O'Reilly logo

Kali Linux CTF Blueprints by Cameron Buchanan

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Summary

We've gone through some options for hostable vulnerabilities, but realistically, this was a drop in the ocean. Take this, and roll with it; there are many other products out there that can take a beating.

Specifically, we have covered SMB, LAMP, OS, and Telnet. I have given you some code to get you started and to use freely, but remember that it is as vulnerable as anything you will encounter and shouldn't ever be web-facing.

The next chapter is all on wireless and mobile testing. We're going to do some basic network builds and a few social engineering/Wi-Fi exploits against phones. You can leave your Ethernet cables behind, because cables? We don't need cables where we're going.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required