(This is a book about network penetration/penetration attacks and prevention. The book is divided into 9 chapters, the main contents include: network penetration/penetration attack behavior and analysis, how attackers open penetration/penetration breaches, penetration/penetration and privilege escalation, remote control penetration/penetration, large-scale network environment In-depth detection, social engineering in penetration/penetration/intrusion, etc. The difference between this book and other books is that this book is particularly effective in taking the "invasion/invasion of Tencent" as an example, and the process of reproducing the "invasion/invasion of Tencent" as an example, to counter infiltration. The /penetration/intrusion process has been deeply analyzed to reveal the secrets. The book systematically explains the various intrusion/intrusion methods that attackers may adopt in infiltration/penetration, and gives efficient prevention plans, which helps network security protection personnel to grasp the attack behavior of hackers and better protect them. cyber security. This book can be read as a professional network security manager and a network security technology researcher. The CD-ROM provides offensive and defensive combat drills and video explanations, as well as the source code of the examples in the book.
Network penetration/penetration attack and security practice\01_1-13.pdf
Network penetration/penetration attack and security practice\08_499-556.pdf
Network penetration/penetration attack and security practice\Introduction.doc
Network penetration/penetration attack and security practice\Preface-N.doc
Network penetration/penetration attack and security practice\directory.doc
Network penetration/penetration attack and security practice\Network penetration/penetration attack and security practice--fm2.jpg
.....too many files .....)