http://www.overdrive.com 
050 4 |a QA76.9.A25 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Buchanan, Cameron. 
245 1 0 |a Kali Linux CTF Blueprints /  |c Cameron Buchanan. 
260 |a Birmingham :  |b Packt Publishing,  |c 2014. 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |2 rda 
490 1 |a Community Experience Distilled 
588 0 |a Print version record. 
504 |a Includes bibliographical references at the end of each chapters and index. 
520 |a In Detail As attackers develop more effective and complex ways to compromise computerized systems, penetration testing skills and tools are in high demand. A tester must have varied skills to combat these threats or fall behind. This book provides practical and customizable guides to set up a variety of exciting challenge projects that can then be tested with Kali Linux. Learn how to create, customize, and exploit penetration testing scenarios and assault courses. Start by building flawed fortresses for Windows and Linux servers, allowing your testers to exploit common and not-so-common vulnerabilities to break down the gates and storm the walls. Mimic the human element with practical examples of social engineering projects. Facilitate vulnerable wireless and mobile installations and cryptographic weaknesses, and replicate the Heartbleed vulnerability. Finally, combine your skills and work to create a full red-team assessment environment that mimics the sort of corporate network encountered in the field. Approach Taking a highly practical approach and a playful tone, Kali Linux CTF Blueprints provides step-by-step guides to setting up vulnerabilities, in-depth guidance to exploiting them, and a variety of advice and ideas to build and customize your own challenges. Who this book is for If you are a penetration testing team leader or individual who wishes to challenge yourself or your friends in the creation of penetration testing assault courses, this is the book for you. The book assumes a basic level of penetration skills and familiarity with the Kali Linux operating system. 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
650 0 |a Penetration testing (Computer security) 
650 0 |a Computer networks  |x Security measures. 
650 6 |a Tests d'intrusion. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Penetration testing (Computer security)  |2 fast 
776 0 8 |i Print version:  |a Buchanan, Cameron.  |t Kali Linux CTF Blueprints.  |d Packt Publishing 2014  |z 1322006776 
830 0 |a Community experience distilled. 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=1688607  |z Texto completo 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL1688607 
938 |a ebrary  |b EBRY  |n ebr10900535 
938 |a EBSCOhost  |b EBSC  |n 818808 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n cis28704064 
938 |a YBP Library Services  |b YANK  |n 12009603 
994 |a 92  |b IZTAP