000 02965nam a22005415i 4500
001 978-981-19-0336-6
003 DE-He213
005 20240423125531.0
007 cr nn 008mamaa
008 220505s2022 si | s |||| 0|eng d
020 _a9789811903366
_9978-981-19-0336-6
024 7 _a10.1007/978-981-19-0336-6
_2doi
050 4 _aQA76.9.A25
072 7 _aUR
_2bicssc
072 7 _aUTN
_2bicssc
072 7 _aCOM053000
_2bisacsh
072 7 _aUR
_2thema
072 7 _aUTN
_2thema
082 0 4 _a005.8
_223
110 2 _aNu1L Team.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
245 1 0 _aHandbook for CTFers
_h[electronic resource].
250 _a1st ed. 2022.
264 1 _aSingapore :
_bSpringer Nature Singapore :
_bImprint: Springer,
_c2022.
300 _aXXI, 797 p. 1 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
505 0 _aChapter 1 Web for Beginners -- Chapter 2 Advanced Web Attacks -- Chapter 3 Web Extensions.-Chapter 4 APK -- Chapter 5 Reverse Engineering -- Chapter 6 PWN -- Chapter 7 Crypto -- Chapter 8 Smart Contract -- Chapter 9 Misc -- Chapter 10 Code Audit -- Chapter 11 Attack-Defense -- Chapter 12 Intranet Penetration Testing -- Chapter 13 CTF Team Management.
520 _a“Handbook for CTFers: Zero to One” was written by the Nu1L team, one of China’s top CTF teams. As for Jeopardy-style CTFs, the content in the first 10 chapters of this book not only covers traditional categories of tasks like WEB, PWN and Crypto, but also includes some of the latest hot topics and techniques, such as blockchain. Case studies are provided for all of these types. Onsite Attack-Defend-style CTFs and penetration testing are introduced in Chapter 11 and Chapter 12. In order to help readers gain the most from the book, we have developed the N1Book platform, which addresses practical questions for different task categories. The book offers beginners a reliable, systematic tutorial on CTF competition. At the same time, it includes real case studies and a wealth of our competition experience, making it a valuable asset for experienced CTF players. .
650 0 _aData protection.
650 0 _aCryptography.
650 0 _aData encryption (Computer science).
650 0 _aComputer networks
_xSecurity measures.
650 1 4 _aData and Information Security.
650 2 4 _aCryptology.
650 2 4 _aMobile and Network Security.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9789811903359
776 0 8 _iPrinted edition:
_z9789811903373
856 4 0 _uhttps://doi.org/10.1007/978-981-19-0336-6
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
942 _cSPRINGER
999 _c178992
_d178992