- http://smashthestack.org/
- http://overthewire.org/wargames/
- http://exploit-exercises.com/
- Gera’s Insecure Programming
- Microsoft BlueHat Challenge
[2] Embedded Exploitation : https://microcorruption.com/
[3] RCE :
- http://www.crackmes.de/
- CodeEngn : http://www.codeengn.com/
- http://reversing.kr/
[4] Crypto :
- Matasano Crypto Challenges : web.archive.org/web/20140213141638/http://www.matasano.com/articles/crypto-challenges/
- http://gendou.com/crypto/
[5] Web Exploitation : https://pentesterlab.com/exercises/
[6] Others :
- http://www.wechall.net/
- http://www.root-me.org/
[7] Forensics :
- http://old.honeynet.org/challenge/
- http://old.honeynet.org/scans/
[8] Linux kernel programming : http://eudyptula-challenge.org/
securitywander
Không có nhận xét nào:
Đăng nhận xét