Kali Linux CTF Blueprints:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Birmingham
Packt Publishing
2014
|
Schriftenreihe: | Community experience distilled
|
Schlagworte: | |
Online-Zugang: | UBY01 |
Beschreibung: | Print version record |
Beschreibung: | 1 online resource |
ISBN: | 9781783985999 1783985992 1322006776 9781322006772 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV045350813 | ||
003 | DE-604 | ||
005 | 20191105 | ||
007 | cr|uuu---uuuuu | ||
008 | 181210s2014 |||| o||u| ||||||eng d | ||
020 | |a 9781783985999 |9 978-1-78398-599-9 | ||
020 | |a 1783985992 |9 1-78398-599-2 | ||
020 | |a 1322006776 |9 1-322-00677-6 | ||
020 | |a 9781322006772 |9 978-1-322-00677-2 | ||
035 | |a (ZDB-4-ITC)ocn885020720 | ||
035 | |a (OCoLC)885020720 | ||
035 | |a (DE-599)BVBBV045350813 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-706 | ||
082 | 0 | |a 005.8 |2 23 | |
100 | 1 | |a Buchanan, Cameron |e Verfasser |4 aut | |
245 | 1 | 0 | |a Kali Linux CTF Blueprints |c Cameron Buchanan |
264 | 1 | |a Birmingham |b Packt Publishing |c 2014 | |
300 | |a 1 online resource | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Community experience distilled | |
500 | |a Print version record | ||
505 | 8 | |a In Detail As attackers develop more effective and complex ways to compromise computerized systems, penetration testing skills and tools are in high demand. A tester must have varied skills to combat these threats or fall behind. This book provides practical and customizable guides to set up a variety of exciting challenge projects that can then be tested with Kali Linux. Learn how to create, customize, and exploit penetration testing scenarios and assault courses. Start by building flawed fortresses for Windows and Linux servers, allowing your testers to exploit common and not-so-common vulnerabilities to break down the gates and storm the walls. Mimic the human element with practical examples of social engineering projects. Facilitate vulnerable wireless and mobile installations and cryptographic weaknesses, and replicate the Heartbleed vulnerability. Finally, combine your skills and work to create a full red-team assessment environment that mimics the sort of corporate network encountered in the field. Approach Taking a highly practical approach and a playful tone, Kali Linux CTF Blueprints provides step-by-step guides to setting up vulnerabilities, in-depth guidance to exploiting them, and a variety of advice and ideas to build and customize your own challenges. Who this book is for If you are a penetration testing team leader or individual who wishes to challenge yourself or your friends in the creation of penetration testing assault courses, this is the book for you. The book assumes a basic level of penetration skills and familiarity with the Kali Linux operating system | |
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Computer networks / Security measures |2 fast | |
650 | 7 | |a Penetration testing (Computer security) |2 fast | |
650 | 7 | |a COMPUTERS. |2 bisac | |
650 | 7 | |a General |2 bisac | |
650 | 7 | |a Engineering & Applied Sciences |2 hilcc | |
650 | 7 | |a Computer Science |2 hilcc | |
650 | 4 | |a Penetration testing (Computer security) |a Computer networks |x Security measures | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |a Buchanan, Cameron |t Kali Linux CTF Blueprints |d Packt Publishing 2014 |z 1322006776 |
912 | |a ZDB-4-ITC | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-030737467 | ||
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=818808 |l UBY01 |p ZDB-4-ITC |q UBY_PDA_ITC_Kauf |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804179175739752448 |
---|---|
any_adam_object | |
author | Buchanan, Cameron |
author_facet | Buchanan, Cameron |
author_role | aut |
author_sort | Buchanan, Cameron |
author_variant | c b cb |
building | Verbundindex |
bvnumber | BV045350813 |
collection | ZDB-4-ITC |
contents | In Detail As attackers develop more effective and complex ways to compromise computerized systems, penetration testing skills and tools are in high demand. A tester must have varied skills to combat these threats or fall behind. This book provides practical and customizable guides to set up a variety of exciting challenge projects that can then be tested with Kali Linux. Learn how to create, customize, and exploit penetration testing scenarios and assault courses. Start by building flawed fortresses for Windows and Linux servers, allowing your testers to exploit common and not-so-common vulnerabilities to break down the gates and storm the walls. Mimic the human element with practical examples of social engineering projects. Facilitate vulnerable wireless and mobile installations and cryptographic weaknesses, and replicate the Heartbleed vulnerability. Finally, combine your skills and work to create a full red-team assessment environment that mimics the sort of corporate network encountered in the field. Approach Taking a highly practical approach and a playful tone, Kali Linux CTF Blueprints provides step-by-step guides to setting up vulnerabilities, in-depth guidance to exploiting them, and a variety of advice and ideas to build and customize your own challenges. Who this book is for If you are a penetration testing team leader or individual who wishes to challenge yourself or your friends in the creation of penetration testing assault courses, this is the book for you. The book assumes a basic level of penetration skills and familiarity with the Kali Linux operating system |
ctrlnum | (ZDB-4-ITC)ocn885020720 (OCoLC)885020720 (DE-599)BVBBV045350813 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03475nmm a2200505zc 4500</leader><controlfield tag="001">BV045350813</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20191105 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">181210s2014 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781783985999</subfield><subfield code="9">978-1-78398-599-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1783985992</subfield><subfield code="9">1-78398-599-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1322006776</subfield><subfield code="9">1-322-00677-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781322006772</subfield><subfield code="9">978-1-322-00677-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-4-ITC)ocn885020720</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)885020720</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV045350813</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Buchanan, Cameron</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Kali Linux CTF Blueprints</subfield><subfield code="c">Cameron Buchanan</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham</subfield><subfield code="b">Packt Publishing</subfield><subfield code="c">2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Community experience distilled</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Print version record</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">In Detail As attackers develop more effective and complex ways to compromise computerized systems, penetration testing skills and tools are in high demand. A tester must have varied skills to combat these threats or fall behind. This book provides practical and customizable guides to set up a variety of exciting challenge projects that can then be tested with Kali Linux. Learn how to create, customize, and exploit penetration testing scenarios and assault courses. Start by building flawed fortresses for Windows and Linux servers, allowing your testers to exploit common and not-so-common vulnerabilities to break down the gates and storm the walls. Mimic the human element with practical examples of social engineering projects. Facilitate vulnerable wireless and mobile installations and cryptographic weaknesses, and replicate the Heartbleed vulnerability. Finally, combine your skills and work to create a full red-team assessment environment that mimics the sort of corporate network encountered in the field. Approach Taking a highly practical approach and a playful tone, Kali Linux CTF Blueprints provides step-by-step guides to setting up vulnerabilities, in-depth guidance to exploiting them, and a variety of advice and ideas to build and customize your own challenges. Who this book is for If you are a penetration testing team leader or individual who wishes to challenge yourself or your friends in the creation of penetration testing assault courses, this is the book for you. The book assumes a basic level of penetration skills and familiarity with the Kali Linux operating system</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Penetration testing (Computer security)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS.</subfield><subfield code="2">bisac</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">General</subfield><subfield code="2">bisac</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Engineering & Applied Sciences</subfield><subfield code="2">hilcc</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer Science</subfield><subfield code="2">hilcc</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Penetration testing (Computer security)</subfield><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="a">Buchanan, Cameron</subfield><subfield code="t">Kali Linux CTF Blueprints</subfield><subfield code="d">Packt Publishing 2014</subfield><subfield code="z">1322006776</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-ITC</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030737467</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=818808</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-4-ITC</subfield><subfield code="q">UBY_PDA_ITC_Kauf</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV045350813 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T08:15:42Z |
institution | BVB |
isbn | 9781783985999 1783985992 1322006776 9781322006772 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030737467 |
oclc_num | 885020720 |
open_access_boolean | |
owner | DE-706 |
owner_facet | DE-706 |
physical | 1 online resource |
psigel | ZDB-4-ITC ZDB-4-ITC UBY_PDA_ITC_Kauf |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Packt Publishing |
record_format | marc |
series2 | Community experience distilled |
spelling | Buchanan, Cameron Verfasser aut Kali Linux CTF Blueprints Cameron Buchanan Birmingham Packt Publishing 2014 1 online resource txt rdacontent c rdamedia cr rdacarrier Community experience distilled Print version record In Detail As attackers develop more effective and complex ways to compromise computerized systems, penetration testing skills and tools are in high demand. A tester must have varied skills to combat these threats or fall behind. This book provides practical and customizable guides to set up a variety of exciting challenge projects that can then be tested with Kali Linux. Learn how to create, customize, and exploit penetration testing scenarios and assault courses. Start by building flawed fortresses for Windows and Linux servers, allowing your testers to exploit common and not-so-common vulnerabilities to break down the gates and storm the walls. Mimic the human element with practical examples of social engineering projects. Facilitate vulnerable wireless and mobile installations and cryptographic weaknesses, and replicate the Heartbleed vulnerability. Finally, combine your skills and work to create a full red-team assessment environment that mimics the sort of corporate network encountered in the field. Approach Taking a highly practical approach and a playful tone, Kali Linux CTF Blueprints provides step-by-step guides to setting up vulnerabilities, in-depth guidance to exploiting them, and a variety of advice and ideas to build and customize your own challenges. Who this book is for If you are a penetration testing team leader or individual who wishes to challenge yourself or your friends in the creation of penetration testing assault courses, this is the book for you. The book assumes a basic level of penetration skills and familiarity with the Kali Linux operating system COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Penetration testing (Computer security) fast COMPUTERS. bisac General bisac Engineering & Applied Sciences hilcc Computer Science hilcc Penetration testing (Computer security) Computer networks Security measures Erscheint auch als Druck-Ausgabe Buchanan, Cameron Kali Linux CTF Blueprints Packt Publishing 2014 1322006776 |
spellingShingle | Buchanan, Cameron Kali Linux CTF Blueprints In Detail As attackers develop more effective and complex ways to compromise computerized systems, penetration testing skills and tools are in high demand. A tester must have varied skills to combat these threats or fall behind. This book provides practical and customizable guides to set up a variety of exciting challenge projects that can then be tested with Kali Linux. Learn how to create, customize, and exploit penetration testing scenarios and assault courses. Start by building flawed fortresses for Windows and Linux servers, allowing your testers to exploit common and not-so-common vulnerabilities to break down the gates and storm the walls. Mimic the human element with practical examples of social engineering projects. Facilitate vulnerable wireless and mobile installations and cryptographic weaknesses, and replicate the Heartbleed vulnerability. Finally, combine your skills and work to create a full red-team assessment environment that mimics the sort of corporate network encountered in the field. Approach Taking a highly practical approach and a playful tone, Kali Linux CTF Blueprints provides step-by-step guides to setting up vulnerabilities, in-depth guidance to exploiting them, and a variety of advice and ideas to build and customize your own challenges. Who this book is for If you are a penetration testing team leader or individual who wishes to challenge yourself or your friends in the creation of penetration testing assault courses, this is the book for you. The book assumes a basic level of penetration skills and familiarity with the Kali Linux operating system COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Penetration testing (Computer security) fast COMPUTERS. bisac General bisac Engineering & Applied Sciences hilcc Computer Science hilcc Penetration testing (Computer security) Computer networks Security measures |
title | Kali Linux CTF Blueprints |
title_auth | Kali Linux CTF Blueprints |
title_exact_search | Kali Linux CTF Blueprints |
title_full | Kali Linux CTF Blueprints Cameron Buchanan |
title_fullStr | Kali Linux CTF Blueprints Cameron Buchanan |
title_full_unstemmed | Kali Linux CTF Blueprints Cameron Buchanan |
title_short | Kali Linux CTF Blueprints |
title_sort | kali linux ctf blueprints |
topic | COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Penetration testing (Computer security) fast COMPUTERS. bisac General bisac Engineering & Applied Sciences hilcc Computer Science hilcc Penetration testing (Computer security) Computer networks Security measures |
topic_facet | COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Computer networks / Security measures Penetration testing (Computer security) COMPUTERS. General Engineering & Applied Sciences Computer Science Penetration testing (Computer security) Computer networks Security measures |
work_keys_str_mv | AT buchanancameron kalilinuxctfblueprints |