Skip to content

Latest commit

 

History

History
189 lines (167 loc) · 9.97 KB

README.en.md

File metadata and controls

189 lines (167 loc) · 9.97 KB

Web Hacking Study Notes

中文版 README

Link to notes

About


Upon diving into the vast ocean of knowledge about cybersecurity, I realized that many topics and concepts often are scattered and unorganized. Learning becomes unnecessarily difficult without a well-laid-out structure or guide. Thus after grasping the basics, attempted to gather concepts, record them and eventually lead to the creation of this note. The hope is that it can assist those who are planning to learn web hacking.

Before starting, the question of "what is web hacking?" needs to be answered. Frankly speaking, web hacking consists of a series of content, including topics such as websites, web applications, web services, and numerous more. In other words, web hacking focuses on the security of applications and the interactive level. The necessary knowledge of web hacking includes network protocols, properties of networking applications, their security risks, and the usage of various applications. These categories can be complicated, therefore try the following logic to disassemble and reorganize relevant contents for ease of understanding.

To better understand why the field of web security is the way it is now, and what direction each study is headed, it is necessary to understand the history of the development and evolution of web application and network attack and defense technologies. This is also the first part of the notes, focusing around the development and evolution of web technologies, and the basics of the security field.

The second part of this note introduces some of the basics of computer networks. Considering that there are many branches of databases, web servers, and the rapidly evolution of the field, only network protocols will be covered. The skipped part regarding network applications should be understood with the accompany of various programming languages, web application frameworks, network services and operating system features.

With some foundation, the focus shifts to some more detailed content on attack and defense, such as the study of vulnerability types, programming languages, characteristics of applications and their corresponding security issues. This is the third part of notes. A brief description is provided on information gathering, commonly seen web vulnerabitlites, languages and frameworks and techiniques on intranet penetration testing. Meanwhile there is also an importance in cloud technology as it becomes an important part of the web world. Whether it is using public cloud to build light services, private cloud. Technologies such as containers are becoming more and more important

The fourth part returns to the defensive perspective, describing the construction of a security team, threat intelligence and risk control perspectives, as well as some description of more detailed technical content such as honeypots and traceability.

The last portion focuses on the introduction and usage of applications. Included is a list of recommendation for applications and resources, and some contents that are currently unclassified.

The above is the overall summerization of the content, but order is not mandatory. The topic can be from anywhere and start from anywhere of interest. This complilation can be used both as a whole and as a handbook.

Since the author is also studying, mistakes or incompleteness are inevitable in the process of organizing notes. Errors will fixed and information added in a timely fashion. If there exists any mistakes, readers are welcomed to criticize and correct them through Issue or PR. Help is much appreciated.

A lot of sources were used as reference in the making of these notes, all of which are left with the corresponding links at the end of the article. Many thanks to the authors for sharing these articles. Online versions of this notes can be viewed here

It is important to note that only this Readme is translated at the moment. Readers can use the translated table of contents as reference in finding specific topics and read the notes with the help of an translator.

table of contents


  1. Prologue (序章)
    1. Evolution of networking technology (Web技术演化)
    2. Evolution of offensive and defensive networking technology (网络攻防技术演化)
    3. Network Security perspective (安全观)
    4. Laws and regulations (法律与法观)
  2. Computer networks and networking protocols (计算机网络与协议)
    1. networking fundamentals (网络基础)
    2. UDP protocol (UDP协议)
    3. TCP protocol (TCP协议)
    4. DHCP protocol (DHCP协义)
    5. Routing algorithms (路由算法)
    6. Domain name system (域名系统)
    7. HTTP protocol (HTTP协议簇)
    8. Simple Mail transfer protocol (邮件协议族)
    9. SSL/TLS
    10. IPsec
    11. Wi-Fi
  3. information collection (信息收集)
    1. Network architecture (网络整体架构)
    2. Domain (域名信息)
    3. Ports (端口信息)
    4. Website (站点信息)
    5. Search engine usage (搜索引擎利用)
    6. Social engineering (社会工程学)
    7. Reference Links (参考链接)
  4. Common vulnerability offensive and defensive techiniques (常见漏洞攻防)
    1. SQL injection (SQL注入)
    2. XSS
    3. CSRF
    4. SSRF
    5. Command injection (命令注入)
    6. directory traversal (目录穿越)
    7. File Reading (文件读取)
    8. File upload (文件上传)
    9. File contained (文件包含)
    10. XXE
    11. Template injection (模版注入)
    12. Xpath injection (Xpath注入)
    13. Logic/buiness vulnerability (逻辑漏洞 / 业务漏洞()
    14. hardware safety (配置安全)
    15. middleware (中间件)
    16. Web cache deception (Web Cache欺骗攻击)
    17. HTTP request smuggling (HTTP 请求走私)
  5. Language and framework (语言与框架)
    1. PHP
    2. Python
    3. Java
    4. JavaScript
    5. Golang
    6. Ruby
    7. ASP
    8. PowerShell
    9. Shell
    10. Csharp
  6. intranet penetration (内网渗透)
    1. windows intranet penetration (Windows内网渗透)
    2. linus intranet penetration (Linux内网渗透)
    3. Backdoor technology 后门技术
    4. General techiniques (综合技巧)
    5. reference links (参考链接)
  7. Cloud security (云安全)
    1. Container properties (容器标准)
    2. Docker
    3. reference links (参考链接)
  8. Defence techiniques (防御技术)
    1. Team building (团队建设)
    2. Red/Blue teaming (红蓝对抗)
    3. Security development (安全开发)
    4. Security construction (安全建设)
    5. Threat intelligence (威胁情报)
    6. ATT&CK
    7. Risk control (风险控制)
    8. Defensive framework (防御框架)
    9. Reinforcement inspection (加固检查)
    10. Intrusion Detection (入侵检测)
    11. Zero-trust security (零信任安全)
    12. Honeypot technology (蜜罐技术)
    13. RASP
    14. Emergency Response (应急响应)
    15. Traceability Analysis (溯源分析_
  9. Authentication mechanism (认证机制)
    1. Multi-factor authentication (多因子认证)
    2. SSO
    3. JWT
    4. OAuth
    5. SAML
    6. SCRAM
    7. Windows
    8. Kerberos
    9. NT LAN Manager (NTLM 身份验证)
  10. Tools & Resources (工具与资源)
    1. Recommanded Resources (推荐资源)
    2. Relevant articles (相关论文)
    3. information collection (信息收集)
    4. Social engineering (社会工程学)
    5. Fuzzing (模糊测试)
    6. Vulnerability exploitation/testing (漏洞利用/测试)
    7. local infiltration (近源渗透)
    8. Web persistence (Web持久化)
    9. Lateral movement (横向移动)
    10. Cloud security (云安全)
    11. Operating system persistence (操作系统持久化)
    12. audit tools (审计工具)
    13. defence (防御)
    14. Security development (安全开发)
    15. Operation and maintenance (运维)
    16. Forensic (取证)
    17. Others (其他)
  11. Handbook quicksearch (手册速查)
    1. Blasting tools (爆破工具)
    2. download tools (下载工具)
    3. Flow related (流量相关)
    4. sniffing tools (嗅探工具)
    5. SQLMap Usage (SQLMap使用)
  12. Other (其他)
    1. Code audit (代码审计)
    2. WAF
    3. Common Networking Devices (常见网络设备)
    4. Fingerprints (指纹)
    5. Unicode
    6. JSON
    7. Denial of Service Attacks (拒绝服务攻击)
    8. Email Security (邮件安全)
    9. APT
    10. Supply Chain Security (供应链安全)
    11. local infiltration (近源渗透)
    12. Commonly used Jargons (常见术语)

local editing


git clone https://github.com/LyleMi/Learn-Web-Hacking.git
cd Learn-Web-Hacking
pip install sphinx sphinx-rtd-theme
make html

Contributions


Questions and suggestions are welcomed through Issue or PR, much appreciated.

Thanks to all who contributed.

License


Published through license CC0 1.0, click here to view

note


The content of notes is collected and organized from open source information, and the technologies mentioned are for learning, authorized testing and other legal scenarios only. For public safety reasons, some of the content is not included. Readers are requested to comply with the legal provisions of the Network Security Law of the People's Republic of China, the Regulations of the People's Republic of China on Computer Software Protection, etc. and not to non-authorized targets for any kind of testing.