My Account Log in

4 options

Kali Linux CTF Blueprints : build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linux / Cameron Buchanan.

EBSCOhost Academic eBook Collection (North America) Available online

View online

Ebook Central Academic Complete Available online

View online

Ebook Central College Complete Available online

View online

O'Reilly Online Learning: Academic/Public Library Edition Available online

View online
Format:
Book
Author/Creator:
Buchanan, Cameron, author.
Series:
Community experience distilled.
Community Experience Distilled
Language:
English
Subjects (All):
Computer security.
Computers--Access control.
Computers.
Computer networks--Security measures.
Computer networks.
Physical Description:
1 online resource (190 p.)
Edition:
1st edition
Other Title:
Kali Linux capture the flag blueprints
Place of Publication:
Birmingham, England : [Packt] Publishing, 2014.
Language Note:
English
System Details:
text file
Summary:
Build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linux In Detail As attackers develop more effective and complex ways to compromise computerized systems, penetration testing skills and tools are in high demand. A tester must have varied skills to combat these threats or fall behind. This book provides practical and customizable guides to set up a variety of exciting challenge projects that can then be tested with Kali Linux. Learn how to create, customize, and exploit penetration testing scenarios and assault courses. Start by building flawed fortresses for Windows and Linux servers, allowing your testers to exploit common and not-so-common vulnerabilities to break down the gates and storm the walls. Mimic the human element with practical examples of social engineering projects. Facilitate vulnerable wireless and mobile installations and cryptographic weaknesses, and replicate the Heartbleed vulnerability. Finally, combine your skills and work to create a full red-team assessment environment that mimics the sort of corporate network encountered in the field. What You Will Learn Set up vulnerable services for both Windows and Linux Create dummy accounts for social engineering manipulation Set up Heartbleed replication for vulnerable SSL servers Develop full-size labs to challenge current and potential testers Construct scenarios that can be applied to Capture the Flag style challenges Add physical components to your scenarios and fire USB missile launchers at your opponents Challenge your own projects with a best-practice exploit guide to each scenario
Contents:
Intro
Kali Linux CTF Blueprints
Table of Contents
Credits
About the Author
About the Reviewers
www.PacktPub.com
Support files, eBooks, discount offers, and more
Why subscribe?
Free access for Packt account holders
Preface
What this book covers
What you need for this book
Who this book is for
Reading guide
A warning
Conventions
Reader feedback
Customer support
Downloading the example code
Errata
Piracy
Questions
1. Microsoft Environments
Creating a vulnerable machine
Securing a machine
Creating a secure network
Basic requirements
Setting up a Linux network
Setting up a Windows network
Hosting vulnerabilities
Scenario 1 - warming Adobe ColdFusion
Setup
Variations
Scenario 2 - making a mess with MSSQL
Scenario 3 - trivializing TFTP
Vulnerabilities
Flag placement and design
Testing your flags
Making the flag too easy
Making your finding too hard
Alternate ideas
Post-exploitation and pivoting
Exploitation guides
Scenario 1 - traverse the directories like it ain't no thing
Scenario 2 - your database is bad and you should feel bad
Scenario 3 - TFTP is holier than the Pope
Challenge modes
Summary
2. Linux Environments
Differences between Linux and Microsoft
The setup
Scenario 1 - learn Samba and other dance forms
Configuration
Testing
Information disclosure
File upload
Scenario 2 - turning on a LAMP
The PHP
Out-of-date versions
Login bypass
SQL injection
Dangerous PHP
PHPMyAdmin
Scenario 3 - destructible distros
Scenario 4 - tearing it up with Telnet
Default credentials
Buffer overflows
Flag placement and design.
Exploitation guides
Scenario 1 - smashing Samba
Scenario 2 - exploiting XAMPP
Scenario 3 - like a privilege
Scenario 4 - tampering with Telnet
3. Wireless and Mobile
Wireless environment setup
Software
Hardware
Scenario 1 - WEP, that's me done for the day
Code setup
Network setup
Scenario 2 - WPA-2
Scenario 3 - pick up the phone
Important things to remember
Scenario 1 - rescue the WEP key
Scenario 2 - potentiating partial passwords
Scenario 3.1 - be a geodude with geotagging
Scenario 3.2 - ghost in the machine or man in the middle
Scenario 3.3 - DNS spoof your friends for fun and profit
4. Social Engineering
Scenario 1 - maxss your haxss
Scenario 2 - social engineering: do no evil
Scenario 3 - hunting rabbits
Core principles
Potential avenues
Connecting methods
Creating an OSINT target
Scenario 4 - I am a Stegosaurus
Visual steganography
Scenario 1 - cookie theft for fun and profit
Scenario 2 - social engineering tips
Scenario 3 - exploitation guide
Scenario 4 - exploitation guide
5. Cryptographic Projects
Crypto jargon
Scenario 1 - encode-ageddon
Generic encoding types
Random encoding types
Scenario 2 - encode + Python = merry hell
Substitution cipher variations
Scenario 3 - RC4, my god, what are you doing?
Implementations
Scenario 4 - Hishashin
Hashing variations
Scenario 5 - because Heartbleed didn't get enough publicity as it is
Scenario 1 - decode-alypse now
Scenario 2 - trans subs and other things that look awkward in your history
Automatic methods
Scenario 3 - was that a 1 or a 0 or a 1?.
Scenario 4 - hash outside of Colorado
Scenario 5 - bleeding hearts
6. Red Teaming
Chapter guide
Scoring systems
Setting scenarios
Reporting
Reporting example
Reporting explanation
CTF-style variations
DEFCON game
Physical components
Attack and defense
Jeopardy
Scenario 1 - ladders, why did it have to be ladders?
Network diagram
Brief
Setting up virtual machines
DMZ
missileman
secret1
secret2
secret3
Attack guide
Dummy devices
Combined OSINT trail
The missile base scenario summary
Scenario 2 - that's no network, it's a space station
Setting up a basic network
Attack of the clones
Customizing cloned VMs
Workstation1
Workstation2
Workstation3
Workstation4
Workstation5
The network base scenario summary
A. Appendix
Further reading
Recommended competitions
Existing vulnerable VMs
Index.
Notes:
Bibliographic Level Mode of Issuance: Monograph
Includes bibliographical references at the end of each chapters and index.
Description based on online resource; title from PDF title page (ebrary, viewed August 9, 2014).
ISBN:
9781783985999
1783985992
OCLC:
885020720

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account