000 | 02965nam a22005415i 4500 | ||
---|---|---|---|
001 | 978-981-19-0336-6 | ||
003 | DE-He213 | ||
005 | 20240423125531.0 | ||
007 | cr nn 008mamaa | ||
008 | 220505s2022 si | s |||| 0|eng d | ||
020 |
_a9789811903366 _9978-981-19-0336-6 |
||
024 | 7 |
_a10.1007/978-981-19-0336-6 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aUR _2thema |
|
072 | 7 |
_aUTN _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
110 | 2 |
_aNu1L Team. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut |
|
245 | 1 | 0 |
_aHandbook for CTFers _h[electronic resource]. |
250 | _a1st ed. 2022. | ||
264 | 1 |
_aSingapore : _bSpringer Nature Singapore : _bImprint: Springer, _c2022. |
|
300 |
_aXXI, 797 p. 1 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
505 | 0 | _aChapter 1 Web for Beginners -- Chapter 2 Advanced Web Attacks -- Chapter 3 Web Extensions.-Chapter 4 APK -- Chapter 5 Reverse Engineering -- Chapter 6 PWN -- Chapter 7 Crypto -- Chapter 8 Smart Contract -- Chapter 9 Misc -- Chapter 10 Code Audit -- Chapter 11 Attack-Defense -- Chapter 12 Intranet Penetration Testing -- Chapter 13 CTF Team Management. | |
520 | _a“Handbook for CTFers: Zero to One” was written by the Nu1L team, one of China’s top CTF teams. As for Jeopardy-style CTFs, the content in the first 10 chapters of this book not only covers traditional categories of tasks like WEB, PWN and Crypto, but also includes some of the latest hot topics and techniques, such as blockchain. Case studies are provided for all of these types. Onsite Attack-Defend-style CTFs and penetration testing are introduced in Chapter 11 and Chapter 12. In order to help readers gain the most from the book, we have developed the N1Book platform, which addresses practical questions for different task categories. The book offers beginners a reliable, systematic tutorial on CTF competition. At the same time, it includes real case studies and a wealth of our competition experience, making it a valuable asset for experienced CTF players. . | ||
650 | 0 | _aData protection. | |
650 | 0 | _aCryptography. | |
650 | 0 | _aData encryption (Computer science). | |
650 | 0 |
_aComputer networks _xSecurity measures. |
|
650 | 1 | 4 | _aData and Information Security. |
650 | 2 | 4 | _aCryptology. |
650 | 2 | 4 | _aMobile and Network Security. |
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9789811903359 |
776 | 0 | 8 |
_iPrinted edition: _z9789811903373 |
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-981-19-0336-6 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
942 | _cSPRINGER | ||
999 |
_c178992 _d178992 |