Last week, I published a project I call Emergency Response Field Notes, which collects and summarizes some of the emergency response cases I’ve worked on.

GitHub address: github.com/Bypass007/E…

This project also received a lot of feedback from children’s shoes, among which one impressed me deeply. It was the first time I received such serious feedback:

I immediately wrote an email reply: Thank you for your detailed reading and correcting several questions. If you don’t mind, please add a wechat account to communicate with me.

This note is composed of 22 articles, with a total of about 2W+ words. During desensitization, some descriptions were removed, the coherence of the article was not enough, and many problems were also found. Here, I would like to thank those who helped feedback the children.

As for this note, I will update it continuously in the hope that it can be of some help to those engaged in security/operation.

At the same time, I hope you can provide some cases, you say the case I will write.

Just like the message my old leader gave me: Write down your experience, benefit others, and improve yourself.

The direction of gradual improvement, for example

Be familiar with various log analysis techniques from the perspective of data forensics.

Step into the attacker’s shoes and become familiar with common permission maintenance techniques.

Stand in the interest driven Angle, familiar with all kinds of black hat ash production techniques.

I think this might be more interesting than just attacking.

To this end, I created a planet, free small close circle, pure technical exchange, positioning is emergency response, ready to enter the trial operation stage, we sincerely invite you to join

My little secret circle, sharing knowledge together.