20,199,302 2019-2020-2 "network attack and defense practice," the first week of operation

"Network attack and defense practice the" first job
job belongs courses: https://edu.cnblogs.com/campus/besti/19attackdefense/
operational requirements: https://edu.cnblogs.com/campus/besti/19attackdefense/homework/ 10415

First, the study concluded

1, collate and summarize knowledge

 + 安全漏洞的生命周期
    - 安全漏洞研究与挖掘
    - 渗透攻击代码开发与测试
    - 安全漏洞和渗透攻击代码在封闭团队中流传
    - 安全漏洞和渗透攻击代码开始扩散
    - 恶意程序出现并开始传播
    - 渗透攻击/恶意程序大规模传播并危害互联网
    - 渗透攻击代码/攻击工具/恶意程序逐渐消亡

2, learning problems encountered and solutions

 + 问题1:网络攻击步骤中“查点” 是做什么不是很清楚
    - 问题1解决办法:百度看帖子,查到网络服务查点的意思是探测服务的ip和版本号等信息

3, learning for life experience, etc. (learning)

 + 学习方法
    - 基于问题驱动
    - PCDL problem condition difficult level
    - TIPO target input process output 
    - 思维导图

Second, after-school job

1, the hacker movie appreciation, write a film review published in the personal blog, or social engineering or physical attacks to intercept fragments from the film and television work, which explain the use of the means of attack, to be specific comments.

Social engineering

Morpheus after being caught Smith, I think this should be a social worker in intimidation, psychological pressure exerted by psychological deterrent to Morpheus, Morpheus let say the collapse of zion password.

2, by means of social engineering attempt to obtain personal information about other students, and to expand your social worker process, including success and failure.

To allow students to test software on the grounds, so that they receive a call and get the other ip camera to take pictures and mail back to the function of the executable file (20,199,303 students provided by the school number), thereby obtaining each other's photos and ip and device user name. Sorry, directly request the test code:


After double-click it to open the executable file, he received his information:
ip address:


Photo shoot:


The student when photographing environment in low light, but dimly see:


When later told that the purpose of the executable file:


If my account is stolen, my friends send some malicious code like ~

So, the teacher's words still have to listen to it!

Guess you like

Origin www.cnblogs.com/eosmomo/p/12378554.html