Cargando…

Kali LInux CTF blueprints : build, test, and customize your own Capture the Flag challenges across mulitiple platforms designed to be attacked with Kali Linux /

Build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linux In Detail As attackers develop more effective and complex ways to compromise computerized systems, penetration testing skills and tools are in high demand. A tester must...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Buchanan, Cameron
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Birmingham, UK : Packt Pub., 2014.
Colección:Community experience distilled.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 a 4500
001 OR_ocn887752729
003 OCoLC
005 20231017213018.0
006 m o d
007 cr unu||||||||
008 140818s2014 enka ob 001 0 eng d
040 |a UMI  |b eng  |e pn  |c UMI  |d DEBBG  |d DEBSZ  |d OCLCQ  |d OCLCF  |d OCLCQ  |d LOA  |d AGLDB  |d K6U  |d CCO  |d PIFAG  |d FVL  |d OCLCQ  |d U3W  |d REB  |d D6H  |d STF  |d OCLCQ  |d CEF  |d NLE  |d INT  |d VT2  |d OCLCQ  |d UKMGB  |d G3B  |d WYU  |d TKN  |d OCLCQ  |d UAB  |d AU@  |d UKAHL  |d OCLCQ  |d QGK  |d OCLCO  |d OCLCQ  |d OCLCO 
016 7 |a 018007033  |2 Uk 
019 |a 1026461198  |a 1066672914  |a 1259069024 
020 |a 9781783985999 
020 |a 1783985992 
020 |a 1783985984 
020 |a 9781783985982 
020 |z 9781783985982 
029 1 |a DEBBG  |b BV042182422 
029 1 |a DEBSZ  |b 417231032 
029 1 |a GBVCP  |b 882733095 
029 1 |a UKMGB  |b 018007033 
035 |a (OCoLC)887752729  |z (OCoLC)1026461198  |z (OCoLC)1066672914  |z (OCoLC)1259069024 
037 |a CL0500000470  |b Safari Books Online 
050 4 |a QA76.9.A25  |b B83 2014 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Buchanan, Cameron. 
245 1 0 |a Kali LInux CTF blueprints :  |b build, test, and customize your own Capture the Flag challenges across mulitiple platforms designed to be attacked with Kali Linux /  |c Cameron Buchanan. 
246 3 |a Kali Linux capture the flag blueprints 
260 |a Birmingham, UK :  |b Packt Pub.,  |c 2014. 
300 |a 1 online resource (1 volume) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file 
490 1 |a Community experience distilled. 
588 0 |a Online resource; title from cover image (Safari, viewed August 12, 2014). 
504 |a Includes bibliographical references at the end of each chapters and index. 
520 |a Build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linux In Detail As attackers develop more effective and complex ways to compromise computerized systems, penetration testing skills and tools are in high demand. A tester must have varied skills to combat these threats or fall behind. This book provides practical and customizable guides to set up a variety of exciting challenge projects that can then be tested with Kali Linux. Learn how to create, customize, and exploit penetration testing scenarios and assault courses. Start by building flawed fortresses for Windows and Linux servers, allowing your testers to exploit common and not-so-common vulnerabilities to break down the gates and storm the walls. Mimic the human element with practical examples of social engineering projects. Facilitate vulnerable wireless and mobile installations and cryptographic weaknesses, and replicate the Heartbleed vulnerability. Finally, combine your skills and work to create a full red-team assessment environment that mimics the sort of corporate network encountered in the field. What You Will Learn Set up vulnerable services for both Windows and Linux Create dummy accounts for social engineering manipulation Set up Heartbleed replication for vulnerable SSL servers Develop full-size labs to challenge current and potential testers Construct scenarios that can be applied to Capture the Flag style challenges Add physical components to your scenarios and fire USB missile launchers at your opponents Challenge your own projects with a best-practice exploit guide to each scenario. 
546 |a English. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Penetration testing (Computer security) 
650 0 |a Computer networks. 
650 0 |a Linux device drivers (Computer programs) 
650 0 |a Open source software. 
650 6 |a Tests d'intrusion. 
650 6 |a Réseaux d'ordinateurs. 
650 6 |a Pilotes de périphérique pour Linux (Logiciels) 
650 6 |a Logiciels libres. 
650 7 |a COMPUTERS  |x Security  |x Networking.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x Online Safety & Privacy.  |2 bisacsh 
650 7 |a COMPUTERS  |x Programming  |x Open Source.  |2 bisacsh 
650 7 |a Computer networks  |2 fast 
650 7 |a Linux device drivers (Computer programs)  |2 fast 
650 7 |a Open source software  |2 fast 
650 7 |a Penetration testing (Computer security)  |2 fast 
776 0 8 |i Print version:  |a Buchanan, Cameron.  |t Kali Linux CTF Blueprints : build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linux.  |d Birmingham, England : [Packt] Publishing, ©2014  |h v, 172 pages  |k Community experience distilled.  |z 9781783985982 
830 0 |a Community experience distilled. 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781783985982/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Askews and Holts Library Services  |b ASKH  |n AH26942685 
994 |a 92  |b IZTAP