Reader small image

You're reading from  Kali Linux CTF Blueprints

Product typeBook
Published inJul 2014
PublisherPackt
ISBN-139781783985982
Edition1st Edition
Right arrow
Author (1)
Cameron Buchanan
Cameron Buchanan
author image
Cameron Buchanan

Cameron Buchanan is a penetration tester by trade and a writer in his spare time. He has performed penetration tests around the world for a variety of clients across many industries. Previously, Cameron was a member of the RAF. In his spare time, he enjoys doing stupid things, such as trying to make things fly, getting electrocuted, and dunking himself in freezing cold water. He is married and lives in London.
Read more about Cameron Buchanan

Right arrow

Hosting vulnerabilities


The choice of vulnerability to host is one of the more difficult parts when it comes to making challenges. If the vulnerability is too easy, the challengers will tear through it; however, if the vulnerability is too hard, the majority of the target audience are alienated. To resolve this, I've provided some suggestions of vulnerabilities to host, marked for difficulty of setup and difficulty of exploitation. For reference, the following descriptions of difficulties are provided:

  • The following are the various levels in difficulty of setup:

    • Simple – This level of difficulty requires installation of the affected software

    • Moderate – This level of difficulty requires installation of the affected software on a specific operating system

    • Complex – This level of difficulty requires installation and configuration of the affected software on, specific operating system

  • The following are the various levels in difficulty of exploitation:

    • Simple – This level of difficulty requires the use of out-of-the-box tools

    • Moderate – This level of difficulty requires configuration and the use of out-of-the-box tools or simple scripting to perform exploits

    • Complex – This level of difficulty requires the creation of complex scripts, else it is not supported by common exploitation tools

      Vulnerable package

      Difficulty of setup

      Difficulty of exploitation

      Adobe Flash Player

      Simple

      Moderate

      Oracle Java JRE

      Simple

      Moderate

      Internet Explorer

      Simple

      Complex

      QuickTime

      Moderate

      Complex

      ColdFusion

      Simple

      Simple

      TFTP

      Simple

      Simple

      MSSQL

      Simple

      Moderate

Previous PageNext Page
You have been reading a chapter from
Kali Linux CTF Blueprints
Published in: Jul 2014Publisher: PacktISBN-13: 9781783985982
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
undefined
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $15.99/month. Cancel anytime

Author (1)

author image
Cameron Buchanan

Cameron Buchanan is a penetration tester by trade and a writer in his spare time. He has performed penetration tests around the world for a variety of clients across many industries. Previously, Cameron was a member of the RAF. In his spare time, he enjoys doing stupid things, such as trying to make things fly, getting electrocuted, and dunking himself in freezing cold water. He is married and lives in London.
Read more about Cameron Buchanan