{"id":237,"date":"2022-09-30T13:59:10","date_gmt":"2022-09-30T05:59:10","guid":{"rendered":"https:\/\/www.yuyiares.com\/?p=237"},"modified":"2022-09-30T15:29:18","modified_gmt":"2022-09-30T07:29:18","slug":"ceh-v11-moudle-1-introduction","status":"publish","type":"post","link":"https:\/\/www.yuyiares.com\/?p=237","title":{"rendered":"CEH v11 Moudle 1 &#8211; Introduction"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"237\" class=\"elementor elementor-237\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-bd895b4 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-column-slider-no wpr-equal-height-no\" data-id=\"bd895b4\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-d9accf6\" data-id=\"d9accf6\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-52b4cf6 elementor-widget elementor-widget-text-editor\" data-id=\"52b4cf6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>\u9019\u4e00\u7ae0\u7bc0\u4e0d\u7528\u82b1\u592a\u591a\u6642\u9593\u3002<\/p><p>\u57fa\u672c\u4e0a\u8981\u8003CEH\u7684\u4eba\uff0c\u53ea\u9700\u8981\u6ce8\u610f\u898f\u7ae0\u90a3\u90e8\u5206\u5373\u53ef\uff0c\u5176\u4ed6\u61c9\u8a72\u90fd\u6709\u6982\u5ff5\u3002<br><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-138f2a3 elementor-widget elementor-widget-heading\" data-id=\"138f2a3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">0x00 \u8cc7\u5b89\u8981\u7d20<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d8ee640 elementor-widget elementor-widget-text-editor\" data-id=\"d8ee640\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li><span data-position=\"155\" data-size=\"42\">Elements of Information Security (\u8cc7\u8a0a\u5b89\u5168\u7684\u5143\u7d20)<\/span><ul><li><span data-position=\"203\" data-size=\"22\">Confiedemtiality (\u4fdd\u5bc6\u6027)<\/span><ul><li><span data-position=\"232\" data-size=\"15\">\u78ba\u8a8d&#8221;\u8cc7\u8a0a\u50c5\u8b93\u6709\u6b0a\u9650\u7684\u4eba\u5b58\u53d6&#8221;<\/span><\/li><\/ul><\/li><li><span data-position=\"418\" data-size=\"15\">Integrity (\u5b8c\u6574\u6027)<\/span><ul><li><span data-position=\"440\" data-size=\"17\">\u78ba\u4fdd&#8221;\u8cc7\u6599\u4e0d\u6703\u88ab\u975e\u6cd5\u6b0a\u9650\u7684\u4eba\u7ac4\u6539&#8221;<\/span><\/li><\/ul><\/li><li><span data-position=\"515\" data-size=\"18\">Availability (\u53ef\u7528\u6027)<\/span><ul><li><span data-position=\"540\" data-size=\"19\">\u78ba\u4fdd&#8221;\u7cfb\u7d71\u80fd\u5920\u88ab\u8a8d\u8b49\u7684\u4f7f\u7528\u8005\u6b63\u5e38\u4f7f\u7528&#8221;<\/span><\/li><\/ul><\/li><li><span data-position=\"606\" data-size=\"18\">Authenticity (\u9451\u5225\u59d3)<\/span><ul><li><span data-position=\"631\" data-size=\"21\">\u78ba\u4fdd&#8221;\u6587\u4ef6\u3001\u901a\u8a0a\u3001\u8cc7\u6599\u7684\u7279\u5fb5\u662f\u771f\u5be6\u4e14\u6b63\u78ba&#8221;<\/span><\/li><\/ul><\/li><li><span data-position=\"691\" data-size=\"23\">Non-Requdiation (\u4e0d\u53ef\u5426\u8a8d\u6027)<\/span><ul><li><span data-position=\"721\" data-size=\"21\">\u78ba\u4fdd&#8221;\u8a0a\u606f\u7684\u767c\u9001\u8005\u7121\u6cd5\u5426\u8a8d\u81ea\u5df1\u767c\u51fa\u7684\u8a0a\u606f&#8221;<\/span><\/li><\/ul><\/li><\/ul><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9afe16d elementor-widget elementor-widget-heading\" data-id=\"9afe16d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">0x01 \u653b\u64ca<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e1be189 elementor-widget elementor-widget-text-editor\" data-id=\"e1be189\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-position=\"758\" data-size=\"62\">Attacks \u653b\u64ca =<\/span><\/p><p><span data-position=\"758\" data-size=\"62\">Motive \u52d5\u6a5f(Goal \u76ee\u6a19) + Method \u65b9\u6cd5 + Vulnerability \u6f0f\u6d1e<\/span><\/p><ul><li style=\"list-style-type: none;\"><ul><li class=\"\" data-startline=\"28\" data-endline=\"28\" data-position=\"825\" data-size=\"0\"><span data-position=\"825\" data-size=\"26\">\u653b\u64ca\u8981\u6709 \u653b\u64ca\u65b9\u7684&#8221;\u65b9\u6cd5\u3001\u52d5\u6a5f&#8221; \u8207 \u9632\u79a6\u65b9\u7684\u6f0f\u6d1e<\/span><\/li><\/ul><\/li><li class=\"\" data-startline=\"29\" data-endline=\"32\" data-position=\"855\" data-size=\"0\">\u00a0<\/li><li class=\"\" data-startline=\"31\" data-endline=\"31\" data-position=\"916\" data-size=\"0\"><span data-position=\"916\" data-size=\"22\">Implementation Error <\/span><span class=\"mathjax\"><span id=\"MathJax-Element-2-Frame\" class=\"mjx-chtml MathJax_CHTML\" tabindex=\"0\" role=\"presentation\" data-mathml=\"&lt;math xmlns=&quot;http:\/\/www.w3.org\/1998\/Math\/MathML&quot;&gt;&lt;mo stretchy=&quot;false&quot;&gt;&amp;#x21D2;&lt;\/mo&gt;&lt;\/math&gt;\"><span id=\"MJXc-Node-4\" class=\"mjx-math\" aria-hidden=\"true\"><span id=\"MJXc-Node-5\" class=\"mjx-mrow\"><span id=\"MJXc-Node-6\" class=\"mjx-mo\"><span class=\"mjx-char MJXc-TeX-main-R\">\u21d2<\/span><\/span><\/span><\/span><\/span><\/span><span data-position=\"951\" data-size=\"10\"> \u900f\u904e\u8a2d\u5b9a\u6d41\u7a0b\u4f86\u9632\u79a6<\/span><ul><li class=\"\" data-startline=\"32\" data-endline=\"32\" data-position=\"966\" data-size=\"0\"><span data-position=\"966\" data-size=\"13\">Security Cap <\/span><span class=\"mathjax\"><span id=\"MathJax-Element-3-Frame\" class=\"mjx-chtml MathJax_CHTML\" tabindex=\"0\" role=\"presentation\" data-mathml=\"&lt;math xmlns=&quot;http:\/\/www.w3.org\/1998\/Math\/MathML&quot;&gt;&lt;mo stretchy=&quot;false&quot;&gt;&amp;#x21D2;&lt;\/mo&gt;&lt;\/math&gt;\"><span id=\"MJXc-Node-7\" class=\"mjx-math\" aria-hidden=\"true\"><span id=\"MJXc-Node-8\" class=\"mjx-mrow\"><span id=\"MJXc-Node-9\" class=\"mjx-mo\"><span class=\"mjx-char MJXc-TeX-main-R\">\u21d2<\/span><\/span><\/span><\/span><\/span><\/span><span data-position=\"992\" data-size=\"9\"> \u53ea\u80fd\u900f\u904e\u906e\u853d\u6f0f\u6d1e<\/span><\/li><\/ul><\/li><li class=\"\" data-startline=\"33\" data-endline=\"34\" data-position=\"1004\" data-size=\"0\"><br \/><ul><li class=\"\" data-startline=\"34\" data-endline=\"34\" data-position=\"1018\" data-size=\"0\"><span data-position=\"1018\" data-size=\"27\">\u6839\u64da Vulnerability \u627e\u51fa\u76f8\u5c0d\u61c9\u7684\u65b9\u6cd5\u653b\u64ca<\/span><\/li><\/ul><\/li><li class=\"\" data-startline=\"35\" data-endline=\"37\" data-position=\"1048\" data-size=\"0\"><span data-position=\"1048\" data-size=\"6\">Motive<\/span><ul><li class=\"\" data-startline=\"36\" data-endline=\"36\" data-position=\"1059\" data-size=\"0\"><span data-position=\"1059\" data-size=\"7\">(\u4ee5\u653b\u64ca\u89d2\u5ea6)<\/span><\/li><li class=\"\" data-startline=\"37\" data-endline=\"37\" data-position=\"1071\" data-size=\"0\"><span data-position=\"1071\" data-size=\"33\">religious(\u5b97\u6559),political(\u653f\u6cbb),etc\u2026<\/span><\/li><\/ul><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6a7a72c elementor-widget elementor-widget-heading\" data-id=\"6a7a72c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Vulnerability<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f338ab5 elementor-widget elementor-widget-text-editor\" data-id=\"f338ab5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li class=\"\" data-startline=\"30\" data-endline=\"30\" data-position=\"874\" data-size=\"0\"><span data-position=\"874\" data-size=\"13\">Design flow <\/span><span class=\"mathjax\"><span id=\"MathJax-Element-1-Frame\" class=\"mjx-chtml MathJax_CHTML\" tabindex=\"0\" role=\"presentation\" data-mathml=\"&lt;math xmlns=&quot;http:\/\/www.w3.org\/1998\/Math\/MathML&quot;&gt;&lt;mo stretchy=&quot;false&quot;&gt;&amp;#x21D2;&lt;\/mo&gt;&lt;\/math&gt;\"><span id=\"MJXc-Node-1\" class=\"mjx-math\" aria-hidden=\"true\"><span id=\"MJXc-Node-2\" class=\"mjx-mrow\"><span id=\"MJXc-Node-3\" class=\"mjx-mo\"><span class=\"mjx-char MJXc-TeX-main-R\">\u21d2<\/span><\/span><\/span><\/span><\/span><\/span><span data-position=\"900\" data-size=\"11\"> \u53ef\u4ee5\u900f\u904e\u66f4\u65b0\u4fee\u88dc\u6f0f\u6d1e<\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9650757 elementor-widget elementor-widget-heading\" data-id=\"9650757\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Method<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b1795da elementor-widget elementor-widget-text-editor\" data-id=\"b1795da\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li class=\"\" data-startline=\"30\" data-endline=\"30\" data-position=\"874\" data-size=\"0\"><span data-position=\"1018\" data-size=\"27\">\u6839\u64da Vulnerability \u627e\u51fa\u76f8\u5c0d\u61c9\u7684\u65b9\u6cd5\u653b\u64ca<\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4949e9a elementor-widget elementor-widget-heading\" data-id=\"4949e9a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Motive<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2a3de1f elementor-widget elementor-widget-text-editor\" data-id=\"2a3de1f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li class=\"\" data-startline=\"36\" data-endline=\"36\" data-position=\"1059\" data-size=\"0\"><span data-position=\"1059\" data-size=\"7\">\u653b\u64ca\u89d2\u5ea6<\/span><\/li><li class=\"\" data-startline=\"37\" data-endline=\"37\" data-position=\"1071\" data-size=\"0\"><span data-position=\"1071\" data-size=\"33\">religious(\u5b97\u6559),political(\u653f\u6cbb),etc\u2026<\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b9b2fcc elementor-widget elementor-widget-heading\" data-id=\"b9b2fcc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">0x01 - A Threat Categories<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b80023d elementor-widget elementor-widget-text-editor\" data-id=\"b80023d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li class=\"\" data-startline=\"39\" data-endline=\"47\" data-position=\"1137\" data-size=\"0\"><span data-position=\"1137\" data-size=\"15\">Network Threats<\/span><ul><li class=\"\" data-startline=\"40\" data-endline=\"40\" data-position=\"1157\" data-size=\"0\"><span data-position=\"1157\" data-size=\"21\">Information gathering<\/span><\/li><li class=\"\" data-startline=\"41\" data-endline=\"41\" data-position=\"1183\" data-size=\"0\"><span data-position=\"1183\" data-size=\"26\">Sniffing and eavesdropping<\/span><\/li><li class=\"\" data-startline=\"42\" data-endline=\"42\" data-position=\"1214\" data-size=\"0\"><span data-position=\"1214\" data-size=\"17\">DNS\/ARP Poisoning<\/span><\/li><li class=\"\" data-startline=\"43\" data-endline=\"43\" data-position=\"1236\" data-size=\"0\"><span data-position=\"1236\" data-size=\"31\">MITM (Man-in-the-Middle Attack)<\/span><\/li><li class=\"\" data-startline=\"44\" data-endline=\"44\" data-position=\"1272\" data-size=\"0\"><span data-position=\"1272\" data-size=\"8\">DoS\/DDoS<\/span><\/li><li class=\"\" data-startline=\"45\" data-endline=\"45\" data-position=\"1285\" data-size=\"0\"><span data-position=\"1285\" data-size=\"22\">Password-based attacks<\/span><\/li><li class=\"\" data-startline=\"46\" data-endline=\"46\" data-position=\"1312\" data-size=\"0\"><span data-position=\"1312\" data-size=\"23\">Firewall and IDS attack<\/span><\/li><li class=\"\" data-startline=\"47\" data-endline=\"47\" data-position=\"1340\" data-size=\"0\"><span data-position=\"1340\" data-size=\"17\">Session Hijacking<\/span><\/li><\/ul><\/li><li class=\"\" data-startline=\"48\" data-endline=\"56\" data-position=\"1360\" data-size=\"0\"><span data-position=\"1360\" data-size=\"12\">Host Threats<\/span><ul><li class=\"\" data-startline=\"49\" data-endline=\"49\" data-position=\"1377\" data-size=\"0\"><span data-position=\"1377\" data-size=\"17\">Password cracking<\/span><\/li><li class=\"\" data-startline=\"50\" data-endline=\"50\" data-position=\"1399\" data-size=\"0\"><span data-position=\"1399\" data-size=\"15\">Malware attacks<\/span><\/li><li class=\"\" data-startline=\"51\" data-endline=\"51\" data-position=\"1419\" data-size=\"0\"><span data-position=\"1419\" data-size=\"12\">Footprinting<\/span><\/li><li class=\"\" data-startline=\"52\" data-endline=\"52\" data-position=\"1436\" data-size=\"0\"><span data-position=\"1436\" data-size=\"9\">Profiling<\/span><\/li><li class=\"\" data-startline=\"53\" data-endline=\"53\" data-position=\"1450\" data-size=\"0\"><span data-position=\"1450\" data-size=\"24\">Arbitrary code execution<\/span><\/li><li class=\"\" data-startline=\"54\" data-endline=\"54\" data-position=\"1479\" data-size=\"0\"><span data-position=\"1479\" data-size=\"15\">Backdoor access<\/span><\/li><li class=\"\" data-startline=\"55\" data-endline=\"55\" data-position=\"1499\" data-size=\"0\"><span data-position=\"1499\" data-size=\"20\">Privilege Escalation<\/span><\/li><li class=\"\" data-startline=\"56\" data-endline=\"56\" data-position=\"1524\" data-size=\"0\"><span data-position=\"1524\" data-size=\"14\">Code Execution<\/span><\/li><\/ul><\/li><li class=\"\" data-startline=\"57\" data-endline=\"68\" data-position=\"1541\" data-size=\"0\"><span data-position=\"1541\" data-size=\"19\">Application Threats<\/span><ul><li class=\"\" data-startline=\"58\" data-endline=\"58\" data-position=\"1565\" data-size=\"0\"><span data-position=\"1565\" data-size=\"17\">Injection Attacks<\/span><\/li><li class=\"\" data-startline=\"59\" data-endline=\"59\" data-position=\"1587\" data-size=\"0\"><span data-position=\"1587\" data-size=\"30\">Improper data\/input validation<\/span><\/li><li class=\"\" data-startline=\"60\" data-endline=\"60\" data-position=\"1622\" data-size=\"0\"><span data-position=\"1622\" data-size=\"49\">Improper error handling and exeception management<\/span><\/li><li class=\"\" data-startline=\"61\" data-endline=\"61\" data-position=\"1676\" data-size=\"0\"><span data-position=\"1676\" data-size=\"25\">Hidden-field manipulation<\/span><\/li><li class=\"\" data-startline=\"62\" data-endline=\"62\" data-position=\"1706\" data-size=\"0\"><span data-position=\"1706\" data-size=\"25\">Broken session management<\/span><\/li><li class=\"\" data-startline=\"63\" data-endline=\"63\" data-position=\"1736\" data-size=\"0\"><span data-position=\"1736\" data-size=\"19\">Cryptography issues<\/span><\/li><li class=\"\" data-startline=\"64\" data-endline=\"64\" data-position=\"1760\" data-size=\"0\"><span data-position=\"1760\" data-size=\"13\">SQL injection<\/span><\/li><li class=\"\" data-startline=\"65\" data-endline=\"65\" data-position=\"1778\" data-size=\"0\"><span data-position=\"1778\" data-size=\"8\">Phishing<\/span><\/li><li class=\"\" data-startline=\"66\" data-endline=\"66\" data-position=\"1791\" data-size=\"0\"><span data-position=\"1791\" data-size=\"15\">Buffer Overflow<\/span><\/li><li class=\"\" data-startline=\"67\" data-endline=\"67\" data-position=\"1811\" data-size=\"0\"><span data-position=\"1811\" data-size=\"22\">Information disclosure<\/span><\/li><li class=\"\" data-startline=\"68\" data-endline=\"68\" data-position=\"1838\" data-size=\"0\"><span data-position=\"1838\" data-size=\"26\">Security Misconfigurations<\/span><\/li><\/ul><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-990b0a5 elementor-widget elementor-widget-heading\" data-id=\"990b0a5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">0x01 - B Attack Vectors<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0b4c060 elementor-widget elementor-widget-text-editor\" data-id=\"0b4c060\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li class=\"\" data-startline=\"70\" data-endline=\"71\" data-position=\"1894\" data-size=\"0\"><span data-position=\"1894\" data-size=\"33\">APT &#8211; Advanced Persistent Threats<\/span><ul><li data-startline=\"71\" data-endline=\"71\" data-position=\"1932\" data-size=\"0\">\u96b1\u853d\u7684\u5a01\u8105\u884c\u70ba<\/li><li data-startline=\"71\" data-endline=\"71\" data-position=\"1932\" data-size=\"0\">\u901a\u5e38\u662f\u96b1\u85cf\u5728\u7db2\u8def\u4e2d\u4e00\u6bb5\u6642\u9593<\/li><li data-startline=\"71\" data-endline=\"71\" data-position=\"1932\" data-size=\"0\">\u901a\u5e38\u6703\u900f\u904eZero day \u9032\u884c\u6ef2\u900f<\/li><\/ul><\/li><li class=\"\" data-startline=\"72\" data-endline=\"73\" data-position=\"2177\" data-size=\"0\"><span data-position=\"2177\" data-size=\"42\">Cloud computing \/ Cloud based technologies<\/span><ul><li class=\"\" data-startline=\"73\" data-endline=\"73\" data-position=\"2224\" data-size=\"0\"><span data-position=\"2224\" data-size=\"83\">\u96f2\u7684\u8a2d\u5b9a\u6709\u554f\u984c<\/span><\/li><li data-startline=\"73\" data-endline=\"73\" data-position=\"2224\" data-size=\"0\">\u96f2\u4e4b\u9593\u7684\u4e92\u76f8\u653b\u64ca<\/li><\/ul><\/li><li class=\"\" data-startline=\"74\" data-endline=\"75\" data-position=\"2310\" data-size=\"0\"><span data-position=\"2310\" data-size=\"27\">Viruses, worms, and malware<\/span><ul><li class=\"\" data-startline=\"75\" data-endline=\"75\" data-position=\"2342\" data-size=\"0\">\u77ed\u6642\u9593\u5feb\u901f\u611f\u67d3\u5927\u91cf\u4e3b\u6a5f<\/li><\/ul><\/li><li class=\"\" data-startline=\"76\" data-endline=\"77\" data-position=\"2459\" data-size=\"0\"><span data-position=\"2459\" data-size=\"10\">Ransomware<\/span><ul><li data-startline=\"77\" data-endline=\"77\" data-position=\"2474\" data-size=\"0\">\u9650\u5236\u5c0d\u7cfb\u7d71\u548c\u6587\u4ef6\u7684\u5b58\u53d6<\/li><li data-startline=\"77\" data-endline=\"77\" data-position=\"2474\" data-size=\"0\">\u5e38\u898b\u7684\u52d2\u7d22\u75c5\u6bd2<\/li><\/ul><\/li><li class=\"\" data-startline=\"78\" data-endline=\"78\" data-position=\"2626\" data-size=\"0\"><span data-position=\"2626\" data-size=\"21\">Mobile Device threats<\/span><\/li><li class=\"\" data-startline=\"79\" data-endline=\"80\" data-position=\"2650\" data-size=\"0\"><span data-position=\"2650\" data-size=\"7\">Botnets<\/span><ul><li class=\"\" data-startline=\"80\" data-endline=\"80\" data-position=\"2662\" data-size=\"0\"><span data-position=\"2662\" data-size=\"90\">Huge network of compromised systems used by an intruder to perform various network attacks<\/span><\/li><\/ul><\/li><li class=\"\" data-startline=\"81\" data-endline=\"83\" data-position=\"2755\" data-size=\"0\"><span data-position=\"2755\" data-size=\"15\">Insider attacks<\/span><ul><li class=\"\" data-startline=\"82\" data-endline=\"82\" data-position=\"2775\" data-size=\"0\"><span data-position=\"2775\" data-size=\"51\">Disgruntled employee can damage assets from inside.<\/span><\/li><\/ul><\/li><li class=\"\" data-startline=\"84\" data-endline=\"84\" data-position=\"2885\" data-size=\"0\"><span data-position=\"2885\" data-size=\"16\">Phishing attacks<\/span><\/li><li class=\"\" data-startline=\"85\" data-endline=\"86\" data-position=\"2904\" data-size=\"0\"><span data-position=\"2904\" data-size=\"23\">Web Application Threats<\/span><ul><li class=\"\" data-startline=\"86\" data-endline=\"86\" data-position=\"2932\" data-size=\"0\"><span data-position=\"2932\" data-size=\"57\">Attacks like SQL injection, XSS (Cross-site scripting)\u2026<\/span><\/li><\/ul><\/li><li class=\"\" data-startline=\"87\" data-endline=\"89\" data-position=\"2992\" data-size=\"0\"><span data-position=\"2992\" data-size=\"11\">IoT Threats<\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-802764a elementor-widget elementor-widget-heading\" data-id=\"802764a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">0x02 Classification of Attacks\n  <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5d20def elementor-widget elementor-widget-text-editor\" data-id=\"5d20def\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li class=\"\" data-startline=\"91\" data-endline=\"93\" data-position=\"3048\" data-size=\"0\"><span data-position=\"3048\" data-size=\"15\">Passive Attacks<\/span><ul><li class=\"\" data-startline=\"92\" data-endline=\"92\" data-position=\"3068\" data-size=\"0\"><span data-position=\"3068\" data-size=\"19\">\u76f4\u63a5\u63a5\u89f8\u76ee\u6a19\u7db2\u8def\uff0c\u4e3b\u8981\u70ba\u6514\u622a\u548c\u7db2\u8def\u76e3\u63a7<\/span><\/li><li class=\"\" data-startline=\"93\" data-endline=\"93\" data-position=\"3092\" data-size=\"0\"><span data-position=\"3092\" data-size=\"33\">EX: sniffing \u3001 eavesdropping (\u7aca\u807d)<\/span><\/li><\/ul><\/li><li class=\"\" data-startline=\"94\" data-endline=\"96\" data-position=\"3128\" data-size=\"0\"><span data-position=\"3128\" data-size=\"14\">Active Attacks<\/span><ul><li class=\"\" data-startline=\"95\" data-endline=\"95\" data-position=\"3147\" data-size=\"0\"><span data-position=\"3147\" data-size=\"19\">\u4e0d\u6703\u76f4\u63a5\u63a5\u89f8\u76ee\u6a19\uff0c\u5982\u5e72\u64fe\u901a\u8a0a\uff0c\u7e5e\u904e\u7cfb\u7d71<\/span><\/li><li class=\"\" data-startline=\"96\" data-endline=\"96\" data-position=\"3171\" data-size=\"0\"><span data-position=\"3171\" data-size=\"61\">EX: Dos,Man-in-the-Middke,session hijacking and SQL injection<\/span><\/li><\/ul><\/li><li class=\"\" data-startline=\"97\" data-endline=\"100\" data-position=\"3236\" data-size=\"0\"><span data-position=\"3236\" data-size=\"15\">Close-in (NEW)<\/span><ul><li class=\"\" data-startline=\"98\" data-endline=\"98\" data-position=\"3256\" data-size=\"0\"><span data-position=\"3256\" data-size=\"18\">\u900f\u904e\u7269\u7406\u4e0a\u7684\u63a5\u8fd1\u4f86\u7372\u53d6\u76ee\u6a19\u7684\u90e8\u5206\u8cc7\u8a0a<\/span><\/li><li class=\"\" data-startline=\"99\" data-endline=\"99\" data-position=\"3279\" data-size=\"0\"><span data-position=\"3279\" data-size=\"64\">EX:\u3000eavesdropping,shoulder surfing(\u80a9\u625b\u5f0f\u885d\u6d6a) ,dumpster diving(\u5783\u573e\u641c\u5c0b)<\/span><\/li><li class=\"\" data-startline=\"100\" data-endline=\"100\" data-position=\"3348\" data-size=\"0\"><span data-position=\"3348\" data-size=\"8\">\u5be6\u969b\u4e16\u754c\u4e0a\u7684\u624b\u6cd5<\/span><\/li><\/ul><\/li><li class=\"\" data-startline=\"101\" data-endline=\"103\" data-position=\"3359\" data-size=\"0\"><span data-position=\"3359\" data-size=\"21\">Insider Attacks (NWE)<\/span><ul><li class=\"\" data-startline=\"102\" data-endline=\"102\" data-position=\"3385\" data-size=\"0\"><span data-position=\"3385\" data-size=\"24\">\u4f7f\u7528\u7279\u6b0a\u4e14\u9055\u53cd\u898f\u5b9a\u6216\u662f\u5c0d\u76ee\u6a19\u7684\u7cfb\u7d71\u3001\u8cc7\u8a0a\u9020\u6210\u5a01\u8105<\/span><\/li><li class=\"\" data-startline=\"103\" data-endline=\"103\" data-position=\"3415\" data-size=\"0\"><span data-position=\"3415\" data-size=\"58\">EX: theft of physical device,planting keyloggers,backdoors<\/span><\/li><\/ul><\/li><li class=\"\" data-startline=\"104\" data-endline=\"107\" data-position=\"3476\" data-size=\"0\"><span data-position=\"3476\" data-size=\"26\">Distribution Attacks (NEW)<\/span><ul><li class=\"\" data-startline=\"105\" data-endline=\"105\" data-position=\"3507\" data-size=\"0\"><span data-position=\"3507\" data-size=\"13\">\u611f\u67d3\u5ee0\u5546\uff0c\u5c0e\u81f4\u65bc\u4f9b\u61c9\u93c8\u653b\u64ca<\/span><\/li><li class=\"\" data-startline=\"106\" data-endline=\"107\" data-position=\"3526\" data-size=\"0\"><span data-position=\"3526\" data-size=\"12\">\u901a\u5e38\u75db\u904e\u611f\u67d3\u8edf\u9ad4\u6216\u662f\u786c\u9ad4<\/span><\/li><\/ul><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f25210e elementor-widget elementor-widget-heading\" data-id=\"f25210e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">0x02 - A Threat Categories<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7fc5418 elementor-widget elementor-widget-text-editor\" data-id=\"7fc5418\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li class=\"\" data-startline=\"109\" data-endline=\"111\" data-position=\"3566\" data-size=\"0\"><span data-position=\"3566\" data-size=\"16\">Operating System<\/span><ul><li class=\"\" data-startline=\"110\" data-endline=\"111\" data-position=\"3587\" data-size=\"0\"><span data-position=\"3587\" data-size=\"97\">OS\u7684\u6f0f\u6d1e\u8207\u5b89\u5168\u8a2d\u5b9a<\/span><ul><li class=\"\" data-startline=\"110\" data-endline=\"111\" data-position=\"3587\" data-size=\"0\"><span data-position=\"3691\" data-size=\"98\">Buffer overflows, <\/span><\/li><li class=\"\" data-startline=\"110\" data-endline=\"111\" data-position=\"3587\" data-size=\"0\"><span data-position=\"3691\" data-size=\"98\">Protocol Implementations<\/span><\/li><li class=\"\" data-startline=\"110\" data-endline=\"111\" data-position=\"3587\" data-size=\"0\"><span data-position=\"3691\" data-size=\"98\"> software defects<\/span><\/li><li class=\"\" data-startline=\"110\" data-endline=\"111\" data-position=\"3587\" data-size=\"0\"><span data-position=\"3691\" data-size=\"98\"> patch levels <\/span><\/li><li class=\"\" data-startline=\"110\" data-endline=\"111\" data-position=\"3587\" data-size=\"0\"><span data-position=\"3691\" data-size=\"98\">authentication schemes<\/span><\/li><\/ul><\/li><\/ul><\/li><li class=\"\" data-startline=\"115\" data-endline=\"117\" data-position=\"3925\" data-size=\"0\"><span data-position=\"3925\" data-size=\"16\">Misconfiguration<\/span><ul><li class=\"\" data-startline=\"116\" data-endline=\"117\" data-position=\"3946\" data-size=\"0\"><span data-position=\"3946\" data-size=\"112\">\u56e0\u8a2d\u5b9a\u7684\u4e0d\u7576\u6216\u662f\u67b6\u69cb\u4e0d\u5b89\u5168\uff0c\u5c0e\u81f4\u51fa\u73fe\u5b89\u5168\u6f0f\u6d1e<\/span><ul><li class=\"\" data-startline=\"116\" data-endline=\"117\" data-position=\"3946\" data-size=\"0\"><span data-position=\"4067\" data-size=\"57\">Improper permissions of SQL users<\/span><\/li><li class=\"\" data-startline=\"116\" data-endline=\"117\" data-position=\"3946\" data-size=\"0\"><span data-position=\"4067\" data-size=\"57\"> Access-list permit all<\/span><\/li><\/ul><\/li><\/ul><\/li><li class=\"\" data-startline=\"118\" data-endline=\"121\" data-position=\"4127\" data-size=\"0\"><span data-position=\"4127\" data-size=\"16\">Shrink-Wrap Code<\/span><ul><li class=\"\" data-startline=\"119\" data-endline=\"119\" data-position=\"4149\" data-size=\"0\">\u539f\u751f\u5143\u4ef6\u6216\u4e2d\u7684\u9810\u8a2d\u5f31\u9ede\u6216\u6b0a\u9650\u914d\u7f6e<\/li><li class=\"\" data-startline=\"120\" data-endline=\"121\" data-position=\"4224\" data-size=\"0\"><span data-position=\"4224\" data-size=\"80\">Default passwords<\/span><\/li><\/ul><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c3df08a elementor-widget elementor-widget-heading\" data-id=\"c3df08a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">0x03 \u653b\u64ca\u7df4\n  <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8873ad1 elementor-widget elementor-widget-text-editor\" data-id=\"8873ad1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>\u4e3b\u8981\u53ef\u4ee5\u5206\u6210\u4e09\u500b\u968e\u6bb5<\/p><ul><li><span class=\"VIiyi\" lang=\"zh-TW\"><span class=\"JLqJ4b ChMk0b\"><span class=\"Q4iAWc\">Pre-Attack Phase &#8211; \u5075\u5bdf\u548c\u6578\u64da\u6536\u96c6\u3002<\/span><\/span> <\/span><\/li><li><span class=\"VIiyi\" lang=\"zh-TW\"><span class=\"JLqJ4b ChMk0b\"><span class=\"Q4iAWc\">Attack Phase &#8211; \u5617\u8a66\u7a7f\u900f\u7db2\u7d61\u4e26\u57f7\u884c\u653b\u64ca\u3002<\/span><\/span> <\/span><\/li><li><span class=\"VIiyi\" lang=\"zh-TW\"><span class=\"JLqJ4b ChMk0b\"><span class=\"Q4iAWc\">Post-Attack Phase- \u6e05\u7406\u4ee5\u5c07\u7cfb\u7d71\u8fd4\u56de\u5230\u653b\u64ca\u524d\u72c0\u614b\u4e26\u63d0\u4f9b\u5831\u544a\u3002<\/span><\/span><\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8f8025e elementor-widget elementor-widget-heading\" data-id=\"8f8025e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">0x03 - A Cyber kill Chain<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7461510 elementor-widget elementor-widget-text-editor\" data-id=\"7461510\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul class=\"part in-view\" data-startline=\"130\" data-endline=\"144\"><li class=\"\" data-startline=\"130\" data-endline=\"131\" data-position=\"4591\" data-size=\"0\"><span data-position=\"4591\" data-size=\"19\">Reconnaissance (\u5075\u67e5)<\/span><ul><li class=\"\" data-startline=\"131\" data-endline=\"131\" data-position=\"4615\" data-size=\"0\"><span data-position=\"4615\" data-size=\"6\">\u7372\u53d6\u76ee\u6a19\u8cc7\u8a0a<\/span><\/li><\/ul><\/li><li class=\"\" data-startline=\"132\" data-endline=\"133\" data-position=\"4624\" data-size=\"0\"><span data-position=\"4624\" data-size=\"19\">Weaponization (\u6b66\u5668\u5316)<\/span><ul><li class=\"\" data-startline=\"133\" data-endline=\"133\" data-position=\"4648\" data-size=\"0\"><span data-position=\"4648\" data-size=\"15\">\u88fd\u4f5c\u4e00\u500b\u60e1\u610f\u4ee3\u78bc\u4f7f\u7528\u6f0f\u6d1e\u6216\u5f8c\u9580<\/span><\/li><\/ul><\/li><li class=\"\" data-startline=\"134\" data-endline=\"135\" data-position=\"4666\" data-size=\"0\"><span data-position=\"4666\" data-size=\"16\">Delivery (\u50b3\u9001\/\u611f\u67d3)<\/span><ul><li class=\"\" data-startline=\"135\" data-endline=\"135\" data-position=\"4687\" data-size=\"0\"><span data-position=\"4687\" data-size=\"30\">\u50b3\u9001&#8221;\u88fd\u4f5c\u51fa\u4f86\u7684\u5de5\u5177&#8221;\u5230\u76ee\u6a19\uff0c\u900f\u904eemail\u6216\u662fusb\u2026<\/span><\/li><\/ul><\/li><li class=\"\" data-startline=\"136\" data-endline=\"137\" data-position=\"4720\" data-size=\"0\"><span data-position=\"4720\" data-size=\"17\">Exploitation (\u5229\u7528)<\/span><ul><li class=\"\" data-startline=\"137\" data-endline=\"137\" data-position=\"4742\" data-size=\"0\"><span data-position=\"4742\" data-size=\"14\">\u5728\u76ee\u6a19\u7cfb\u7d71\u57f7\u884c\u7a0b\u5f0f\u4f86\u5229\u7528\u6f0f\u6d1e<\/span><\/li><\/ul><\/li><li class=\"\" data-startline=\"138\" data-endline=\"139\" data-position=\"4760\" data-size=\"0\"><span data-position=\"4760\" data-size=\"17\">Installation (\u5b89\u88dd)<\/span><ul><li class=\"\" data-startline=\"139\" data-endline=\"139\" data-position=\"4782\" data-size=\"0\"><span data-position=\"4782\" data-size=\"13\">\u5728\u76ee\u6a19\u7684\u7cfb\u7d71\u4e2d\u5b89\u88dd\u60e1\u610f\u7a0b\u5f0f<\/span><\/li><\/ul><\/li><li class=\"\" data-startline=\"140\" data-endline=\"141\" data-position=\"4799\" data-size=\"0\"><span data-position=\"4799\" data-size=\"27\">Command and Control (\u547d\u4ee4\u8207\u63a7\u5236)<\/span><ul><li class=\"\" data-startline=\"141\" data-endline=\"141\" data-position=\"4831\" data-size=\"0\"><span data-position=\"4831\" data-size=\"22\">\u5275\u5efa\u4e00\u500b c2c \u7684\u901a\u9053\u4f86\u50b3\u9001\u8cc7\u6599\u8207\u9032\u884c\u63a7\u5236<\/span><\/li><\/ul><\/li><li class=\"\" data-startline=\"142\" data-endline=\"144\" data-position=\"4857\" data-size=\"0\"><span data-position=\"4857\" data-size=\"21\">Actions on Objectives<\/span><ul><li class=\"\" data-startline=\"143\" data-endline=\"144\" data-position=\"4884\" data-size=\"0\"><span data-position=\"4884\" data-size=\"11\">\u63a1\u53d6\u884c\u52d5\u5df2\u9054\u6210\u9810\u671f\u76ee\u6a19<\/span><\/li><\/ul><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ce9bd56 elementor-widget elementor-widget-heading\" data-id=\"ce9bd56\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">0x03 - B Hacking Phase (LPT)<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c82be6e elementor-widget elementor-widget-text-editor\" data-id=\"c82be6e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li><span data-position=\"4931\" data-size=\"19\">Reconnaissance (\u5075\u67e5)<\/span><\/li><li><span data-position=\"5504\" data-size=\"22\">Scanning\u3000&amp; Enumeration<\/span><ul><li><span data-position=\"5531\" data-size=\"8\">network <\/span><span class=\"mathjax\"><span id=\"MathJax-Element-4-Frame\" class=\"mjx-chtml MathJax_CHTML\" tabindex=\"0\" role=\"presentation\" data-mathml=\"&lt;math xmlns=&quot;http:\/\/www.w3.org\/1998\/Math\/MathML&quot;&gt;&lt;mo stretchy=&quot;false&quot;&gt;&amp;#x21D2;&lt;\/mo&gt;&lt;\/math&gt;\"><span id=\"MJXc-Node-10\" class=\"mjx-math\" aria-hidden=\"true\"><span id=\"MJXc-Node-11\" class=\"mjx-mrow\"><span id=\"MJXc-Node-12\" class=\"mjx-mo\"><span class=\"mjx-char MJXc-TeX-main-R\">\u21d2<\/span><\/span><\/span><\/span><\/span><\/span><span data-position=\"5552\" data-size=\"15\"> live machines <\/span><span class=\"mathjax\"><span id=\"MathJax-Element-5-Frame\" class=\"mjx-chtml MathJax_CHTML\" tabindex=\"0\" role=\"presentation\" data-mathml=\"&lt;math xmlns=&quot;http:\/\/www.w3.org\/1998\/Math\/MathML&quot;&gt;&lt;mo stretchy=&quot;false&quot;&gt;&amp;#x21D2;&lt;\/mo&gt;&lt;\/math&gt;\"><span id=\"MJXc-Node-13\" class=\"mjx-math\" aria-hidden=\"true\"><span id=\"MJXc-Node-14\" class=\"mjx-mrow\"><span id=\"MJXc-Node-15\" class=\"mjx-mo\"><span class=\"mjx-char MJXc-TeX-main-R\">\u21d2<\/span><\/span><\/span><\/span><\/span><\/span><span data-position=\"5580\" data-size=\"6\"> port <\/span><span class=\"mathjax\"><span id=\"MathJax-Element-6-Frame\" class=\"mjx-chtml MathJax_CHTML\" tabindex=\"0\" role=\"presentation\" data-mathml=\"&lt;math xmlns=&quot;http:\/\/www.w3.org\/1998\/Math\/MathML&quot;&gt;&lt;mo stretchy=&quot;false&quot;&gt;&amp;#x21D2;&lt;\/mo&gt;&lt;\/math&gt;\"><span id=\"MJXc-Node-16\" class=\"mjx-math\" aria-hidden=\"true\"><span id=\"MJXc-Node-17\" class=\"mjx-mrow\"><span id=\"MJXc-Node-18\" class=\"mjx-mo\"><span class=\"mjx-char MJXc-TeX-main-R\">\u21d2<\/span><\/span><\/span><\/span><\/span><\/span><span data-position=\"5599\" data-size=\"10\"> services <\/span><span class=\"mathjax\"><span id=\"MathJax-Element-7-Frame\" class=\"mjx-chtml MathJax_CHTML\" tabindex=\"0\" role=\"presentation\" data-mathml=\"&lt;math xmlns=&quot;http:\/\/www.w3.org\/1998\/Math\/MathML&quot;&gt;&lt;mo stretchy=&quot;false&quot;&gt;&amp;#x21D2;&lt;\/mo&gt;&lt;\/math&gt;\"><span id=\"MJXc-Node-19\" class=\"mjx-math\" aria-hidden=\"true\"><span id=\"MJXc-Node-20\" class=\"mjx-mrow\"><span id=\"MJXc-Node-21\" class=\"mjx-mo\"><span class=\"mjx-char MJXc-TeX-main-R\">\u21d2<\/span><\/span><\/span><\/span><\/span><\/span><span data-position=\"5622\" data-size=\"10\">OS detail <\/span><span class=\"mathjax\"><span id=\"MathJax-Element-8-Frame\" class=\"mjx-chtml MathJax_CHTML\" tabindex=\"0\" role=\"presentation\" data-mathml=\"&lt;math xmlns=&quot;http:\/\/www.w3.org\/1998\/Math\/MathML&quot;&gt;&lt;mo stretchy=&quot;false&quot;&gt;&amp;#x21D2;&lt;\/mo&gt;&lt;\/math&gt;\"><span id=\"MJXc-Node-22\" class=\"mjx-math\" aria-hidden=\"true\"><span id=\"MJXc-Node-23\" class=\"mjx-mrow\"><span id=\"MJXc-Node-24\" class=\"mjx-mo\"><span class=\"mjx-char MJXc-TeX-main-R\">\u21d2<\/span><\/span><\/span><\/span><\/span><\/span><span data-position=\"5645\" data-size=\"16\"> vulnerabilities<\/span><\/li><li>\u7372\u53d6\u76f8\u95dc\u8cc7\u8a0a<\/li><\/ul><\/li><li><span data-position=\"5793\" data-size=\"14\">Gaining Access<\/span><ul><li><span data-position=\"5812\" data-size=\"14\">gaining access<\/span><span class=\"mathjax\"><span id=\"MathJax-Element-9-Frame\" class=\"mjx-chtml MathJax_CHTML\" tabindex=\"0\" role=\"presentation\" data-mathml=\"&lt;math xmlns=&quot;http:\/\/www.w3.org\/1998\/Math\/MathML&quot;&gt;&lt;mo stretchy=&quot;false&quot;&gt;&amp;#x21D2;&lt;\/mo&gt;&lt;\/math&gt;\"><span id=\"MJXc-Node-25\" class=\"mjx-math\" aria-hidden=\"true\"><span id=\"MJXc-Node-26\" class=\"mjx-mrow\"><span id=\"MJXc-Node-27\" class=\"mjx-mo\"><span class=\"mjx-char MJXc-TeX-main-R\">\u21d2<\/span><\/span><\/span><\/span><\/span><\/span><span data-position=\"5839\" data-size=\"50\"> password craking(Access Controls-Authentication) <\/span><span class=\"mathjax\"><span id=\"MathJax-Element-10-Frame\" class=\"mjx-chtml MathJax_CHTML\" tabindex=\"0\" role=\"presentation\" data-mathml=\"&lt;math xmlns=&quot;http:\/\/www.w3.org\/1998\/Math\/MathML&quot;&gt;&lt;mo stretchy=&quot;false&quot;&gt;&amp;#x21D2;&lt;\/mo&gt;&lt;\/math&gt;\"><span id=\"MJXc-Node-28\" class=\"mjx-math\" aria-hidden=\"true\"><span id=\"MJXc-Node-29\" class=\"mjx-mrow\"><span id=\"MJXc-Node-30\" class=\"mjx-mo\"><span class=\"mjx-char MJXc-TeX-main-R\">\u21d2<\/span><\/span><\/span><\/span><\/span><\/span><span data-position=\"5902\" data-size=\"31\"> escalate privileges(Bypassing)<\/span><ul><li>\u6c34\u5e73\u6b0a\u9650\u63d0\u5347<\/li><li>\u5782\u76f4\u6b0a\u9650\u63d0\u5347<\/li><\/ul><\/li><\/ul><\/li><li><span data-position=\"6461\" data-size=\"18\">Maintaining Access<\/span><ul><li><span data-position=\"6484\" data-size=\"53\">ownership(use backdoor,etc\u2026)\u2192launch further attacks<\/span><\/li><li>\u78ba\u4fdd\u4e4b\u5f8c\u80fd\u5920\u518d\u6b21\u5b58\u53d6<ul><li><span data-position=\"6593\" data-size=\"37\">Rookit,<\/span><\/li><li><span data-position=\"6593\" data-size=\"37\">Trojan<\/span><\/li><li><span data-position=\"6593\" data-size=\"37\"> Backdoor<\/span><\/li><\/ul><\/li><\/ul><\/li><li><span data-position=\"6633\" data-size=\"15\">Clearing Tracks<\/span><ul><li>\u6e05\u9664\u75d5\u8de1<ul><li><span data-position=\"6721\" data-size=\"66\">Clear the logs<\/span><\/li><\/ul><\/li><li>\u4e0d\u88ab\u767c\u73fe<br \/><ul><li><span data-position=\"6721\" data-size=\"66\">Obfuscate trojans or malicious backdoors programs.<\/span><\/li><\/ul><\/li><\/ul><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-eb238fd elementor-widget elementor-widget-heading\" data-id=\"eb238fd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">0x04 \u653b\u64ca\u624b\u6cd5\n  <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b131810 elementor-widget elementor-widget-text-editor\" data-id=\"b131810\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul class=\"part in-view\" data-startline=\"181\" data-endline=\"184\"><li class=\"\" data-startline=\"181\" data-endline=\"181\" data-position=\"6866\" data-size=\"0\"><span data-position=\"6866\" data-size=\"12\">Tactics (\u7b56\u7565)<\/span><\/li><li class=\"\" data-startline=\"182\" data-endline=\"182\" data-position=\"6881\" data-size=\"0\"><span data-position=\"6881\" data-size=\"15\">Techniques (\u6280\u8853)<\/span><\/li><li class=\"\" data-startline=\"183\" data-endline=\"184\" data-position=\"6899\" data-size=\"0\"><span data-position=\"6899\" data-size=\"15\">Procedures (\u7a0b\u5e8f)<\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b701f95 elementor-widget elementor-widget-heading\" data-id=\"b701f95\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">0x04 - A Vulnerability Categories<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d7e24f7 elementor-widget elementor-widget-text-editor\" data-id=\"d7e24f7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul class=\"part in-view\" data-startline=\"186\" data-endline=\"194\"><li class=\"\" data-startline=\"186\" data-endline=\"186\" data-position=\"6954\" data-size=\"0\"><span data-position=\"6954\" data-size=\"66\">Misconfiguration &#8211; <span class=\"VIiyi\" lang=\"zh-TW\"><span class=\"JLqJ4b ChMk0b C1N51c\"><span class=\"Q4iAWc\">\u4e0d\u7576\u7684\u8a2d\u5b9a<\/span><\/span><\/span><br \/><\/span><\/li><li class=\"\" data-startline=\"187\" data-endline=\"187\" data-position=\"7023\" data-size=\"0\"><span data-position=\"7023\" data-size=\"88\">Default installation &#8211; \u672a\u66f4\u6539\u7cfb\u7d71\u7684\u9ed8\u8a8d\u8a2d\u5b9a<br \/><\/span><\/li><li class=\"\" data-startline=\"188\" data-endline=\"188\" data-position=\"7114\" data-size=\"0\"><span data-position=\"7114\" data-size=\"37\">Buffer overflow &#8211; code execution flaw<\/span><\/li><li class=\"\" data-startline=\"189\" data-endline=\"189\" data-position=\"7154\" data-size=\"0\"><span data-position=\"7154\" data-size=\"52\">Missing patches &#8211; \u672a\u4fee\u88dc\u7684\u7cfb\u7d71<br \/><\/span><\/li><li class=\"\" data-startline=\"190\" data-endline=\"190\" data-position=\"7209\" data-size=\"0\"><span data-position=\"7209\" data-size=\"85\">Design flaws &#8211; \u7cfb\u7d71\u8a2d\u8a08\u7684\u554f\u984c\uff0c\u5982\u52a0\u5bc6\u7248\u672c\u3001\u8cc7\u6599\u9a57\u6574\u7b49\u7b49<br \/><\/span><\/li><li class=\"\" data-startline=\"191\" data-endline=\"191\" data-position=\"7297\" data-size=\"0\"><span data-position=\"7297\" data-size=\"50\">Operating System Flaws &#8211; flaws specific to each OS<\/span><\/li><li class=\"\" data-startline=\"192\" data-endline=\"194\" data-position=\"7350\" data-size=\"0\"><span data-position=\"7350\" data-size=\"79\">Default passwords &#8211; \u7cfb\u7d71\u9810\u8a2d\u7684\u5e33\u865f\u5bc6\u78bc<br \/><\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-63f5527 elementor-widget elementor-widget-heading\" data-id=\"63f5527\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">0x05 Adversary Behavior Identification\n  \n  <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-272a168 elementor-widget elementor-widget-text-editor\" data-id=\"272a168\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul class=\"part in-view\" data-startline=\"196\" data-endline=\"211\"><li class=\"\" data-startline=\"196\" data-endline=\"198\" data-position=\"7483\" data-size=\"0\"><span data-position=\"7483\" data-size=\"22\">Interal Reconnaissance<\/span><ul><li class=\"\" data-startline=\"197\" data-endline=\"197\" data-position=\"7510\" data-size=\"0\"><span data-position=\"7510\" data-size=\"14\">Insider attack<\/span><\/li><li class=\"\" data-startline=\"198\" data-endline=\"198\" data-position=\"7530\" data-size=\"0\"><span data-position=\"7530\" data-size=\"11\">Enumeration<\/span><\/li><\/ul><\/li><li class=\"\" data-startline=\"199\" data-endline=\"199\" data-position=\"7545\" data-size=\"0\"><span data-position=\"7545\" data-size=\"4\">Use <\/span><strong data-position=\"7549\" data-size=\"0\"><span data-position=\"7551\" data-size=\"10\">PowerShell<\/span><\/strong><\/li><li class=\"\" data-startline=\"200\" data-endline=\"201\" data-position=\"7566\" data-size=\"0\"><span data-position=\"7566\" data-size=\"28\">Unspecified Proxy Activities<\/span><ul><li class=\"\" data-startline=\"201\" data-endline=\"201\" data-position=\"7599\" data-size=\"0\"><span data-position=\"7599\" data-size=\"11\">MiTM Attack<\/span><\/li><\/ul><\/li><li class=\"\" data-startline=\"202\" data-endline=\"202\" data-position=\"7613\" data-size=\"0\"><span data-position=\"7613\" data-size=\"7\">Use of <\/span><strong data-position=\"7620\" data-size=\"0\"><span data-position=\"7622\" data-size=\"12\">Command-Line<\/span><\/strong><span data-position=\"7636\" data-size=\"10\"> Interface<\/span><\/li><li class=\"\" data-startline=\"203\" data-endline=\"204\" data-position=\"7649\" data-size=\"0\"><span data-position=\"7649\" data-size=\"15\">Http\u3000User Agent<\/span><ul><li class=\"\" data-startline=\"204\" data-endline=\"204\" data-position=\"7669\" data-size=\"0\"><span data-position=\"7669\" data-size=\"20\">tools -&gt; Web Browser<\/span><\/li><\/ul><\/li><li class=\"\" data-startline=\"205\" data-endline=\"206\" data-position=\"7693\" data-size=\"0\"><span data-position=\"7693\" data-size=\"26\">Command and Control Server<\/span><ul><li class=\"\" data-startline=\"206\" data-endline=\"206\" data-position=\"7724\" data-size=\"0\"><span data-position=\"7724\" data-size=\"10\">C2 Malware<\/span><\/li><\/ul><\/li><li class=\"\" data-startline=\"207\" data-endline=\"207\" data-position=\"7738\" data-size=\"0\"><span data-position=\"7738\" data-size=\"20\">Use of DNS Tunneling<\/span><\/li><li class=\"\" data-startline=\"208\" data-endline=\"208\" data-position=\"7761\" data-size=\"0\"><span data-position=\"7761\" data-size=\"16\">Use of Web Shell<\/span><\/li><li class=\"\" data-startline=\"209\" data-endline=\"211\" data-position=\"7780\" data-size=\"0\"><strong data-position=\"7780\" data-size=\"0\"><span data-position=\"7782\" data-size=\"12\">Data Staging<\/span><\/strong><span data-position=\"7796\" data-size=\"7\"> (\u6578\u64da\u66ab\u5b58)<\/span><ul><li class=\"\" data-startline=\"210\" data-endline=\"211\" data-position=\"7808\" data-size=\"0\"><span data-position=\"7808\" data-size=\"27\">Collection and Combine Data<\/span><\/li><\/ul><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d006721 elementor-widget elementor-widget-heading\" data-id=\"d006721\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">0x06  IoC \u884c\u70ba\u6307\u6a19\n  <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7ca3c55 elementor-widget elementor-widget-text-editor\" data-id=\"7ca3c55\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul class=\"part in-view\" data-startline=\"196\" data-endline=\"211\"><li class=\"\" data-startline=\"196\" data-endline=\"198\" data-position=\"7483\" data-size=\"0\">\u5f85\u88dc\u5145<\/li><li class=\"\" data-startline=\"196\" data-endline=\"198\" data-position=\"7483\" data-size=\"0\">\u96a8\u4fbf\u770b\u770b\u5373\u53ef<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-41e7cde elementor-widget elementor-widget-heading\" data-id=\"41e7cde\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">0x07  What is Hacking\n  \n  <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bf8814a elementor-widget elementor-widget-text-editor\" data-id=\"bf8814a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li class=\"\" data-startline=\"220\" data-endline=\"220\" data-position=\"8064\" data-size=\"0\"><span data-position=\"8064\" data-size=\"27\">excekkelent computer skills<\/span><\/li><li class=\"\" data-startline=\"221\" data-endline=\"221\" data-position=\"8094\" data-size=\"0\"><span data-position=\"8094\" data-size=\"5\">hobby<\/span><\/li><li class=\"\" data-startline=\"222\" data-endline=\"222\" data-position=\"8102\" data-size=\"0\"><span data-position=\"8102\" data-size=\"20\">probe and do illegal<\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b4a876e elementor-widget elementor-widget-heading\" data-id=\"b4a876e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">0x07-A Hacker<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6a60ef3 elementor-widget elementor-widget-text-editor\" data-id=\"6a60ef3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li><span data-position=\"7884\" data-size=\"11\">exploiting <\/span><span class=\"mathjax\"><span id=\"MathJax-Element-13-Frame\" class=\"mjx-chtml MathJax_CHTML\" tabindex=\"0\" role=\"presentation\" data-mathml=\"&lt;math xmlns=&quot;http:\/\/www.w3.org\/1998\/Math\/MathML&quot;&gt;&lt;mo stretchy=&quot;false&quot;&gt;&amp;#x21D2;&lt;\/mo&gt;&lt;\/math&gt;\"><span id=\"MJXc-Node-37\" class=\"mjx-math\" aria-hidden=\"true\"><span id=\"MJXc-Node-38\" class=\"mjx-mrow\"><span id=\"MJXc-Node-39\" class=\"mjx-mo\"><span class=\"mjx-char MJXc-TeX-main-R\">\u21d2 <\/span><\/span><\/span><\/span><\/span><\/span><span data-position=\"7908\" data-size=\"25\">(attack) vulnerabilities<\/span><\/li><li class=\"\" data-startline=\"216\" data-endline=\"216\" data-position=\"7936\" data-size=\"0\"><span data-position=\"7936\" data-size=\"18\">Security Controls <\/span><span class=\"mathjax\"><span id=\"MathJax-Element-14-Frame\" class=\"mjx-chtml MathJax_CHTML\" tabindex=\"0\" role=\"presentation\" data-mathml=\"&lt;math xmlns=&quot;http:\/\/www.w3.org\/1998\/Math\/MathML&quot;&gt;&lt;mo stretchy=&quot;false&quot;&gt;&amp;#x21D2;&lt;\/mo&gt;&lt;\/math&gt;\"><span id=\"MJXc-Node-40\" class=\"mjx-math\" aria-hidden=\"true\"><span id=\"MJXc-Node-41\" class=\"mjx-mrow\"><span id=\"MJXc-Node-42\" class=\"mjx-mo\"><span class=\"mjx-char MJXc-TeX-main-R\">\u21d2<\/span><\/span><\/span><\/span><\/span><\/span><span data-position=\"7967\" data-size=\"20\">(defense) exploiting<\/span><\/li><li class=\"\" data-startline=\"217\" data-endline=\"218\" data-position=\"7990\" data-size=\"0\"><span data-position=\"7990\" data-size=\"11\">exploiting <\/span><span class=\"mathjax\"><span id=\"MathJax-Element-15-Frame\" class=\"mjx-chtml MathJax_CHTML\" tabindex=\"0\" role=\"presentation\" data-mathml=\"&lt;math xmlns=&quot;http:\/\/www.w3.org\/1998\/Math\/MathML&quot;&gt;&lt;mo stretchy=&quot;false&quot;&gt;&amp;#x21D2;&lt;\/mo&gt;&lt;\/math&gt;\"><span id=\"MJXc-Node-43\" class=\"mjx-math\" aria-hidden=\"true\"><span id=\"MJXc-Node-44\" class=\"mjx-mrow\"><span id=\"MJXc-Node-45\" class=\"mjx-mo\"><span class=\"mjx-char MJXc-TeX-main-R\">\u21d2 <\/span><\/span><\/span><\/span><\/span><\/span><span data-position=\"8014\" data-size=\"10\">modifying <\/span><span class=\"mathjax\"><span id=\"MathJax-Element-16-Frame\" class=\"mjx-chtml MathJax_CHTML\" tabindex=\"0\" role=\"presentation\" data-mathml=\"&lt;math xmlns=&quot;http:\/\/www.w3.org\/1998\/Math\/MathML&quot;&gt;&lt;mo stretchy=&quot;false&quot;&gt;&amp;#x21D2;&lt;\/mo&gt;&lt;\/math&gt;\"><span id=\"MJXc-Node-46\" class=\"mjx-math\" aria-hidden=\"true\"><span id=\"MJXc-Node-47\" class=\"mjx-mrow\"><span id=\"MJXc-Node-48\" class=\"mjx-mo\"><span class=\"mjx-char MJXc-TeX-main-R\">\u21d2<\/span><\/span><\/span><\/span><\/span><\/span><span data-position=\"8037\" data-size=\"5\">\u00a0 loss<\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f2571db elementor-widget elementor-widget-heading\" data-id=\"f2571db\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">0x07-A Hacker<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-289c8ed elementor-widget elementor-widget-text-editor\" data-id=\"289c8ed\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li class=\"\" data-startline=\"224\" data-endline=\"224\" data-position=\"8146\" data-size=\"0\"><strong data-position=\"8146\" data-size=\"0\"><span data-position=\"8148\" data-size=\"10\">Black Hats <br \/><\/span><\/strong><\/li><li class=\"\" data-startline=\"225\" data-endline=\"225\" data-position=\"8163\" data-size=\"0\"><strong data-position=\"8163\" data-size=\"0\"><span data-position=\"8165\" data-size=\"10\">White Hats<\/span><\/strong><\/li><li class=\"\" data-startline=\"226\" data-endline=\"226\" data-position=\"8180\" data-size=\"0\"><strong data-position=\"8180\" data-size=\"0\"><span data-position=\"8182\" data-size=\"9\">Gray Hats<\/span><\/strong><\/li><li class=\"\" data-startline=\"227\" data-endline=\"227\" data-position=\"8196\" data-size=\"0\"><em data-position=\"8196\" data-size=\"0\"><span data-position=\"8197\" data-size=\"15\">Suicide Hackers<\/span><\/em><\/li><li class=\"\" data-startline=\"228\" data-endline=\"228\" data-position=\"8216\" data-size=\"0\"><em data-position=\"8216\" data-size=\"0\"><span data-position=\"8217\" data-size=\"14\">Script Kiddies<\/span><\/em><\/li><li class=\"\" data-startline=\"229\" data-endline=\"229\" data-position=\"8235\" data-size=\"0\"><span data-position=\"8235\" data-size=\"16\">Cyber Terrorists<\/span><\/li><li class=\"\" data-startline=\"230\" data-endline=\"230\" data-position=\"8254\" data-size=\"0\"><span data-position=\"8254\" data-size=\"15\">State-Sponsored<\/span><\/li><li class=\"\" data-startline=\"231\" data-endline=\"231\" data-position=\"8272\" data-size=\"0\"><span data-position=\"8272\" data-size=\"10\">Hacktivist<\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-edbb3aa elementor-widget elementor-widget-heading\" data-id=\"edbb3aa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">0x08 Ethical Hacking\n  \n  <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1207912 elementor-widget elementor-widget-text-editor\" data-id=\"1207912\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li class=\"\" data-startline=\"237\" data-endline=\"238\" data-position=\"8358\" data-size=\"0\"><span data-position=\"8358\" data-size=\"5\">Scope<\/span><ul><li class=\"\" data-startline=\"238\" data-endline=\"238\" data-position=\"8368\" data-size=\"0\"><span data-position=\"8368\" data-size=\"6\">\u6709\u6e96\u78ba\u7684\u7bc4\u570d<\/span><\/li><\/ul><\/li><li class=\"\" data-startline=\"239\" data-endline=\"240\" data-position=\"8378\" data-size=\"0\"><span data-position=\"8378\" data-size=\"11\">Limitations<\/span><ul><li class=\"\" data-startline=\"240\" data-endline=\"240\" data-position=\"8394\" data-size=\"0\"><span data-position=\"8394\" data-size=\"27\">\u6709\u9650\u5236(\u4e26\u975e\u96a8\u610f\u653b\u64ca,\u76ee\u7684\u4e26\u975e\u7671\u7613\u76ee\u6a19,\u800c\u662f\u627e\u51fa\u554f\u984c)<\/span><\/li><\/ul><\/li><li class=\"\" data-startline=\"241\" data-endline=\"243\" data-position=\"8425\" data-size=\"0\"><span data-position=\"8425\" data-size=\"15\">Ethical Hacking<\/span><ul><li class=\"\" data-startline=\"242\" data-endline=\"243\" data-position=\"8445\" data-size=\"0\"><span data-position=\"8445\" data-size=\"12\">\u70ba\u4e86\u9632\u79a6\u800c\u9032\u884c\u7684\u653b\u64ca\u884c\u70ba<\/span><\/li><\/ul><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cade931 elementor-widget elementor-widget-heading\" data-id=\"cade931\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">0x09 \u898f\u7bc4\u8207\u7d44\u7e54\n  \n  <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-03cab12 elementor-widget elementor-widget-text-editor\" data-id=\"03cab12\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>PCI-DSS\uff1a\u7dda\u4e0a\u91d1\u6d41\u6cd5\u6848<\/li><li>ISO\/IEC 27001:2013\uff1a\u8cc7\u8a0a\u5b89\u5168\u7ba1\u7406\u7cfb\u7d71\u898f\u7bc4<ul><li><span data-position=\"9502\" data-size=\"31\">\u6a19\u6e96\u65e8\u5728\u70ba\u5efa\u7acb\u3001\u5be6\u65bd\u3001\u7dad\u8b77\u548c\u6301\u7e8c\u6539\u9032\u4fe1\u606f\u5b89\u5168\u7ba1\u7406\u9ad4\u7cfb\u63d0\u4f9b\u8981\u6c42\u3002<\/span><\/li><\/ul><\/li><li>HIPAA\uff1a\u91ab\u7642\u8cc7\u8a0a\u6cd5\u6848<ul><li><span data-position=\"9760\" data-size=\"58\">\u300a\u5065\u5eb7\u4fdd\u96aa\u6d41\u901a\u8207\u8cac\u4efb\u6cd5\u6848\u300b\u662f\u4e00\u9805\u8a2d\u5b9a\u96b1\u79c1\u6a19\u6e96\u7684\u6cd5\u5f8b\uff0c\u65e8\u5728\u4fdd\u8b77\u91ab\u751f\u3001\u91ab\u9662\u548c\u4fdd\u96aa\u63d0\u4f9b\u5546\u4e4b\u9593\u5171\u4eab\u7684\u60a3\u8005\u91ab\u7642\u8a18\u9304\u548c\u5065\u5eb7\u4fe1\u606f\u3002<\/span><\/li><\/ul><\/li><li>SOX\uff1a\u5167\u7dda\u4ea4\u6613\u6cd5\u6848<\/li><li>DMCA\uff1a\u6578\u4f4d\u8457\u4f5c\u6b0a\u6cd5\u6848<\/li><li>FISMA\uff1a\u8cc7\u8a0a\u5b89\u5168\u7ba1\u7406\u6cd5\u6848<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>\u9019\u4e00\u7ae0\u7bc0\u4e0d\u7528\u82b1\u592a\u591a\u6642\u9593\u3002 \u57fa\u672c\u4e0a\u8981\u8003CEH\u7684\u4eba\uff0c\u53ea\u9700\u8981\u6ce8\u610f\u898f\u7ae0\u90a3\u90e8\u5206\u5373\u53ef\uff0c\u5176\u4ed6\u61c9\u8a72\u90fd\u6709\u6982\u5ff5\u3002 0x00 \u8cc7\u5b89\u8981\u7d20 Elements of Information Security (\u8cc7\u8a0a\u5b89\u5168\u7684\u5143\u7d20) Confiedemtiality (\u4fdd\u5bc6\u6027) \u78ba\u8a8d&#8221;\u8cc7\u8a0a\u50c5\u8b93\u6709\u6b0a\u9650\u7684\u4eba\u5b58\u53d6&#8221; Integrity (\u5b8c\u6574\u6027) \u78ba\u4fdd&#8221;\u8cc7\u6599\u4e0d\u6703\u88ab\u975e\u6cd5\u6b0a\u9650\u7684\u4eba\u7ac4\u6539&#8221; Availability (\u53ef\u7528\u6027) \u78ba\u4fdd&#8221;\u7cfb\u7d71\u80fd\u5920\u88ab\u8a8d\u8b49\u7684\u4f7f\u7528\u8005\u6b63\u5e38\u4f7f\u7528&#8221; Authenticity (\u9451\u5225\u59d3) \u78ba\u4fdd&#8221;\u6587\u4ef6\u3001\u901a\u8a0a\u3001\u8cc7\u6599\u7684\u7279\u5fb5\u662f\u771f\u5be6\u4e14\u6b63\u78ba&#8221; Non-Requdiation (\u4e0d\u53ef\u5426\u8a8d\u6027) \u78ba\u4fdd&#8221;\u8a0a\u606f\u7684\u767c\u9001\u8005\u7121\u6cd5\u5426\u8a8d\u81ea\u5df1\u767c\u51fa\u7684\u8a0a\u606f&#8221; 0x01 \u653b\u64ca Attacks \u653b\u64ca = Motive \u52d5\u6a5f(Goal \u76ee\u6a19) + Method \u65b9\u6cd5 + Vulnerability \u6f0f\u6d1e \u653b\u64ca\u8981\u6709 \u653b\u64ca\u65b9\u7684&#8221;\u65b9\u6cd5\u3001\u52d5\u6a5f&#8221; \u8207 \u9632\u79a6\u65b9\u7684\u6f0f\u6d1e \u00a0 Implementation Error \u21d2 \u900f\u904e\u8a2d\u5b9a\u6d41\u7a0b\u4f86\u9632\u79a6 Security Cap \u21d2 \u53ea\u80fd\u900f\u904e\u906e\u853d\u6f0f\u6d1e \u6839\u64da Vulnerability \u627e\u51fa\u76f8\u5c0d\u61c9\u7684\u65b9\u6cd5\u653b\u64ca Motive (\u4ee5\u653b\u64ca\u89d2\u5ea6) religious(\u5b97\u6559),political(\u653f\u6cbb),etc\u2026 Vulnerability Design flow \u21d2 \u53ef\u4ee5\u900f\u904e\u66f4\u65b0\u4fee\u88dc\u6f0f\u6d1e Method \u6839\u64da Vulnerability \u627e\u51fa\u76f8\u5c0d\u61c9\u7684\u65b9\u6cd5\u653b\u64ca Motive \u653b\u64ca\u89d2\u5ea6 religious(\u5b97\u6559),political(\u653f\u6cbb),etc\u2026 0x01 &#8211; A Threat Categories Network Threats Information gathering Sniffing and eavesdropping DNS\/ARP Poisoning MITM (Man-in-the-Middle Attack) DoS\/DDoS Password-based attacks Firewall and IDS attack Session Hijacking Host Threats Password cracking Malware attacks Footprinting Profiling Arbitrary code execution Backdoor access Privilege Escalation Code Execution Application Threats Injection Attacks Improper data\/input validation Improper error handling and exeception management Hidden-field manipulation Broken session management Cryptography issues SQL injection Phishing Buffer Overflow Information disclosure Security Misconfigurations 0x01 &#8211; B Attack Vectors APT &#8211; Advanced Persistent Threats \u96b1\u853d\u7684\u5a01\u8105\u884c\u70ba \u901a\u5e38\u662f\u96b1\u85cf\u5728\u7db2\u8def\u4e2d\u4e00\u6bb5\u6642\u9593 \u901a\u5e38\u6703\u900f\u904eZero day \u9032\u884c\u6ef2\u900f Cloud computing \/ Cloud based technologies \u96f2\u7684\u8a2d\u5b9a\u6709\u554f\u984c \u96f2\u4e4b\u9593\u7684\u4e92\u76f8\u653b\u64ca Viruses, worms, and malware \u77ed\u6642\u9593\u5feb\u901f\u611f\u67d3\u5927\u91cf\u4e3b\u6a5f Ransomware \u9650\u5236\u5c0d\u7cfb\u7d71\u548c\u6587\u4ef6\u7684\u5b58\u53d6 \u5e38\u898b\u7684\u52d2\u7d22\u75c5\u6bd2 Mobile Device threats Botnets Huge network of compromised systems used by an intruder to perform various network attacks Insider attacks Disgruntled employee can damage assets from inside. Phishing attacks Web Application Threats Attacks like SQL injection, XSS (Cross-site scripting)\u2026 IoT Threats 0x02 Classification of Attacks Passive Attacks \u76f4\u63a5\u63a5\u89f8\u76ee\u6a19\u7db2\u8def\uff0c\u4e3b\u8981\u70ba\u6514\u622a\u548c\u7db2\u8def\u76e3\u63a7 EX: sniffing \u3001 eavesdr&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[22,5],"tags":[],"class_list":["post-237","post","type-post","status-publish","format-standard","hentry","category-ceh-research-study","category-research-study"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>CEH v11 Moudle 1 - Introduction - Ares Vlog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.yuyiares.com\/?p=237\" \/>\n<meta property=\"og:locale\" content=\"zh_TW\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CEH v11 Moudle 1 - Introduction - Ares Vlog\" \/>\n<meta property=\"og:description\" content=\"\u9019\u4e00\u7ae0\u7bc0\u4e0d\u7528\u82b1\u592a\u591a\u6642\u9593\u3002 \u57fa\u672c\u4e0a\u8981\u8003CEH\u7684\u4eba\uff0c\u53ea\u9700\u8981\u6ce8\u610f\u898f\u7ae0\u90a3\u90e8\u5206\u5373\u53ef\uff0c\u5176\u4ed6\u61c9\u8a72\u90fd\u6709\u6982\u5ff5\u3002 0x00 \u8cc7\u5b89\u8981\u7d20 Elements of Information Security (\u8cc7\u8a0a\u5b89\u5168\u7684\u5143\u7d20) Confiedemtiality (\u4fdd\u5bc6\u6027) \u78ba\u8a8d&#8221;\u8cc7\u8a0a\u50c5\u8b93\u6709\u6b0a\u9650\u7684\u4eba\u5b58\u53d6&#8221; Integrity (\u5b8c\u6574\u6027) \u78ba\u4fdd&#8221;\u8cc7\u6599\u4e0d\u6703\u88ab\u975e\u6cd5\u6b0a\u9650\u7684\u4eba\u7ac4\u6539&#8221; Availability (\u53ef\u7528\u6027) \u78ba\u4fdd&#8221;\u7cfb\u7d71\u80fd\u5920\u88ab\u8a8d\u8b49\u7684\u4f7f\u7528\u8005\u6b63\u5e38\u4f7f\u7528&#8221; Authenticity (\u9451\u5225\u59d3) \u78ba\u4fdd&#8221;\u6587\u4ef6\u3001\u901a\u8a0a\u3001\u8cc7\u6599\u7684\u7279\u5fb5\u662f\u771f\u5be6\u4e14\u6b63\u78ba&#8221; Non-Requdiation (\u4e0d\u53ef\u5426\u8a8d\u6027) \u78ba\u4fdd&#8221;\u8a0a\u606f\u7684\u767c\u9001\u8005\u7121\u6cd5\u5426\u8a8d\u81ea\u5df1\u767c\u51fa\u7684\u8a0a\u606f&#8221; 0x01 \u653b\u64ca Attacks \u653b\u64ca = Motive \u52d5\u6a5f(Goal \u76ee\u6a19) + Method \u65b9\u6cd5 + Vulnerability \u6f0f\u6d1e \u653b\u64ca\u8981\u6709 \u653b\u64ca\u65b9\u7684&#8221;\u65b9\u6cd5\u3001\u52d5\u6a5f&#8221; \u8207 \u9632\u79a6\u65b9\u7684\u6f0f\u6d1e \u00a0 Implementation Error \u21d2 \u900f\u904e\u8a2d\u5b9a\u6d41\u7a0b\u4f86\u9632\u79a6 Security Cap \u21d2 \u53ea\u80fd\u900f\u904e\u906e\u853d\u6f0f\u6d1e \u6839\u64da Vulnerability \u627e\u51fa\u76f8\u5c0d\u61c9\u7684\u65b9\u6cd5\u653b\u64ca Motive (\u4ee5\u653b\u64ca\u89d2\u5ea6) religious(\u5b97\u6559),political(\u653f\u6cbb),etc\u2026 Vulnerability Design flow \u21d2 \u53ef\u4ee5\u900f\u904e\u66f4\u65b0\u4fee\u88dc\u6f0f\u6d1e Method \u6839\u64da Vulnerability \u627e\u51fa\u76f8\u5c0d\u61c9\u7684\u65b9\u6cd5\u653b\u64ca Motive \u653b\u64ca\u89d2\u5ea6 religious(\u5b97\u6559),political(\u653f\u6cbb),etc\u2026 0x01 &#8211; A Threat Categories Network Threats Information gathering Sniffing and eavesdropping DNS\/ARP Poisoning MITM (Man-in-the-Middle Attack) DoS\/DDoS Password-based attacks Firewall and IDS attack Session Hijacking Host Threats Password cracking Malware attacks Footprinting Profiling Arbitrary code execution Backdoor access Privilege Escalation Code Execution Application Threats Injection Attacks Improper data\/input validation Improper error handling and exeception management Hidden-field manipulation Broken session management Cryptography issues SQL injection Phishing Buffer Overflow Information disclosure Security Misconfigurations 0x01 &#8211; B Attack Vectors APT &#8211; Advanced Persistent Threats \u96b1\u853d\u7684\u5a01\u8105\u884c\u70ba \u901a\u5e38\u662f\u96b1\u85cf\u5728\u7db2\u8def\u4e2d\u4e00\u6bb5\u6642\u9593 \u901a\u5e38\u6703\u900f\u904eZero day \u9032\u884c\u6ef2\u900f Cloud computing \/ Cloud based technologies \u96f2\u7684\u8a2d\u5b9a\u6709\u554f\u984c \u96f2\u4e4b\u9593\u7684\u4e92\u76f8\u653b\u64ca Viruses, worms, and malware \u77ed\u6642\u9593\u5feb\u901f\u611f\u67d3\u5927\u91cf\u4e3b\u6a5f Ransomware \u9650\u5236\u5c0d\u7cfb\u7d71\u548c\u6587\u4ef6\u7684\u5b58\u53d6 \u5e38\u898b\u7684\u52d2\u7d22\u75c5\u6bd2 Mobile Device threats Botnets Huge network of compromised systems used by an intruder to perform various network attacks Insider attacks Disgruntled employee can damage assets from inside. Phishing attacks Web Application Threats Attacks like SQL injection, XSS (Cross-site scripting)\u2026 IoT Threats 0x02 Classification of Attacks Passive Attacks \u76f4\u63a5\u63a5\u89f8\u76ee\u6a19\u7db2\u8def\uff0c\u4e3b\u8981\u70ba\u6514\u622a\u548c\u7db2\u8def\u76e3\u63a7 EX: sniffing \u3001 eavesdr...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.yuyiares.com\/?p=237\" \/>\n<meta property=\"og:site_name\" content=\"Ares Vlog\" \/>\n<meta property=\"article:published_time\" content=\"2022-09-30T05:59:10+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-09-30T07:29:18+00:00\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u4f5c\u8005:\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u9810\u4f30\u95b1\u8b80\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 \u5206\u9418\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.yuyiares.com\\\/?p=237#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.yuyiares.com\\\/?p=237\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/www.yuyiares.com\\\/#\\\/schema\\\/person\\\/3d4db07eab24e08cc9eea662ef3053ac\"},\"headline\":\"CEH v11 Moudle 1 &#8211; Introduction\",\"datePublished\":\"2022-09-30T05:59:10+00:00\",\"dateModified\":\"2022-09-30T07:29:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.yuyiares.com\\\/?p=237\"},\"wordCount\":477,\"commentCount\":0,\"articleSection\":[\"CEH\",\"Research &amp; Study\"],\"inLanguage\":\"zh-TW\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.yuyiares.com\\\/?p=237#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.yuyiares.com\\\/?p=237\",\"url\":\"https:\\\/\\\/www.yuyiares.com\\\/?p=237\",\"name\":\"CEH v11 Moudle 1 - Introduction - Ares Vlog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.yuyiares.com\\\/#website\"},\"datePublished\":\"2022-09-30T05:59:10+00:00\",\"dateModified\":\"2022-09-30T07:29:18+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.yuyiares.com\\\/#\\\/schema\\\/person\\\/3d4db07eab24e08cc9eea662ef3053ac\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.yuyiares.com\\\/?p=237#breadcrumb\"},\"inLanguage\":\"zh-TW\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.yuyiares.com\\\/?p=237\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.yuyiares.com\\\/?p=237#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.yuyiares.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CEH v11 Moudle 1 &#8211; Introduction\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.yuyiares.com\\\/#website\",\"url\":\"https:\\\/\\\/www.yuyiares.com\\\/\",\"name\":\"Ares Vlog\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.yuyiares.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-TW\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.yuyiares.com\\\/#\\\/schema\\\/person\\\/3d4db07eab24e08cc9eea662ef3053ac\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-TW\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7a48eb75ce0e81d088764746bc78b3a75ae3f2fbe40d6f69bbc7cfd2fa004a03?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7a48eb75ce0e81d088764746bc78b3a75ae3f2fbe40d6f69bbc7cfd2fa004a03?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7a48eb75ce0e81d088764746bc78b3a75ae3f2fbe40d6f69bbc7cfd2fa004a03?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\\\/\\\/www.yuyiares.com\"],\"url\":\"https:\\\/\\\/www.yuyiares.com\\\/?author=1\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CEH v11 Moudle 1 - Introduction - Ares Vlog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.yuyiares.com\/?p=237","og_locale":"zh_TW","og_type":"article","og_title":"CEH v11 Moudle 1 - Introduction - Ares Vlog","og_description":"\u9019\u4e00\u7ae0\u7bc0\u4e0d\u7528\u82b1\u592a\u591a\u6642\u9593\u3002 \u57fa\u672c\u4e0a\u8981\u8003CEH\u7684\u4eba\uff0c\u53ea\u9700\u8981\u6ce8\u610f\u898f\u7ae0\u90a3\u90e8\u5206\u5373\u53ef\uff0c\u5176\u4ed6\u61c9\u8a72\u90fd\u6709\u6982\u5ff5\u3002 0x00 \u8cc7\u5b89\u8981\u7d20 Elements of Information Security (\u8cc7\u8a0a\u5b89\u5168\u7684\u5143\u7d20) Confiedemtiality (\u4fdd\u5bc6\u6027) \u78ba\u8a8d&#8221;\u8cc7\u8a0a\u50c5\u8b93\u6709\u6b0a\u9650\u7684\u4eba\u5b58\u53d6&#8221; Integrity (\u5b8c\u6574\u6027) \u78ba\u4fdd&#8221;\u8cc7\u6599\u4e0d\u6703\u88ab\u975e\u6cd5\u6b0a\u9650\u7684\u4eba\u7ac4\u6539&#8221; Availability (\u53ef\u7528\u6027) \u78ba\u4fdd&#8221;\u7cfb\u7d71\u80fd\u5920\u88ab\u8a8d\u8b49\u7684\u4f7f\u7528\u8005\u6b63\u5e38\u4f7f\u7528&#8221; Authenticity (\u9451\u5225\u59d3) \u78ba\u4fdd&#8221;\u6587\u4ef6\u3001\u901a\u8a0a\u3001\u8cc7\u6599\u7684\u7279\u5fb5\u662f\u771f\u5be6\u4e14\u6b63\u78ba&#8221; Non-Requdiation (\u4e0d\u53ef\u5426\u8a8d\u6027) \u78ba\u4fdd&#8221;\u8a0a\u606f\u7684\u767c\u9001\u8005\u7121\u6cd5\u5426\u8a8d\u81ea\u5df1\u767c\u51fa\u7684\u8a0a\u606f&#8221; 0x01 \u653b\u64ca Attacks \u653b\u64ca = Motive \u52d5\u6a5f(Goal \u76ee\u6a19) + Method \u65b9\u6cd5 + Vulnerability \u6f0f\u6d1e \u653b\u64ca\u8981\u6709 \u653b\u64ca\u65b9\u7684&#8221;\u65b9\u6cd5\u3001\u52d5\u6a5f&#8221; \u8207 \u9632\u79a6\u65b9\u7684\u6f0f\u6d1e \u00a0 Implementation Error \u21d2 \u900f\u904e\u8a2d\u5b9a\u6d41\u7a0b\u4f86\u9632\u79a6 Security Cap \u21d2 \u53ea\u80fd\u900f\u904e\u906e\u853d\u6f0f\u6d1e \u6839\u64da Vulnerability \u627e\u51fa\u76f8\u5c0d\u61c9\u7684\u65b9\u6cd5\u653b\u64ca Motive (\u4ee5\u653b\u64ca\u89d2\u5ea6) religious(\u5b97\u6559),political(\u653f\u6cbb),etc\u2026 Vulnerability Design flow \u21d2 \u53ef\u4ee5\u900f\u904e\u66f4\u65b0\u4fee\u88dc\u6f0f\u6d1e Method \u6839\u64da Vulnerability \u627e\u51fa\u76f8\u5c0d\u61c9\u7684\u65b9\u6cd5\u653b\u64ca Motive \u653b\u64ca\u89d2\u5ea6 religious(\u5b97\u6559),political(\u653f\u6cbb),etc\u2026 0x01 &#8211; A Threat Categories Network Threats Information gathering Sniffing and eavesdropping DNS\/ARP Poisoning MITM (Man-in-the-Middle Attack) DoS\/DDoS Password-based attacks Firewall and IDS attack Session Hijacking Host Threats Password cracking Malware attacks Footprinting Profiling Arbitrary code execution Backdoor access Privilege Escalation Code Execution Application Threats Injection Attacks Improper data\/input validation Improper error handling and exeception management Hidden-field manipulation Broken session management Cryptography issues SQL injection Phishing Buffer Overflow Information disclosure Security Misconfigurations 0x01 &#8211; B Attack Vectors APT &#8211; Advanced Persistent Threats \u96b1\u853d\u7684\u5a01\u8105\u884c\u70ba \u901a\u5e38\u662f\u96b1\u85cf\u5728\u7db2\u8def\u4e2d\u4e00\u6bb5\u6642\u9593 \u901a\u5e38\u6703\u900f\u904eZero day \u9032\u884c\u6ef2\u900f Cloud computing \/ Cloud based technologies \u96f2\u7684\u8a2d\u5b9a\u6709\u554f\u984c \u96f2\u4e4b\u9593\u7684\u4e92\u76f8\u653b\u64ca Viruses, worms, and malware \u77ed\u6642\u9593\u5feb\u901f\u611f\u67d3\u5927\u91cf\u4e3b\u6a5f Ransomware \u9650\u5236\u5c0d\u7cfb\u7d71\u548c\u6587\u4ef6\u7684\u5b58\u53d6 \u5e38\u898b\u7684\u52d2\u7d22\u75c5\u6bd2 Mobile Device threats Botnets Huge network of compromised systems used by an intruder to perform various network attacks Insider attacks Disgruntled employee can damage assets from inside. Phishing attacks Web Application Threats Attacks like SQL injection, XSS (Cross-site scripting)\u2026 IoT Threats 0x02 Classification of Attacks Passive Attacks \u76f4\u63a5\u63a5\u89f8\u76ee\u6a19\u7db2\u8def\uff0c\u4e3b\u8981\u70ba\u6514\u622a\u548c\u7db2\u8def\u76e3\u63a7 EX: sniffing \u3001 eavesdr...","og_url":"https:\/\/www.yuyiares.com\/?p=237","og_site_name":"Ares Vlog","article_published_time":"2022-09-30T05:59:10+00:00","article_modified_time":"2022-09-30T07:29:18+00:00","author":"admin","twitter_card":"summary_large_image","twitter_misc":{"\u4f5c\u8005:":"admin","\u9810\u4f30\u95b1\u8b80\u6642\u9593":"4 \u5206\u9418"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.yuyiares.com\/?p=237#article","isPartOf":{"@id":"https:\/\/www.yuyiares.com\/?p=237"},"author":{"name":"admin","@id":"https:\/\/www.yuyiares.com\/#\/schema\/person\/3d4db07eab24e08cc9eea662ef3053ac"},"headline":"CEH v11 Moudle 1 &#8211; Introduction","datePublished":"2022-09-30T05:59:10+00:00","dateModified":"2022-09-30T07:29:18+00:00","mainEntityOfPage":{"@id":"https:\/\/www.yuyiares.com\/?p=237"},"wordCount":477,"commentCount":0,"articleSection":["CEH","Research &amp; Study"],"inLanguage":"zh-TW","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.yuyiares.com\/?p=237#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.yuyiares.com\/?p=237","url":"https:\/\/www.yuyiares.com\/?p=237","name":"CEH v11 Moudle 1 - Introduction - Ares Vlog","isPartOf":{"@id":"https:\/\/www.yuyiares.com\/#website"},"datePublished":"2022-09-30T05:59:10+00:00","dateModified":"2022-09-30T07:29:18+00:00","author":{"@id":"https:\/\/www.yuyiares.com\/#\/schema\/person\/3d4db07eab24e08cc9eea662ef3053ac"},"breadcrumb":{"@id":"https:\/\/www.yuyiares.com\/?p=237#breadcrumb"},"inLanguage":"zh-TW","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.yuyiares.com\/?p=237"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.yuyiares.com\/?p=237#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.yuyiares.com\/"},{"@type":"ListItem","position":2,"name":"CEH v11 Moudle 1 &#8211; Introduction"}]},{"@type":"WebSite","@id":"https:\/\/www.yuyiares.com\/#website","url":"https:\/\/www.yuyiares.com\/","name":"Ares Vlog","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.yuyiares.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-TW"},{"@type":"Person","@id":"https:\/\/www.yuyiares.com\/#\/schema\/person\/3d4db07eab24e08cc9eea662ef3053ac","name":"admin","image":{"@type":"ImageObject","inLanguage":"zh-TW","@id":"https:\/\/secure.gravatar.com\/avatar\/7a48eb75ce0e81d088764746bc78b3a75ae3f2fbe40d6f69bbc7cfd2fa004a03?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/7a48eb75ce0e81d088764746bc78b3a75ae3f2fbe40d6f69bbc7cfd2fa004a03?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7a48eb75ce0e81d088764746bc78b3a75ae3f2fbe40d6f69bbc7cfd2fa004a03?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/www.yuyiares.com"],"url":"https:\/\/www.yuyiares.com\/?author=1"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.yuyiares.com\/index.php?rest_route=\/wp\/v2\/posts\/237","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.yuyiares.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.yuyiares.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.yuyiares.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.yuyiares.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=237"}],"version-history":[{"count":5,"href":"https:\/\/www.yuyiares.com\/index.php?rest_route=\/wp\/v2\/posts\/237\/revisions"}],"predecessor-version":[{"id":251,"href":"https:\/\/www.yuyiares.com\/index.php?rest_route=\/wp\/v2\/posts\/237\/revisions\/251"}],"wp:attachment":[{"href":"https:\/\/www.yuyiares.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=237"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.yuyiares.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=237"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.yuyiares.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=237"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}