Merge pull request #2 from Micropoor/master

1
pull/38/head
Wilson 6 years ago committed by GitHub
commit ba740e2ebd
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23

@ -1,4 +1,6 @@
# Micro8 # Micro8
其他语言: [English](README_EN.md)
渗透攻击超十年由于年龄身体原因自己感觉快要退出一线渗透攻击了。遂打算把毕生所学用文字表写出来。因为文章涉及到敏感的攻击行为所以好多需要打马赛克或者是本地以demo的形式表现出来。当这个行业做久了你也终有一天发现原来事物的本质是如此重要。比如内网渗透的本质是信息搜集。当年某大佬把这条经验传递给我同样今天变成老家伙的我也希望把这条经验传递下去。 渗透攻击超十年由于年龄身体原因自己感觉快要退出一线渗透攻击了。遂打算把毕生所学用文字表写出来。因为文章涉及到敏感的攻击行为所以好多需要打马赛克或者是本地以demo的形式表现出来。当这个行业做久了你也终有一天发现原来事物的本质是如此重要。比如内网渗透的本质是信息搜集。当年某大佬把这条经验传递给我同样今天变成老家伙的我也希望把这条经验传递下去。
文中一定会出现笔误或者不对的地方请大家多多包涵提前向各位说声对不起所有课程从基础开始包括工具的介绍应用等由于是基础开始部分内容可能会涉及初级知识点请见谅这样以后新来的同事或者想要自我从头学习的同事也可以避开一些弯路在写的过程中我深深体会到分享者才是学习中的最大受益者由于需要成文章所以需要查阅大量的资料。在整个过程中又学习到很多知识点。连载其中包括穿插在工作中的项目心得笔记包括但不限制于代码审计web渗透内网渗透域渗透隧道介绍日志溯源与暴力溯源等。如果有课程指定需求介绍相关技术的同事在我技术能力范围之内请发我的邮箱micropoor@gmail.com。在2010-2012年之间一直在写<PHP8>,但是由于当时的工作原因,就不在写了。这次的所有课程无版权,只希望自己可以在本来已封闭的技术氛围里,依然做出一些技术文档输出。那么这次的教程我想依然想叫<PHP8>,笔者相信有一天,你会发现原来弄清事物的本质是这样的有趣。 文中一定会出现笔误或者不对的地方请大家多多包涵提前向各位说声对不起所有课程从基础开始包括工具的介绍应用等由于是基础开始部分内容可能会涉及初级知识点请见谅这样以后新来的同事或者想要自我从头学习的同事也可以避开一些弯路在写的过程中我深深体会到分享者才是学习中的最大受益者由于需要成文章所以需要查阅大量的资料。在整个过程中又学习到很多知识点。连载其中包括穿插在工作中的项目心得笔记包括但不限制于代码审计web渗透内网渗透域渗透隧道介绍日志溯源与暴力溯源等。如果有课程指定需求介绍相关技术的同事在我技术能力范围之内请发我的邮箱micropoor@gmail.com。在2010-2012年之间一直在写<PHP8>,但是由于当时的工作原因,就不在写了。这次的所有课程无版权,只希望自己可以在本来已封闭的技术氛围里,依然做出一些技术文档输出。那么这次的教程我想依然想叫<PHP8>,笔者相信有一天,你会发现原来弄清事物的本质是这样的有趣。
@ -12,3 +14,6 @@
---------- ----------
渗透测试/APT模拟攻击是一把双刃剑Micro8系列适用于初中级安全从业人员乙方安全测试甲方安全自检网络安全爱好者等企业安全防护与提高该系列遵守免费自由共享开源。请勿触犯法律如触犯与本作者无关。当下载/传播/学习等便视为同意该条例。愿读者学有所成,问有所得,静有所思,而私有所惘。 渗透测试/APT模拟攻击是一把双刃剑Micro8系列适用于初中级安全从业人员乙方安全测试甲方安全自检网络安全爱好者等企业安全防护与提高该系列遵守免费自由共享开源。请勿触犯法律如触犯与本作者无关。当下载/传播/学习等便视为同意该条例。愿读者学有所成,问有所得,静有所思,而私有所惘。
----------
由于开启了open投稿支持所有人投稿加入该系列第三方投稿如有广告/隐藏广告/小密圈/等一切收费为主的行为,请勿相信。

@ -0,0 +1,19 @@
# Micro8
Other Languages: [简体中文](README.md)
Infiltration attack for more than ten years, due to age, physical reasons, I feel that I am about to exit the first-line penetration attack. I plan to write out the textbooks I have learned in my life. Because the article involves sensitive attack behavior, so many need to mosaic, or local manifestation in the form of demo. When the industry has been around for a long time, you will one day discover that the essence of the original things is so important. For example, the essence of intranet penetration is information gathering. At that time, a big man passed this experience to me. Similarly, I am an old guy today, and I hope to pass on this experience.
There must be a clerical error or something wrong in the text. Please bear with me and say sorry to everyone in advance. All courses start from the basics (including the introduction of tools, applications, etc., since it is the foundation, some of the content may involve primary knowledge points, Please forgive me, so that new colleagues or colleagues who want to learn from scratch can avoid some detours. In the process of writing, I deeply understand that the sharer is the biggest beneficiary in learning. Article, so you need to consult a lot of information. Throughout the process, I learned a lot of knowledge points. Serialization includes notes on projects that are interspersed at work, including but not limited to code auditing, web penetration, intranet penetration, domain penetration, tunnel introduction, log traceability, and violent traceability. If you have a course specifying a colleague who needs to introduce the relevant technology (within my technical ability), please send me an email: micropoor@gmail.com. I have been writing <PHP Security News 8:00 am between 2010 and 2012, but I was not writing because of the work at the time. All the courses in this time are copyright-free, and I only hope that I can still make some technical documents output in the technical atmosphere that is already closed. So this tutorial I still want to call <PHP security news 8 o'clock>, I believe that one day, you will find that the original essence of things is so interesting.
If you need to specify a technical appeal, please leave a message below to facilitate the addition of the class in the future update. Thanks again to all readers.
----------
Directory structure, see wiki
----------
Penetration test/APT simulation attack is a double-edged sword. The Micro8 series is suitable for junior and intermediate security practitioners, Party B security testing, Party A security self-test, network security enthusiasts, etc., enterprise security protection and improvement, the series complies with: Free, free, shared, open source. Do not break the law, such as the offense is not related to the author. When downloading/transmitting/learning, etc., it is deemed to be in agreement with the regulations. I hope that the readers will learn something, ask for income, think quietly, and be private.
----------
Since open submissions are supported (supporting everyone to contribute to the series), third-party submissions such as advertising/hidden advertising/small circles/all other charges are not allowed.
Loading…
Cancel
Save