O'Reilly logo

Kali Linux CTF Blueprints by Cameron Buchanan

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Summary

In this chapter, we have covered a lot of stuff to do with PyCrypto, a couple of basic encoding methods, and a whole bunch of philosophical encryption musings. We have looked at the basic concepts of hashes, stream ciphers, substitution ciphers, and transposition ciphers. We have pointed out flaws in methods of encryption as well as flaws in implementation. I really enjoyed this chapter, it was a bit painful to write and required a reasonable amount of research, but I think it was fairly rewarding all round.

The next and final chapter deals with the creation of full-size deployments. We're going to go through how to set up a full assault course in two examples. One will be a chained example, where the aim is to compromise each box in turn ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required