Skip to content

Commit

Permalink
Merge pull request LyleMi#24 from SoulIess/master
Browse files Browse the repository at this point in the history
Fixed continuity errors in Readme.MD; Created Readme_en.MD as english translation
  • Loading branch information
LyleMi authored Jul 1, 2022
2 parents d4a9d9a + c9c226e commit 5e4f9b2
Show file tree
Hide file tree
Showing 2 changed files with 258 additions and 42 deletions.
108 changes: 66 additions & 42 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -5,6 +5,10 @@
![](https://img.shields.io/github/issues/lylemi/learn-web-hacking.svg)
![](https://img.shields.io/github/license/lylemi/learn-web-hacking.svg)

[English version ReadME (英文版 README)](https://github.com/LyleMi/Learn-Web-Hacking/blob/master/README_en.md)

[笔记链接](https://websec.readthedocs.io)

###
---

Expand Down Expand Up @@ -40,20 +44,22 @@
1. 网络基础
2. UDP协议
3. TCP协议
4. 路由算法
5. 域名系统
6. HTTP标准
7. HTTPS
8. SSL/TLS
9. IPsec
10. Wi-Fi
4. DHCP协议
5. 路由算法
6. 域名系统
7. HTTP标准
8. 邮件协议族
9. SSL/TLS
10. IPsec
11. Wi-Fi
3. 信息收集
1. 网络整体架构
2. 域名信息
3. 端口信息
4. 站点信息
5. 搜索引擎利用
6. 社会工程学
7. 参考链接
4. 常见漏洞攻防
1. SQL注入
2. XSS
Expand Down Expand Up @@ -82,62 +88,80 @@
7. ASP
8. PowerShell
9. Shell
10. Csharp
6. 内网渗透
1. Windows内网渗透
2. Linux内网渗透
3. 后门技术
4. 综合技巧
5. 参考链接
7. 防御技术
7. 云安全
1. 容器标准
2. Docker
3. 参考链接
8. 防御技术
1. 团队建设
2. 安全开发
3. 威胁情报
4. ATT&CK
5. 风险控制
6. 防御框架
7. 加固检查
8. 入侵检测
9. 蜜罐技术
10. RASP
11. 应急响应
12. 溯源分析
8. 认证机制
1. SSO
2. JWT
3. OAuth
4. SAML
5. Windows
6. Kerberos
7. NTLM 身份验证
9. 工具与资源
2. 红蓝对抗
3. 安全开发
4. 安全建设
5. 威胁情报
6. ATT&CK
7. 风险控制
8. 防御框架
9. 加固检查
10. 入侵检测
11. 零信任安全
12. 蜜罐技术
13. RASP
14. 应急响应
15. 溯源分析
9. 认证机制
1. 多因子认证
2. SSO
3. JWT
4. OAuth
5. SAML
6. SCRAM
7. Windows
8. Kerberos
9. NTLM 身份验证
10. 工具与资源
1. 推荐资源
2. 相关论文
3. 信息收集
4. 社会工程学
5. 模糊测试
6. 漏洞利用
6. 漏洞利用/测试
7. 近源渗透
8. Web持久化
9. 横向移动
10. 操作系统持久化
11. 审计工具
12. 防御
13. 运维
14. 其他
10. 手册速查
10. 云安全
11. 操作系统持久化
12. 审计工具
13. 防御
14. 安全开发
15. 运维
16. 取证
17. 其他
11. 手册速查
1. 爆破工具
2. 下载工具
3. 流量相关
4. 嗅探工具
5. SQLMap使用
11. 其他
12. 其他
1. 代码审计
2. WAF
3. Unicode
4. 拒绝服务攻击
5. Docker
6. APT
7. 近源渗透
3. 常见网络设备
4. 指纹
5. Unicode
6. JSON
7. 拒绝服务攻击
8. 邮件安全
9. APT
10. 供应链安全
11. 近源渗透
12. 常见术语

### 本地编译
---
Expand All @@ -149,7 +173,7 @@ pip install sphinx sphinx-rtd-theme
make html
```

### Contribution
### 贡献
---

如果有任何的问题、意见或者建议欢迎以Issue或PR的形式提出,不胜感激。
Expand Down
192 changes: 192 additions & 0 deletions README_en.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,192 @@
# Network Security notes

![](https://img.shields.io/github/stars/lylemi/learn-web-hacking.svg)
![](https://img.shields.io/github/forks/lylemi/learn-web-hacking.svg)
![](https://img.shields.io/github/issues/lylemi/learn-web-hacking.svg)
![](https://img.shields.io/github/license/lylemi/learn-web-hacking.svg)

[中文版 README(Chinese version ReadME)](https://github.com/LyleMi/Learn-Web-Hacking/blob/master/README.md)

[Link to notes](https://websec.readthedocs.io)

# About
---
Upon diving into the vast ocean of knowledge that is Network security, the author realized that many topics and concepts often are scattered and unorganized. Learning becomes unnecessarily difficult without a well layed out structure or guide. Thus after grasping the basics, attempted to gather concepts, record them and eventually lead to the creation of this note compilation. The hope is that it can assist those who are planning to learn network security.

Before starting, the question of "what is network security?" needs to be answered. Frankly speaking, network security consists of a series of content, including topics such as websites, web applications, web services and numerous more. In other words, network security focuses on the security of applications and the interactive level. The necessary knowledges of network security includes network protocols, properties of networking applications, their security risks and the usage of various applications. These catagories can be complicated, therefore try the following logic to disassemble and reorganize relevant contents for ease of understanding.

#

To better understand why the field of Web security is the way it is now, and what direction each study is headed, it is necessary to understand the history of the development and evolution of Web application and network attack and defense technologies. This is also the first part of the notes, focusing around the development and evolution of Web technologies, and the basics of the security field.

The second part of this compliation introduces some of the basics of computer networks. Considering that there are many branches of network databases, web servers, and the rapidly evolution of the field, only network protocols will be covered. The skipped part regarding network applications should be understood with the accompany of various programming languages, web application frameworks, network services and operating system features.

With some foundation, the focus shifts to some more detailed content on attack and defense, such as the study of vulnerability types, programming languages, characteristics of applications and their corresponding security issues. This is the third part of notes. A brief description is provided on information gathering, commonly seen Web vulnerabitlites, languages and frameworks and techiniques on intranet penetration testing. Meanwhile there is also an importance in cloud technology as it becomes an important part of the web world. Whether it is using public cloud to build light services, private cloud. Technologies such as containers are becoming more and more important

The fourth part returns to the defensive perspective, describing the construction of a security team, threat intelligence and risk control perspectives, as well as some description of more detailed technical content such as honeypots and traceability.

The last portion focuses on the introduction and usage of applications. Included is a list of recommendation for applications and resources, and some contents that are currently unclassified.

#
The above is the overall summerization of the content, but order is not mandatory. The topic can be from anywhere and start from anywhere of interest. This complilation can be used both as a whole and as a handbook.

As the author is also learning and is human, it is inevitable for errors or incompletes in the process of organizing notes. Errors will fixed and information added in a timely fashion. If there exists any mistakes, readers are welcomed to criticize and correct them through [Issue](https://github.com/LyleMi/Learn-Web-Hacking/issues/new) or [PR](https://github.com/LyleMi/Learn-Web-Hacking/pulls). Help is much appreciated.

A lot of sources were used as reference in the making of these notes, all of which are left with the corresponding links at the end of the article. Many thanks to the authors for sharing these articles. Online versions of the Network Security notes can be viewed [here](https://websec.readthedocs.io)

It is important to note that only this Readme is translated at the moment. Readers can use the translated [table of contents](#table-of-contents) as reference in finding specific topics and read the notes with the help of an translator.

# table of contents
---
1. Prologue (序章)
1. Evolution of networking technology (Web技术演化)
2. Evolution of offensive and defensive networking technology (网络攻防技术演化)
3. Network Security perspective (安全观)
4. Laws and regulations (法律与法观)
2. Computer networks and networking protocols (计算机网络与协议)
1. networking fundamentals (网络基础)
2. UDP protocol (UDP协议)
3. TCP protocol (TCP协议)
4. DHCP protocol (DHCP协义)
5. Routing algorithms (路由算法)
6. Domain name system (域名系统)
7. HTTP protocol (HTTP协议簇)
8. Simple Mail transfer protocol (邮件协议族)
9. SSL/TLS
10. IPsec
11. Wi-Fi
3. information collection (信息收集)
1. Network architecture (网络整体架构)
2. Domain (域名信息)
3. Ports (端口信息)
4. Website (站点信息)
5. Search engine usage (搜索引擎利用)
6. Social engineering (社会工程学)
7. Reference Links (参考链接)
4. Common vulnerability offensive and defensive techiniques (常见漏洞攻防)
1. SQL injection (SQL注入)
2. XSS
3. CSRF
4. SSRF
5. Command injection (命令注入)
6. directory traversal (目录穿越)
7. File Reading (文件读取)
8. File upload (文件上传)
9. File contained (文件包含)
10. XXE
11. Template injection (模版注入)
12. Xpath injection (Xpath注入)
13. Logic/buiness vulnerability (逻辑漏洞 / 业务漏洞()
14. hardware safety (配置安全)
15. middleware (中间件)
16. Web cache deception (Web Cache欺骗攻击)
17. HTTP request smuggling (HTTP 请求走私)
5. Language and framework (语言与框架)
1. PHP
2. Python
3. Java
4. JavaScript
5. Golang
6. Ruby
7. ASP
8. PowerShell
9. Shell
10. Csharp
6. intranet penetration (内网渗透)
1. windows intranet penetration (Windows内网渗透)
2. linus intranet penetration (Linux内网渗透)
3. Backdoor technology 后门技术
4. General techiniques (综合技巧)
5. reference links (参考链接)
7. Cloud security (云安全)
1. Container properties (容器标准)
2. Docker
3. reference links (参考链接)
8. Defence techiniques (防御技术)
1. Team building (团队建设)
2. Red/Blue teaming (红蓝对抗)
3. Security development (安全开发)
4. Security construction (安全建设)
5. Threat intelligence (威胁情报)
6. ATT&CK
7. Risk control (风险控制)
8. Defensive framework (防御框架)
9. Reinforcement inspection (加固检查)
10. Intrusion Detection (入侵检测)
11. Zero-trust security (零信任安全)
12. Honeypot technology (蜜罐技术)
13. RASP
14. Emergency Response (应急响应)
15. Traceability Analysis (溯源分析_
9. Authentication mechanism (认证机制)
1. Multi-factor authentication (多因子认证)
2. SSO
3. JWT
4. OAuth
5. SAML
6. SCRAM
7. Windows
8. Kerberos
9. NT LAN Manager (NTLM 身份验证)
10. Tools & Resources (工具与资源)
1. Recommanded Resources (推荐资源)
2. Relevant articles (相关论文)
3. information collection (信息收集)
4. Social engineering (社会工程学)
5. Fuzzing (模糊测试)
6. Vulnerability exploitation/testing (漏洞利用/测试)
7. local infiltration (近源渗透)
8. Web persistence (Web持久化)
9. Lateral movement (横向移动)
10. Cloud security (云安全)
11. Operating system persistence (操作系统持久化)
12. audit tools (审计工具)
13. defence (防御)
14. Security development (安全开发)
15. Operation and maintenance (运维)
16. Forensic (取证)
17. Others (其他)
11. Handbook quicksearch (手册速查)
1. Blasting tools (爆破工具)
2. download tools (下载工具)
3. Flow related (流量相关)
4. sniffing tools (嗅探工具)
5. SQLMap Usage (SQLMap使用)
12. Other (其他)
1. Code audit (代码审计)
2. WAF
3. Common Networking Devices (常见网络设备)
4. Fingerprints (指纹)
5. Unicode
6. JSON
7. Denial of Service Attacks (拒绝服务攻击)
8. Email Security (邮件安全)
9. APT
10. Supply Chain Security (供应链安全)
11. local infiltration (近源渗透)
12. Commonly used Jargons (常见术语)

### local editing
---
```bash
git clone https://github.com/LyleMi/Learn-Web-Hacking.git
cd Learn-Web-Hacking
pip install sphinx sphinx-rtd-theme
make html
```
### Contributions
---

Questions and suggestions are welcomed through Issue or PR, much appreciated.

Thanks to all who [contributed](https://github.com/LyleMi/Learn-Web-Hacking/graphs/contributors).

### License
---

Published through license CC0 1.0, click [here](https://github.com/LyleMi/Learn-Web-Hacking/blob/master/LICENSE) to view

### note
---

The content of notes is collected and organized from open source information, and the technologies mentioned are for learning, authorized testing and other legal scenarios only. For public safety reasons, some of the content is not included. Readers are requested to comply with the legal provisions of the [Network Security Law of the People's Republic of China](http://www.npc.gov.cn/npc/xinwen/2016-11/07/content_2001605.htm), the Regulations of the People's Republic of China on Computer Software Protection, etc. and not to non-authorized targets for any kind of testing.

0 comments on commit 5e4f9b2

Please sign in to comment.