diff --git a/README.md b/README.md index 3c38b4f..89b5b50 100644 --- a/README.md +++ b/README.md @@ -1,4 +1,6 @@ # Micro8 + 其他语言: [English](README_EN.md) + 渗透攻击超十年,由于年龄,身体原因,自己感觉快要退出一线渗透攻击了。遂打算把毕生所学用文字表写出来。因为文章涉及到敏感的攻击行为,所以好多需要打马赛克,或者是本地以demo的形式表现出来。当这个行业做久了,你也终有一天发现原来事物的本质是如此重要。比如内网渗透的本质是信息搜集。当年某大佬把这条经验传递给我,同样,今天变成老家伙的我,也希望把这条经验传递下去。 文中一定会出现笔误或者不对的地方,请大家多多包涵,提前向各位说声对不起,所有课程从基础开始(包括工具的介绍,应用等,由于是基础开始,部分内容可能会涉及初级知识点,请见谅),这样以后新来的同事或者想要自我从头学习的同事也可以避开一些弯路,在写的过程中,我深深体会到分享者才是学习中的最大受益者,由于需要成文章,所以需要查阅大量的资料。在整个过程中,又学习到很多知识点。连载其中包括穿插在工作中的项目心得笔记,包括但不限制于代码审计,web渗透,内网渗透,域渗透,隧道介绍,日志溯源与暴力溯源等。如果有课程指定需求介绍相关技术的同事(在我技术能力范围之内),请发我的邮箱:micropoor@gmail.com。在2010-2012年之间一直在写,但是由于当时的工作原因,就不在写了。这次的所有课程无版权,只希望自己可以在本来已封闭的技术氛围里,依然做出一些技术文档输出。那么这次的教程我想依然想叫,笔者相信有一天,你会发现原来弄清事物的本质是这样的有趣。 @@ -12,3 +14,6 @@ ---------- 渗透测试/APT模拟攻击,是一把双刃剑,Micro8系列适用于初中级安全从业人员,乙方安全测试,甲方安全自检,网络安全爱好者等,企业安全防护与提高,该系列遵守:免费,自由,共享,开源。请勿触犯法律,如触犯与本作者无关。当下载/传播/学习等便视为同意该条例。愿读者学有所成,问有所得,静有所思,而私有所惘。 + +---------- +由于开启了open投稿(支持所有人投稿加入该系列),第三方投稿如有广告/隐藏广告/小密圈/等一切收费为主的行为,请勿相信。 diff --git a/README_EN.md b/README_EN.md new file mode 100644 index 0000000..6caca04 --- /dev/null +++ b/README_EN.md @@ -0,0 +1,19 @@ +# Micro8 + Other Languages: [简体中文](README.md) + + Infiltration attack for more than ten years, due to age, physical reasons, I feel that I am about to exit the first-line penetration attack. I plan to write out the textbooks I have learned in my life. Because the article involves sensitive attack behavior, so many need to mosaic, or local manifestation in the form of demo. When the industry has been around for a long time, you will one day discover that the essence of the original things is so important. For example, the essence of intranet penetration is information gathering. At that time, a big man passed this experience to me. Similarly, I am an old guy today, and I hope to pass on this experience. + + There must be a clerical error or something wrong in the text. Please bear with me and say sorry to everyone in advance. All courses start from the basics (including the introduction of tools, applications, etc., since it is the foundation, some of the content may involve primary knowledge points, Please forgive me, so that new colleagues or colleagues who want to learn from scratch can avoid some detours. In the process of writing, I deeply understand that the sharer is the biggest beneficiary in learning. Article, so you need to consult a lot of information. Throughout the process, I learned a lot of knowledge points. Serialization includes notes on projects that are interspersed at work, including but not limited to code auditing, web penetration, intranet penetration, domain penetration, tunnel introduction, log traceability, and violent traceability. If you have a course specifying a colleague who needs to introduce the relevant technology (within my technical ability), please send me an email: micropoor@gmail.com. I have been writing , I believe that one day, you will find that the original essence of things is so interesting. + + If you need to specify a technical appeal, please leave a message below to facilitate the addition of the class in the future update. Thanks again to all readers. + +---------- + +Directory structure, see wiki + +---------- + +Penetration test/APT simulation attack is a double-edged sword. The Micro8 series is suitable for junior and intermediate security practitioners, Party B security testing, Party A security self-test, network security enthusiasts, etc., enterprise security protection and improvement, the series complies with: Free, free, shared, open source. Do not break the law, such as the offense is not related to the author. When downloading/transmitting/learning, etc., it is deemed to be in agreement with the regulations. I hope that the readers will learn something, ask for income, think quietly, and be private. + +---------- +Since open submissions are supported (supporting everyone to contribute to the series), third-party submissions such as advertising/hidden advertising/small circles/all other charges are not allowed. diff --git a/第一百一十九课:全平台高性能加密隧道 ssf.pdf b/第一百一十九课:全平台高性能加密隧道 ssf.pdf new file mode 100644 index 0000000..e307619 Binary files /dev/null and b/第一百一十九课:全平台高性能加密隧道 ssf.pdf differ diff --git a/第一百一十四课:渗透沉思录.pdf b/第一百一十四课:渗透沉思录.pdf new file mode 100644 index 0000000..77c9db7 Binary files /dev/null and b/第一百一十四课:渗透沉思录.pdf differ diff --git a/第一百二十一课:http加密代理深度应用 [ abptts ].pdf b/第一百二十一课:http加密代理深度应用 [ abptts ].pdf new file mode 100644 index 0000000..9e730a6 Binary files /dev/null and b/第一百二十一课:http加密代理深度应用 [ abptts ].pdf differ diff --git a/第一百二十三课:利用ssh隧道将公网meterpreter弹至本地的msf中.pdf b/第一百二十三课:利用ssh隧道将公网meterpreter弹至本地的msf中.pdf new file mode 100644 index 0000000..a6ba091 Binary files /dev/null and b/第一百二十三课:利用ssh隧道将公网meterpreter弹至本地的msf中.pdf differ diff --git a/第一百二十二课:利用 ssh隧道实现内网断网机meterpreter反向上线.pdf b/第一百二十二课:利用 ssh隧道实现内网断网机meterpreter反向上线.pdf new file mode 100644 index 0000000..c878b60 Binary files /dev/null and b/第一百二十二课:利用 ssh隧道实现内网断网机meterpreter反向上线.pdf differ diff --git a/第一百二十四课:解决无meterpreter shell添加虚拟路由映射第一季.pdf b/第一百二十四课:解决无meterpreter shell添加虚拟路由映射第一季.pdf new file mode 100644 index 0000000..f1b1158 Binary files /dev/null and b/第一百二十四课:解决无meterpreter shell添加虚拟路由映射第一季.pdf differ diff --git a/第一百二十课:win自带的高级网络配置管理工具深度应用 [ netsh ].pdf b/第一百二十课:win自带的高级网络配置管理工具深度应用 [ netsh ].pdf new file mode 100644 index 0000000..1b05134 Binary files /dev/null and b/第一百二十课:win自带的高级网络配置管理工具深度应用 [ netsh ].pdf differ