当前位置:网站首页>[security] how to counter attack from 0 to 1 to become a security engineer with zero Foundation
[security] how to counter attack from 0 to 1 to become a security engineer with zero Foundation
2022-06-13 08:54:00 【Big safe house】
01/ Preface
What is network security ?
Network security refers to the hardware of the network system 、 The data in the software and its system is protected , Not damaged by accidental or malicious reasons 、 change 、 Let the cat out of the , The system operates continuously, reliably and normally , Uninterrupted network service .
1.2.3 Types of network security
(1) Physical security
(2) System security
(3) Electronic Commerce
(4) Security agreement
(5) Application system security
1.3.5 Network attack classification
(1) Take the initiative to attack : A deliberate act that involves an attacker accessing the information he needs .
(2) Passive attack : It's about gathering information, not visiting , Legitimate users of the data are unaware of this . Passive attacks include sniffing 、 Collect information and other attack methods .
1.3.6 Common forms of cyber attacks
(1) Logic bomb
(2) System Bug
(3) social engineering
(4) Back doors and concealed passages
(5) Denial of service attacks
(6) Viruses 、 Worms and Trojans
(7) Network monitoring
(8)SQL Injection attack
(9)ARP cheating
Network security post
Penetration test engineer : 1、 be responsible for WEB、APP Application system for vulnerability discovery and testing ;
2、 Be able to exploit and analyze the discovered vulnerabilities , Further verification and test and give the solution ;
3、 Responsible for tracking and researching the latest on the Internet APP、Web Safety technology 、 The latest security holes .
Network Security Engineer :
1. Be responsible for the penetration test of the company's business systems 、 Vulnerability excavation and security reinforcement ;
2. Be responsible for tracking and analyzing all kinds of safety problems , Emergency response to safety incidents ;
3. Participate in the construction of the company's network security system ;
4. Responsible for tracking the latest developments in the industry , Latest security vulnerability research and follow-up work ;
Reverse engineer :
1、 In charge of the company Android Product related technical problems ;
2、 Crack mainstream websites and app The anti climbing mechanism ;
3、 Grasp the development trend of network technology and network application ;
4、 According to specific product requirements , Provide the company with technical support for competitive product analysis .
Loophole / Virus analysis **** The engineer :
1、 Responsible for hardware and software 、 operating system 、 The firmware 、 Network protocol 、 Management mechanism and other loopholes ;
2、 Write relevant research documents , To write POC;
3、 Track and analyze the latest research results in the field , Innovative technology and methods , Promote the application to the ground ;
4、 Related technology research and system development
Security researcher :
1. Track and analyze the latest security vulnerabilities in the industry ;
2. Analyze the causes and utilization methods of vulnerabilities ;
3. Prepare vulnerability analysis report ;
4. Output detection capability .
Safety operation and maintenance / Security Service Engineer :
1 Familiar with common Windows&linux、Web Application and database attack methods ;
Master common Web Security vulnerability principle and utilization technology (SQL Inject 、xss Cross site scripts 、 Upload files 、csrf Request forgery across sites 、 File contains 、 Ultra vires 、SSRF etc. );
It can be seen from the above figure , According to work needs and responsibilities , Every post has key tasks and necessary skills .
for example , The main work of the safety penetration test engineer is to be responsible for WEB、APP Application system for vulnerability discovery and testing ; Be able to exploit and analyze the discovered vulnerabilities , Further verification and test and give the solution ; Responsible for tracking and researching the latest on the Internet APP、Web Safety technology 、 The latest security holes .
Another example is that the main work of security attack and defense experts is the actual combat of security attack and defense , Organized high-end offensive and defensive activities , Evaluate the safety protection level of the enterprise , And empower through the team , Improve the overall security attack and defense strength of the team , The required skills are mainly red blue confrontation and opponent simulation .
Choose a position that you are interested in, and you can focus on learning , If you don't know what you are interested in and are interested in more than one , You can learn it systematically first , Find a suitable direction to practice .
After you know your goals, you need to find learning materials to learn
1、 First of all, we should learn the basic knowledge and elements of the network , such as :http Agreements, etc .
recommend B Stand up and learn : Network security course —p1http Review of the agreement
2、 Install common security software , such as kali, virtual machine
Reference resources b standing 【kali Installation configuration p2】
3、 It is easier to understand and absorb when watching videos and matching books
4、 Get into the habit of taking notes . Although the actual combat in the Internet era is particularly important , But taking notes can make the knowledge learned in a period of time fully reviewed or quickly reviewed when forgotten ~
in addition , In the process of learning, we need a learning route to follow , In case of disorderly study
This learning route covers the market 99% Safety technology content of , It's over .( In order to show the whole content , The miniaturization is quite serious )
In addition, I have posted the learning path resources that I have saved from several years of study below , Need to be able to get
【 Help safe learning , All resources are obtained from one by one 】
① Network Security Learning Route
②20 Penetration test ebook
③ Safe attack and defense 357 Page notes
④50 A security attack and defense interview guide
⑤ Safety red team penetration Kit
⑥ information gathering 80 Search syntax
⑦100 Three actual cases of vulnerability
⑧ Internal video resources of the safety factory
⑨ Calendar year CTF Analysis of the flag race
Finally, I will give you a common sense to protect yourself from information leakage :
Common network password security protection skills
(1) Using complex passwords (2) Use the soft keyboard
(3) Use dynamic password ( One time password )(4) Prevention of phishing
(5) Use SSL To guard against Sniffer(6) Try not to save passwords locally
(7) Use USB Key(8) Personal password management
(9) Password classification (10) biometrics
边栏推荐
- Logstash failed to create queue
- An error CV2 is reported when the picture is converted to grayscale cvtColor(img, cv2.COLOR_BGR2GRAY)
- On the use of regular expressions (bracket problem)
- JS gets the first month of the year, the second month to the last month, and the first day to the last day
- 1. preliminary understanding of Express
- 国债逆回购能开户吗,国债逆回购在APP上可以直接开通券商安全吗 ,买股票怎么网上开户
- Three methods to make the scroll bar of div automatically scroll to the bottom
- À propos des principes de chiffrement et de décryptage RSA
- Gbase 8A disk problems and Solutions
- Explanation of JS event loop mechanism and asynchronous tasks
猜你喜欢
Uni app subcontracting loading and optimization
Loss outputs Nan for the Nan model
JS - max. of array cases
Docker installing MySQL local remote connection docker container MySQL
turf. JS usage
Vs installation of vassistx plug-in causes Chinese input of wpf-xaml file to be garbled. Solution
【安全】零基础如何从0到1逆袭成为安全工程师
WARNING:tornado.access:404 GET /favicon.ico (172.16.8.1) 1.84ms [附静态文件设置]
關於RSA加密解密原理
How does jupyter notebook directly output the values of multiple variables after running?
随机推荐
Print an array clockwise
Brief description of software testing and software maintenance
Namespace in TS (2)
Sky background map, navigation page lovefanfan top
容器概念和云原生
WARNING:tornado. access:404 GET /favicon. ICO (172.16.8.1) 1.84ms [with static file settings]
【leetcode周赛记录】第80场双周赛记录
Filebeat collects logs to elk
Three methods to make the scroll bar of div automatically scroll to the bottom
Margin:0 reason why auto does not take effect
网络安全漏洞分析之重定向漏洞分析
银行理财产品有哪些?清算期是多长?
Knowledge points related to system architecture 1
【QNX Hypervisor 2.2 用户手册】4.5.1 构建QNX Guest
Problèmes et traitement du disque gbase 8a
In order to resist the flood, the soldiers have been fighting for 89 hours. How many days and hours are there in total?
7、 JS data type
Vscode double shortcut keys up, down, left and right
[leetcode weekly race record] record of the 80th biweekly race
JS to get the date in the next seven days of the current date