当前位置: 首页 > news >正文

try hack me.md

目录
  • word
  • Pre Security
    • Introduction to Cyber Security
      • Offensive Security Introduction
        • gobuster
      • Defensive Security Intro
        • Security Operations Center (SOC)
        • Digital Forensics and Incident Response (DFIR)
          • Digital Forensics 数字取证
          • Incident Response 事件响应
          • Malware Analysis 恶意软件分析

word

单词 意思
simulated 模拟
complement 补充
portal 门户
ethical 有道德的
leveraging insecure setups 利用不安全的设置
penetration testers 渗透人员
Vulnerabilities 漏洞
remediate 补救、矫正
violation 违反、违抗
Policy violations 策略违规
confidential 机密的
Network intrusions 网络入侵
malicious 恶意的
threat intelligence 威胁情报
adversely 不利的、有害的、反而
adversary 对手
halt 停止、犹豫
petroleum refinery 石炼油厂
ransomware 勒索软件
forum 论坛
phase 阶段
a format suitable for analysis 适合分析的格式
tactic 战术、战略
consequently 因此、结果
investigate 侦察
evolved into 演化为
cyber espionage 网络间谍
traverse 遍历
entail 牵涉、需要
breach 破坏、破裂、违约
data breach 数据泄露
misconfiguration 配置错误
containment 抑制、遏制
eradication 根除、消灭
underneath 在····下方
shady 隐蔽的、可疑的、背阴的
Scenario 方案、场景、剧本
dashboard 仪表盘
expertise 专长技能

Pre Security

Introduction to Cyber Security

Offensive Security Introduction

To outsmart a hacker, you need to think like one.

  • Penetration Tester - Responsible for testing technology products for finding exploitable security vulnerabilities.
  • Red Teamer - Plays the role of an adversary, attacking an organization and providing feedback from an enemy's perspective.
  • Security Engineer - Design, monitor, and maintain security controls, networks, and systems to help prevent cyberattacks.

gobuster

一个爆破工具
gobuster -u http://fakebank -w wordlist.txt dir
-u表示网站 -w表示对应爆破词表

Defensive Security Intro

Security Operations Center (SOC)

A Security Operations Center (SOC) is a team of cyber security professionals that monitors the network and its systems to detect malicious cyber security events

Digital Forensics and Incident Response (DFIR)

Digital Forensics 数字取证

In defensive security, the focus of digital forensics shifts to analyzing evidence of an attack and its perpetrators and other areas such as intellectual property theft, cyber espionage, and possession of unauthorized content.
File SystemSystem memorySystem logsNetwork logs

Incident Response 事件响应

Incident response specifies the methodology that should be followed to handle such a case. The aim is to reduce damage and recover in the shortest time possible.
img

Malware Analysis 恶意软件分析

AbuseIPDB 和 Cisco Talos Intelligence可以用来进行ip分析

http://www.hskmm.com/?act=detail&tid=376

相关文章:

  • Snapshot-based State Replication 基于快照的状态复制网络框架,快照同步
  • Transformer通俗讲解
  • Ubuntu 安装微信
  • Ubuntu 安装截图软件 flameshot
  • Kali连接postgreSQL失败(已解决)
  • 主存储器和cpu的链接
  • 7. LangChain4j + 记忆缓存详细说明 - Rainbow
  • 英语_阅读_water protection team_待读
  • 滑动窗口(不与单调队列结合的总结)
  • Codeforces Round 1048 (Div 2)
  • 9.9未完成
  • 9.9日总结
  • 202205_宁波市赛_Cr4ck2
  • GitHub Copilot代码审查大升级!路径级指令+组织级规范,开发者效率再提升!
  • 20250909 GOJ 模拟赛
  • 在AI技术唾手可得的时代,挖掘新需求成为制胜关键——某知名语音识别框架需求洞察
  • SOS dp(高维前缀dp)
  • 英语_阅读_raise awareness about water conservation_待读
  • 自我介绍
  • MQ
  • 微信消息模版推送
  • [豪の学习笔记] 软考中级备考 基础复习#5
  • 自我介绍+软工五问
  • 02020212 .NET Core重难点知识12-服务定位器、.NET依赖注入示例
  • 三数之和-leetcode
  • apache详细配置
  • 9.8总结
  • 相似了
  • 在 AlmaLinux 9 使用 Podman 部署 Redis 7.4.5 并优化内核参数
  • 抖音批量视频下载工具源码C#源码|自动提取DY视频的软件工具