Book Image

Kali Linux CTF Blueprints

By : Cameron Buchanan
Book Image

Kali Linux CTF Blueprints

By: Cameron Buchanan

Overview of this book

Table of Contents (14 chapters)
Kali Linux CTF Blueprints
Credits
About the Author
About the Reviewers
www.PacktPub.com
Preface
Index

About the Reviewers

Abhishek Dey is a graduate student at the University of Florida conducting research in the fields of computer security, data science, Big Data analytics, analysis of algorithms, database system implementation, and concurrency and parallelism. He is a passionate programmer who developed an interest in programming and web technologies at the age of 15. He possesses expertise in JavaScript, AngularJS, C#, Java, HTML5, Bootstrap, Hadoop MapReduce, Pig, Hive, and many more. He is a Microsoft Certified Professional, Oracle Certified Java Programmer, Oracle Certified Web Component Developer, and an Oracle Certified Business Component Developer. He has served as a software developer at the McTrans Center at the University of Florida (http://www.ufl.edu/) where he contributed towards bringing new innovations in the field of Highway Capacity Software Development in collaboration with the Engineering School of Sustainable Infrastructure and Environment. In his leisure time, he can be found oil painting, giving colors to his imagination on canvas or traveling to different interesting places.

Daniel W. Dieterle is an internationally published security author, researcher, and technical editor. He has over 20 years of IT experience and has provided various levels of support and service to numerous companies ranging from small businesses to large corporations. He authors and runs the CyberArms Security blog (cyberarms.wordpress.com).

Adriano dos Santos Gregório is an expert in the field of operating systems, is curious about new technologies, and is passionate about mobile technologies. Being a Unix administrator since 1999, he focuses on networking projects with emphasis on physical and logical security of various network environments and databases. He has also reviewed some other Packt Publishing books such as Kali Linux Cookbook, Cameron Buchanan. He is a Microsoft Certified MCSA and MCT Alumnus.

Aamir Lakhani is a leading cyber security architect and cyber defense specialist. He designs, implements, and supports advanced IT security solutions for the world's largest enterprise and federal organizations. He has designed offensive counter-defense measures for defense and intelligence agencies and has assisted many organizations in defending themselves from active strike-back attacks perpetrated by underground cyber criminal groups. He is considered an industry leader in support of detailed architectural engagements and projects on topics related to cyber defense, mobile application threats, malware, Advanced Persistent Threat (APT) research, and dark security.

He is the author of Web Penetration Testing with Kali Linux, Packt Publishing, and XenMobile MDM, Packt Publishing. He is also an active speaker and researcher at many of the top cyber security conferences around the world.

Aamir Lakhani runs and writes the popular cyber security blog, Doctor Chaos, at www.DrChaos.com. Doctor Chaos features all areas of dark security, hacking, and vulnerabilities. He has had numerous publications in magazines and has been featured in the media. You can find Aamir Lakhani, also known as Dr. Chaos, speaking at many security conferences around the world, on Twitter @aamirlakhani, or on his blog.

Joseph Muniz is an engineer at Cisco Systems and a security researcher. He started his career in software development and later managed networks as a contracted technical resource. He moved into consulting and found a passion for security while meeting with a variety of customers. He has been involved with the design and implementation of multiple projects, ranging from Fortune 500 corporations to large federal networks.

He runs thesecurityblogger.com, a popular resource about security and product implementation. You can also find Joseph speaking at live events as well as being involved with other publications. Recent events include speaker for Social Media Deception at the 2013 ASIS International conference, speaker for the Eliminate Network Blind Spots with Data Center Security webinar, author of Web Penetration Testing with Kali Linux, Packt Publishing, and author of an article on Compromising Passwords in PenTest Magazine, Backtrack Compendium.

Outside of work, he can be found behind turntables scratching classic vinyl or on the soccer pitch hacking away at the local club teams.