https://blog.csdn.net/qq_37615098/category_9447721.html
Penetration testing 34 - page back door principle and technology (webshell weevely, Malaysia (missile, b374k), chopper)
Penetration testing 33 - upload leak case of actual combat
Penetration test 32 - principle and technical file upload holes
Penetration testing - 31 remote files contain bugs
Penetration testing 30 - principle and technical files contain bugs
Penetration testing 29 - command injection vulnerabilities principle and technology
28 - CSRF penetration testing principle, method and penetration of actual combat
Penetration testing 27 - XSS holes of actual combat
Penetration testing - 26 XSS holes technology
Penetration testing 25 - SQLMAP technology advanced
24 - SQLMAP penetration testing principle and basic
Penetration testing 23 - SQL injection of actual combat 2
Penetration testing 22 - SQL injection of actual combat 1
Penetration testing 21 - penetration testing database of
Penetration testing 20 - burpsuit tool
19 - AWVS penetration testing technology
18 - Metasploit penetration tests of actual combat
17 - Metasploit penetration testing (MSF) deployment and function
Penetration testing 16 - penetration test review
Penetration testing 15 - traffic identification and control
14 - shodan penetration testing and Google hack syntax
Penetration testing 13 - agent theory and technology
Penetration testing 12 - network scanning technology
Penetration testing 11 - passive information gathering technology base
Penetration testing network protection tools - 10 firewall technology
Penetration testing 9 - TCP/IP packet analysis & amp; SYN flood attack
Penetration testing 8 - review
Penetration testing 6 - artifact nc, FRP Intranet penetrate, under the window of the netsh port forwarding, Intranet through tools under Windows LCX
Penetration testing 5 - kali typical Linux command
Basic knowledge of penetration testing interview
Penetration testing 4 - web penetration testing environment structures,
Penetration testing 3 - web penetration testing process
2 - penetration testing software security testing knowledge
Penetration testing 1 - network safety regulations and job skills