Book Image

Kali Linux CTF Blueprints

By : Cameron Buchanan
Book Image

Kali Linux CTF Blueprints

By: Cameron Buchanan

Overview of this book

Table of Contents (14 chapters)
Kali Linux CTF Blueprints
About the Author
About the Reviewers


We've gone through some options for hostable vulnerabilities, but realistically, this was a drop in the ocean. Take this, and roll with it; there are many other products out there that can take a beating.

Specifically, we have covered SMB, LAMP, OS, and Telnet. I have given you some code to get you started and to use freely, but remember that it is as vulnerable as anything you will encounter and shouldn't ever be web-facing.

The next chapter is all on wireless and mobile testing. We're going to do some basic network builds and a few social engineering/Wi-Fi exploits against phones. You can leave your Ethernet cables behind, because cables? We don't need cables where we're going.