The exercises presented in this chapter are very basic, straightforward examples that are designed for people already intending to get involved in penetration testing or are perhaps already practicing the craft. They will target the majority of users in the middleweight category with some skills but not excessive pwnage. In order to attract the skilled practitioners and new blood out there, you will need to mix it up a little. Poor pen testers will shrug off a simple faux pen test, and those without testing experience are likely to be intimidated by the required skill and toolset. The following options are some ideas on how to vary the course to attract the intended audience.

Kali Linux CTF Blueprints
By :

Kali Linux CTF Blueprints
By:
Overview of this book
Table of Contents (14 chapters)
Kali Linux CTF Blueprints
Credits
About the Author
About the Reviewers
www.PacktPub.com
Preface
Microsoft Environments
Linux Environments
Wireless and Mobile
Social Engineering
Cryptographic Projects
Red Teaming
Appendix
Index
Customer Reviews