Hacker Network Security Learning

Source: Internet
Author: User
Tags dns spoofing

Web Security Engineer Conceptual Basics

A Understand how hackers work

1. Configure the Linux system on the virtual machine

2. Vulnerability Testing Tool

3.MSF Console

4. Remote Tool Rats

5. Remote Access computer

6. White Hat

Two Technical Basics

Funnel Scan Tool Awvs

Awvs Profile Install site scan

Analysis of sweep code result

Site crawler

HTTP Editor

Target Finger

Authentication Teater

HTTP Sniffer

HTTP Fuzzer

Network Security Audit Tool: Nmap

Installation and use

Scan multiple Destinations

Scan side-by except for special targets

Scanning technology

Port Scan Options

System detection

Time Options Part1

Firewall

Output file

Error-Scheduling options

Namp's scripting engine

The internal structure of the Zenmap

Interpreting the output information of Zenmap

Ndiff and Skills

Getting Started with Web security basics

ASP Trojan Horse

Security risks for the database

Security risks for Web site configuration

PHP Trojan

PHP vulnerability

Apache Parsing Vulnerability

Intrusion prevention

Malego

Add links and Selections

Manage Mangage tab

View Options

Add Entity (entities)

Basic graphical interface

Trace trace of the intrusion

1. Alarm analysis based on intrusion detection-external network

2. Alarm analysis of basic intrusion detection-Intranet

Social engineering Tools: SET

1.social-englishtoolkit's social assault.

Port Forwarding for 2.social-english Toolkit

DNS Spoofing for 3.social-english Toolkit

Update of 4.social-english Toolkit

Web security vulnerability Analysis and defense

8. Phpyun XML Injection Vulnerability

9. weBid1.1.1 File Upload Vulnerability

KPPW2.2 arbitrary file Download vulnerabilities

PHPCMS 2008 Command Execution vulnerability

Cmseasy 5.5 Code execution vulnerability

AKCMS 6.0 Logon Bypass Vulnerability

Aspcms2.2.9 Login Bypass Vulnerability

Dedecms5.7 Remote Copy contains vulnerabilities

Penetrating combat

Penetration tool: Sqlmap

1. What is Sqlmap

2. Sqlmap three types of request injection detection

3. Get database-related information

4. Access to quantity and user rights

5. mysql Database injection

6. Manage your own database

7. Delay Injection

8. Interactive command execution and writing Webshell

9. Introduction and use of tamper scripts

10. Local Write Webshell

11. Batch detection Injection Vulnerability

Sqlmap Learning Injection Technology

Integration platform: Burpsuite

1.Burpsuite Application Scenario

2.Burpsuite Installation and introduction

3.proxy Agent Module Detailed

4. Agent Listening settings

5. Other settings for the agent

6. Heavy Reason

Attack

Choice of attack type

The payload of the attack

Settings for the attack

Scan Module

Set up

Vulnerability Calibration Tool: Metasploat

1. Introduction to the framework

2. Upgrade Update

3. Port Scan

4. Get System Information

5. Service Identification

6. Password sniffing

7. Metasploat SMB Scanning

8. Login Verification

9.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.