word
| 單詞 | 意思 |
|---|---|
| simulated | 模擬 |
| complement | 補充 |
| portal | 門戶 |
| ethical | 有道德的 |
| leveraging insecure setups | 利用不安全的設置 |
| penetration testers | 滲透人員 |
| Vulnerabilities | 漏洞 |
| remediate | 補救、矯正 |
| violation | 違反、違抗 |
| Policy violations | 策略違規 |
| confidential | 機密的 |
| Network intrusions | 網絡入侵 |
| malicious | 惡意的 |
| threat intelligence | 威脅情報 |
| adversely | 不利的、有害的、反而 |
| adversary | 對手 |
| halt | 停止、猶豫 |
| petroleum refinery | 石煉油廠 |
| ransomware | 勒索軟件 |
| forum | 論壇 |
| phase | 階段 |
| a format suitable for analysis | 適合分析的格式 |
| tactic | 戰術、戰略 |
| consequently | 因此、結果 |
| investigate | 偵察 |
| evolved into | 演化為 |
| cyber espionage | 網絡間諜 |
| traverse | 遍歷 |
| entail | 牽涉、需要 |
| breach | 破壞、破裂、違約 |
| data breach | 數據泄露 |
| misconfiguration | 配置錯誤 |
| containment | 抑制、遏制 |
| eradication | 根除、消滅 |
| underneath | 在····下方 |
| shady | 隱蔽的、可疑的、背陰的 |
| Scenario | 方案、場景、劇本 |
| dashboard | 儀表盤 |
| expertise | 專長技能 |
Pre Security
Introduction to Cyber Security
Offensive Security Introduction
To outsmart a hacker, you need to think like one.
Penetration Tester - Responsible for testing technology products for finding exploitable security vulnerabilities.Red Teamer - Plays the role of an adversary, attacking an organization and providing feedback from an enemy's perspective.Security Engineer - Design, monitor, and maintain security controls, networks, and systems to help prevent cyberattacks.
gobuster
一個爆破工具
gobuster -u http://fakebank -w wordlist.txt dir
-u表示網站 -w表示對應爆破詞表
Defensive Security Intro
Security Operations Center (SOC)
A Security Operations Center (SOC) is a team of cyber security professionals that monitors the network and its systems to detect malicious cyber security events
Digital Forensics and Incident Response (DFIR)
Digital Forensics 數字取證
In defensive security, the focus of digital forensics shifts to analyzing evidence of an attack and its perpetrators and other areas such as intellectual property theft, cyber espionage, and possession of unauthorized content.
File System、System memory、System logs、Network logs
Incident Response 事件響應
Incident response specifies the methodology that should be followed to handle such a case. The aim is to reduce damage and recover in the shortest time possible.

Malware Analysis 惡意軟件分析
AbuseIPDB 和 Cisco Talos Intelligence可以用來進行ip分析
浙公網安備 33010602011771號