Kali Linux Ctf Blueprints
E**C
Useful tips about configuration in the book
It's a good book, especially considering there aren't really many like it out there and I like the humor/writing style as well as the layout.However, it definitely assumes you know a decent amount about infosec and system administration to get through it and it will not hold your hand through every step. I know the author can't cover it all but for those of you going through it here are some helpful tips I wish were in the book that I have come across so far:- Use Windows Server 2008 R2. 2012 and 2016 will not work with some facets of the Windows build.- It is best to update the OS to get some of the services running correctly (easily).- The URL in the book for ColdFusion appears to be for an UPDATE to 9.1, not the installer for 9.1 (which I can't seem to find) so I had to go with 9.2.- For SQL 2005 Express, make sure the processors are at a power of 2. It took me 3 days to figure out why I couldn't install SQL 2005 Express and it was because I had allocated 3 processors for my VM (same will go for physical builds with 5, 7, or 9 processors; it won't work).- SQL 2005 Express will not allow you to make the password for the sa user "sa" as the book instructs.I will continue to update this list as I go through the book in hopes to help others who are struggling a bit with the configuration of these machines.Cheers and happy hacking,-Ethan
C**N
getting into cyber
getting into cyber
K**S
Five Stars
Great product great seller !!!
J**R
As for the actual chapters that contain the tutorials they are very well laid out and easy to read and understand
The Kali Linux CTF Blueprints book written by Cameron Buchanan who is a penetration tester by trade – so he knows what he’s talking about. So, what is this book about? It covers ‘Capture the Flag’ style challenges. It has 6 chapters covering:‘Microsoft Environments’ – create a vulnerable servers and desktop PC and covers the most prevalent vulnerabilities.‘Linux Environments’ – focused on generating generic vulnerabilities in Linux Environments‘Wireless and Mobile’ – contains projects targeting WIfI enabled devices such as Tablets and Smartphones.‘Social Engineering’ – Scenarios including XSS Attackable pages and unmask online personas.‘Cryptographic Projects’ such as encryption, deciphering and replication of the well-known Heartbleed attack.‘Red teaming’ – two full scale vulnerable deployments designed to test areas covered in previous chapters.It covers a lot of things that you won’t find in your beginners guides to Kali Linux which brings me onto my next point; who is the book for? The author states that it is for ‘individuals who are aware of the concepts of penetration testing with some practice in one or more types of tests’ which I think is perfectly fair as I myself am not a ‘veteran’ with Kali Linux, more a novice who has played around with it and has lots more to learn. So take that into consideration where looking at this book. It’s more of a ‘follow’ on book after you’ve done some basic tests in Kali and feel you are ready to move on.As for the actual chapters that contain the tutorials they are very well laid out and easy to read and understand. The author has left screenshots in his chapters so that you can easily see what he is doing. He has also included ‘command boxes’ so that you can easily distinguish commands from actual description so you know what you need to enter.Chapters contain scenarios which the author has designed himself so you don’t need to worry about this book been short because it’s only 6 Chapters as they are filled with Scenarios.In conclusion I think that this is a great purchase for anyone who has played around with Kali and eager to learn. But the author defiantly meant it when he said it was for more experienced persons. So take my advice and buy this book if you want to move on in your pen testing hobby/trade.Written by Jackk over at JackkTutorials.com - Watch. Learn. Create
M**T
Kali Linux CTF Blueprints
Capture the flag is a simulated exercise where an attacker is presented with an environment and given specific objectives to complete in order to better understand the risk of a given environment. It also happens to be one of the most challenging and entertaining aspects of a penetration test (at least, in my opinion).In this book, the author goes through multiple scenarios across different platforms on how to set up and stage a capture the flag environment. Best practices are also covered as to make the objectives real enough, but not insanely difficult.The first part of the book covers creating basic Windows environments and installing vulnerable applications such as ColdFusion, MSSQL, and TFTP. Next you move on to Linux to create environments for SMB and LAMP. Wireless and social engineering are given their own chapters— (which didn’t really cover anything new,) but i was most interested in reading the chapter on cryptographic projects. Some great beginner/intermediate exercises in here for your CTF environments. And finally, the book wraps it all up with red teaming practices and procedures.If you’re new to the penetration or looking to get started building CTF environments for your tests, this is a great book to get you started.
S**M
Really good book if you want to set up a pen ...
Really good book if you want to set up a pen test training course or learn by doing it yourself.
Trustpilot
2 months ago
2 weeks ago