Happy Year of the Dragon, we have prepared a New Year Internet Security Gift Package for everyone!

1. Misunderstandings and traps in self-study network security learning

1. Don’t try to become a programmer first (programming-based learning) and then start learning

In my previous answers, I have repeatedly stressed that you should not start learning network security based on programming. Generally speaking, learning programming not only has a long learning cycle, but also does not provide much key knowledge that can be used after the actual transition to security.

If the average person wants to learn programming well before starting to learn network security, it often takes a long time and it is easy to give up halfway. Moreover, learning programming is just a tool and not the purpose. Our goal is not to become programmers. It is recommended that in the process of learning network security, you should make up for what you don’t know, so that it can be more purposeful and less time-consuming.

2. Don’t take deep learning as the first lesson

Many people are eager to learn network security well and solidly, so it is easy to push too hard and fall into a misunderstanding: deep learning is required for all content, but taking deep learning as the first lesson of network security is not What a great idea. Here’s why:

[1] The black box nature of deep learning is more obvious, and it is easy to learn in one go.

【2】Deep learning has high requirements on oneself, is not suitable for self-study, and can easily lead to a dead end.

3. Don’t collect too much information

There are a lot of learning materials about network security on the Internet, and there are several gigabytes of materials that can be downloaded or viewed. And many friends have a "collecting habit", buying more than a dozen books at once, or collecting dozens of videos.

Many online learning materials are extremely repetitive and most of the content has not been updated a few years ago. During the introductory period, it is recommended to choose "small but refined" materials. Below I will recommend some learning resources that I think are good for beginners. Please read them patiently.

2. Some preliminary preparations for learning network security

1.Hardware selection

I am often asked, "Does learning network security require a computer with high configuration?" The answer is no. Computers used by hackers do not need high configuration, as long as they are stable. Because some programs used by hackers require low-end CPUs. It can run very well and does not take up much memory. Another thing is that hacking is done under DOS commands, so the computer can be used at its best! So, don’t buy a new machine in the name of learning...

2.Software selection

Many people are confused about whether to use Linux, Windows or Mac systems to learn hacking. Although Linux looks very cool, it is not friendly to newcomers. Windows systems can also use virtual machines to install target machines for learning.

As for programming languages, Python is the first choice because of its good expansion support. Of course, many websites on the market are developed with PHP, so it is okay to choose PHP. Other languages ​​include C++, Java…

Many friends will ask whether they need to learn all languages? the answer is negative! To quote my sentence above: Learning programming is just a tool, not a purpose. Our goal is not to become programmers.

(An additional thing to mention here is that although learning programming cannot get you started, it can determine how far you can go on the road to network security, so it is recommended that you learn some basic programming knowledge by yourself)

3.Language ability

We know that computers were first invented in the West. Many terms or codes are in English. Even some existing tutorials were originally translated from the original English version. It usually takes a week for a vulnerability to be discovered and translated into Chinese. At this time difference, the loopholes may have been patched. And if you don’t understand some professional terms, you will have obstacles when communicating with other hackers about technology or experience, so you need a certain amount of English and hacker terms (you don’t need to be particularly proficient, but you need to be able to understand the basics)

For example: Broiler, Trojan, shell, WebShell, etc.

3. Network security learning route

The first stage: Getting started with basic operations and learning basic knowledge

The first step to get started is to study some current mainstream security tool courses and books on basic principles. Generally speaking, this process takes about one month.

At this stage, you already have a basic understanding of cybersecurity. If you have completed the first step, I believe you have theoretically understood what the above is SQL injection, what is an XSS attack, and have mastered the basic operations of security tools such as burp, msf, and cs. The most important thing at this time is to start laying the foundation!

The so-called "laying the foundation" is actually the systematic learning of basic computer knowledge. If you want to learn network security well, you must first have 5 basic knowledge modules:

1. Operating system

2.Protocol/Network

3.Database

4. Development language

5. Principles of common vulnerabilities

What is the use of learning these basic knowledge?

The level of knowledge in various computer fields determines the upper limit of your penetration level.

[1] For example: If you have a high level of programming, you will be better than others in code auditing, and the vulnerability exploitation tools you write will be easier to use than others;

[2] For example: If you have a high level of database knowledge, then when you conduct SQL injection attacks, you can write more and better SQL injection statements and bypass WAFs that others cannot;

[3] For example: if your network level is high, then when you penetrate the intranet, you can understand the target's network architecture more easily than others. If you get a network topology, you can know where you are and the configuration of a router. File, you will know what routing they have done;

【4】For another example, if your operating system is good, your rights will be stronger, your information collection efficiency will be higher, and you can efficiently filter out the information you want to get.

The second stage: practical operation

1. Mining SRC

The purpose of digging SRC is mainly to put skills into practice. The biggest illusion of learning network security is to feel that you know everything, but when it comes to actually digging for vulnerabilities, you are at a loss. SRC is a very good opportunity to apply skills.

2. Learn from technology sharing posts (vulnerability mining type)

Watch and study all the 0day mining posts in the past ten years, and then build an environment to reproduce the vulnerabilities, think about and learn the author's digging thinking, and cultivate your own penetration thinking​​​​​​

3. Shooting range practice

Build your own shooting range or go to a free shooting range website to practice. If possible, you can purchase it or sign up for a reliable training institution, which usually has a supporting shooting range practice.

The third stage: Participate in CTF competition or HVV action

Recommended: CTF competition

CTF has three points:

【1】The opportunity to get close to actual combat. Cyber ​​security laws are very strict now, unlike before where everyone could mess around

【2】The topics keep up with the cutting edge of technology, but many books lag behind

【3】If you are a college student, it will also be helpful for finding a job in the future.

If you want to play CTF competition, go directly to the questions. If you don’t understand the questions, then go to the information based on what you don’t understand.

Recommended: HVV (protection net)

HVV has four points:

【1】It can also greatly train you and improve your skills. It is best to participate in the HVV action held every year.

【2】You can get to know many big shots in the industry and expand your network.

【3】HVV’s salary is also very high, so you can make a lot of money by joining it.

[4] Just like the CTF competition, if you are a college student, it will also be helpful for finding a job in the future.

4. Recommendation of study materials

Recommended book list:

Computer operating system:

【1】Coding: the language hidden behind computer software and hardware

【2】In-depth understanding of the operating system

【3】In-depth understanding of Windows operating system

【4】Linux kernel and implementation

Programming development category:

【1】 windows programming

【2】windwos core becomes

【3】Linux Programming

【4】Advanced transformation of unix environment

【5】IOS becomes

【6】The first line of code Android

【7】C programming language design

【8】C primer plus

【9】C and pointers

【10】C Expert Programming

【11】C Traps and Defects

【12】Assembly language (Wang Shuang)

【13】java core technology

【14】java programming ideas

【15】Python core programming

【16】Linuxshell script strategy

【17】Introduction to Algorithms

【18】Compilation principle

【19】Practical combat of compilation and decompilation technology

【20】How to clean your code

【21】Code encyclopedia

【22】Detailed explanation of TCP/IP

【23】Rootkit: Lurkers in the gray area of ​​the system

【24】Hacker attack and defense technology guide

【25】Encryption and decryption

【26】C++ disassembly and reverse analysis technology revealed

【27】Web security testing

【28】White hat talks about web security

【29】Proficient in script hacking

【30】Web front-end hacking technology revealed

【31】Applications for programmers

【32】English Writing Handbook: Elements of Style

Common network security and forums

  • Snow Forum
  • safety class
  • safe cow
  • Safety internal reference
  • Green Alliance
  • Prophetic Community
  • XCTF Alliance

I have also compiled some network security information for you below. If you don’t want to look for it one by one, you can refer to this information.

Video tutorial

SRC&hacker technical documentation

Collection of Hacking Tools

If you also want to learn : Hacking & Network Security SQL Attack and Defense

Get it here:

This is the latest and most comprehensive network security learning material package that I spent several days and nights compiling to share with you for free. It contains the following things:

1. Learning route & career planning

Insert image description here
Insert image description here

2. Full set of system courses & entry to mastery

Insert image description here

3. Hacker e-books & interview materials

Insert image description here

Guess you like

Origin blog.csdn.net/shangguanliubei/article/details/135322444