Cyber Security (Hacking) Self-Study Course Notes

1. What is a hacker?

Hackers generally refer to computer experts who focus on infiltration and stealing attack technology in IT technology. At this stage, hackers need to master far more than these.

2. Why learn hacking technology?

In fact, network information space security has become the fourth largest battlefield after sea, land and air. In addition to the game between countries, there are also obvious competitions between domestic enterprises and enterprises.

Network security hacking technology is one of the capabilities that both countries and enterprises are paying more and more attention to.

So if you are still considering whether to learn, my answer is: just learn, you are right

3. How to learn network security (hacking technology)?

Phase 1: Security Basics

Cybersecurity Industry and Regulations

Linux operating system

computer network

HTML PHP Mysql Python basics to practical mastery

Phase Two: Information Gathering

IP information collection

Domain name information collection

Server Information Collection

Web site information collection

Google hacking

Fofa Network Security Mapping

Phase Three: Web Security

SQL injection vulnerability

XSS

CSRF vulnerability

File Upload Vulnerability

file contains bug

SSRF vulnerability

XXE vulnerability

Remote Code Execution Vulnerabilities

Password Brute Force Cracking and Defense

Middleware Parsing Vulnerabilities

Deserialization Vulnerabilities

Stage Four: Penetration Tools

MSF

Cobalt strike

Burp suite

Nessus   Appscea   AWVS

Goby   XRay

Sqlmap

Nmap

Kali

The fifth stage: actual combat digging

Vulnerability mining skills

Src

Cnvd

Crowdtest project

Recurrence of popular CVE vulnerabilities

Shooting Range Combat

Network Security (Hacking Technology) Learning Roadmap

Requires HD pdf version - attention will be sent automatically

All knowledge point materials within the framework of the learning route - will be sent automatically after following the blogger !

 statement:

Pure technical teaching sharing! The purpose of this tutorial is to awaken everyone's attention to network security and take corresponding security measures to reduce the economic losses caused by network security, and not to bear criminal responsibility for all aspects of technology abuse.

Guess you like

Origin blog.csdn.net/dexi1113/article/details/131851218