Summary

We've gone through some options for hostable vulnerabilities, but realistically, this was a drop in the ocean. Take this, and roll with it; there are many other products out there that can take a beating.

Specifically, we have covered SMB, LAMP, OS, and Telnet. I have given you some code to get you started and to use freely, but remember that it is as vulnerable as anything you will encounter and shouldn't ever be web-facing.

The next chapter is all on wireless and mobile testing. We're going to do some basic network builds and a few social engineering/Wi-Fi exploits against phones. You can leave your Ethernet cables behind, because cables? We don't need cables where we're going.

Get Kali Linux CTF Blueprints now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.