(This article is very popular on the Internet. If you read it, you will find that "To be a good network administrator, you must first be a good hacker..." Very classic words and actual combat process. In the practice of network security, network attackers are very automatic, so they occupy a very important position in the overall attack and defense combat. From the perspective of typical attack ideas, attackers usually go through three processes: "detection", "attack" and "hide", and each process has many types. The network security world is in full swing, from the more sophisticated network injection to the more concealed phishing attacks, from the repeatedly used system vulnerabilities to the silently running Trojan tools, the methods of network attackers are also more sophisticated. "Know yourself and know your enemy, and you will be safe in a hundred battles", this topic will make specific comments on this year's network attack technology through the method of scientific/scientific classification. At the same time, it will also cross wonderful typical cases, so that users can reach the intention of inferring others.
Online website security technology development analysis collection.pdf)