Web Security Engineer Conceptual Basics
A Understand how hackers work
1. Configure the Linux system on the virtual machine
2. Vulnerability Testing Tool
3.MSF Console
4. Remote Tool Rats
5. Remote Access computer
6. White Hat
Two Technical Basics
Funnel Scan Tool Awvs
Awvs Profile Install site scan
Analysis of sweep code result
Site crawler
HTTP Editor
Target Finger
Authentication Teater
HTTP Sniffer
HTTP Fuzzer
Network Security Audit Tool: Nmap
Installation and use
Scan multiple Destinations
Scan side-by except for special targets
Scanning technology
Port Scan Options
System detection
Time Options Part1
Firewall
Output file
Error-Scheduling options
Namp's scripting engine
The internal structure of the Zenmap
Interpreting the output information of Zenmap
Ndiff and Skills
Getting Started with Web security basics
ASP Trojan Horse
Security risks for the database
Security risks for Web site configuration
PHP Trojan
PHP vulnerability
Apache Parsing Vulnerability
Intrusion prevention
Malego
Add links and Selections
Manage Mangage tab
View Options
Add Entity (entities)
Basic graphical interface
Trace trace of the intrusion
1. Alarm analysis based on intrusion detection-external network
2. Alarm analysis of basic intrusion detection-Intranet
Social engineering Tools: SET
1.social-englishtoolkit's social assault.
Port Forwarding for 2.social-english Toolkit
DNS Spoofing for 3.social-english Toolkit
Update of 4.social-english Toolkit
Web security vulnerability Analysis and defense
8. Phpyun XML Injection Vulnerability
9. weBid1.1.1 File Upload Vulnerability
KPPW2.2 arbitrary file Download vulnerabilities
PHPCMS 2008 Command Execution vulnerability
Cmseasy 5.5 Code execution vulnerability
AKCMS 6.0 Logon Bypass Vulnerability
Aspcms2.2.9 Login Bypass Vulnerability
Dedecms5.7 Remote Copy contains vulnerabilities
Penetrating combat
Penetration tool: Sqlmap
1. What is Sqlmap
2. Sqlmap three types of request injection detection
3. Get database-related information
4. Access to quantity and user rights
5. mysql Database injection
6. Manage your own database
7. Delay Injection
8. Interactive command execution and writing Webshell
9. Introduction and use of tamper scripts
10. Local Write Webshell
11. Batch detection Injection Vulnerability
Sqlmap Learning Injection Technology
Integration platform: Burpsuite
1.Burpsuite Application Scenario
2.Burpsuite Installation and introduction
3.proxy Agent Module Detailed
4. Agent Listening settings
5. Other settings for the agent
6. Heavy Reason
Attack
Choice of attack type
The payload of the attack
Settings for the attack
Scan Module
Set up
Vulnerability Calibration Tool: Metasploat
1. Introduction to the framework
2. Upgrade Update
3. Port Scan
4. Get System Information
5. Service Identification
6. Password sniffing
7. Metasploat SMB Scanning
8. Login Verification
9.