1. 程式人生 > >【安全牛學習筆記】AIREPLAY-NG

【安全牛學習筆記】AIREPLAY-NG

信息安全 security+ aireplay-ng

AIREPLAY-NG

產生或者加速無線通信流量

向無線網絡中註入數據包

偽造身份驗證

強制重新身份驗證

抓包重放

用於後續WEP和WPA密碼破解

支持10種包註入

獲取包的兩種途徑

指定接口(-i)

抓包文件pcap(-r)

Attack modes (numbers can still be used):

--deauth count : deauthenticate 1 or all stations (-0)

--fakeauth delay : fake authentication with AP (-1)

--interactive : interactive frame selection (-2)

--arpreplay : standard ARP-request replay (-3)

--chopchop : decrypt/chopchop WEP packet (-4)

--fragment : generates valid keystream (-5)

--caffe-latte : query a client for new IVs (-6)

--cfrag : fragments against a client (-7)

--migmode : attack WPA migration mode (-8)

--test : tests injection and quality (-9)

AIREPLAY-NG

aireplay-ng <options><interface name>

Filter命令選項 (除0、1兩種攻擊方式)

Filter options:

-b bssid : MAC address, Access Point

-d dmac : MAC address, Destination

-s smac : MAC address, Source

-m len : minimum packet length

-n len : maximum packet length

-u type : frame control, type field

-v subt : frame control, subtype field

-t tools : frame control, To DS bit

-f fromds : frame control, From DS bit

-w iswep : frame control, WEP bit

-D : disable AP detection

AIREPLAY-NG

Replay命令選項

Replay options:

-x nbpps : number of packets per second

-p fctrl : set frame control word (hex)

-a bssid : set Access point MAC address

-c dmac : set Destination MAC address

-h smac : set Source MAC address

-g smac : change ring buffer size (default: 8)

-F : choose first matching packet

Fakeauth attack options:

-e essid : set target AP SSID

-o npckts : number of packets per burst (0=autp, default: 1)

-q sec : seconds between keep-alives

-Q : send reassociation requests

-y prga : keystream for shared key auth

-T n : exit after retry fake auth request n time

Arp Replay attack options:

-j : inject FromDs packets

Fragmentation attack options:

-k IP : set destination IP in fragments

-l IP : set source IP in fragments

AIREPLAY-NG排錯

Aireplay-ng命令掛起沒有任何輸出

無線網卡與AP工作在不同信道

報錯"write failed: Cannot allocate memory wi_write():illegal seek"

無線網卡使用Broadcom芯片(bcm43xx),替換為b43驅動可解決

可註入但速度很慢,並提示內核消息"rtc:lost some interrupts at 1024Hz"

沒有修正方法,此時可以啟動多個aireplay-ng命令提高速度

使用-h參數指定註入MAC地址與網卡MAC地址不一致報錯

建議保持一致 (macchange)

[email protected]:~# ifconfig

eth0 Link encap:Ethernet HWaddr 08:00:27:fd:1c:9d

inet addr:192.168.20.8 Bcast:192.168.20.255 Mask:255.255.255.0

inet6 addr: fe80::a00:27ff:fefd:1c9d/64 Scope:Link

UP BROADCAST RUNNING MULTICAST MTU:1500 MetricL:1

Rx packets:0 errors:0 dropped:0 overruns:0 frame:0

Tx packets:50 errors:0 dropped:0 overruns:0 carrier:0

collisions:0 txqueuelen:0

Rx bytes:1200 (0.0 KiB) TX bytes:1200 (0.0 KiB)

lo Link encap:Local Loopback

inet addr:127.0.0.1 Mask:255.0.0.0

inet addr. ::1/128 Scope:Host

UP LOOKBACK RUNNING MTU:65536 MetricL:1

Rx packets:20 errors:0 dropped:0 overruns:0 frame:0

Tx packets:20 errors:0 dropped:0 overruns:0 carrier:0

collisions:0 txqueuelen:0

Rx bytes:1200 (1.1 KiB) TX bytes:1200 (1.1 KiB)

wlan2 Link encap:Ethernet HWaddr 08:57:00:0c:96:68

UP BROADCAST MULTICAST MTU:1500 Metric:1

Rx packets:20 errors:0 dropped:0 overruns:0 frame:0

Tx packets:20 errors:0 dropped:0 overruns:0 carrier:0

collisions:0 txqueuelen:1000

Rx bytes:0 (0.0 B) TX bytes:0 (0.0 B)

[email protected]:~# iwconfig

eth0 no wireless extensions

wlan0 IEEE 802.11nbgn ESSID:off/any

Mode:Managed Access Point: No-Associated Tx-Power=20 dBm

Retry short limit:7 RTS thr:off Fragment thr:off

Encryption key:off

Power Management:off

wlan2 IEEE 802.11nbgn ESSID:off/any

Mode:Managed Access Point: No-Associated Tx-Power=20 dBm

Retry short limit:7 RTS thr:off Fragment thr:off

Encryption key:off

Power Management:off

lo no wireless extensions.

[email protected]:~# service network-manager stop

[email protected]:~# airmon-ng check kill

Killing these processes:

PID Name

871 wpa_supplicant

1542 dhclient

[email protected]:~# airmon-ng start wlan0

NO interfering processes found

PHY Interface Driver Chipest

phy1 wlan0 rt2800usb Ralink Technology, Corp. RT5370

(mac80211 monitor mode vif enable for [phy0]wlan2 on [phy0]wlan2mon)

(mac80211 station mode vif disabled for [phy0]wlan2)

phy0 wlan2 ath9k_htc Atheros Communications, Inc, AR9271 802.11n

[email protected]:~# airmon-ng start wlan2

NO interfering processes found

PHY Interface Driver Chipest

phy1 wlan0mon rt2800usb Ralink Technology, Corp. RT5370

phy0 wlan2 ath9k_htc Atheros Communications, Inc, AR9271 802.11n

(mac80211 monitor mode vif enable for [phy0]wlan2 on [phy0]wlan2mon)

(mac80211 station mode vif disabled for [phy0]wlan2)

[email protected]:~# iwconfig

eth0 no wireless extensions

wlan0mon IEEE 802.11bgn Mode:Monitor Frequency:2.57 GHz Tx-Power=20 dBm

Retry short limit:7 RTS thr:off Fragment thr:off

Power Management:off

wlan2mon IEEE 802.11bgn Mode:Monitor Frequency:2.57 GHz Tx-Power=20 dBm

Retry short limit:7 RTS thr:off Fragment thr:off

Power Management:off

lo no wireless extension

[email protected]:~# ifconfig

eth0 Link encap:Ethernet HWaddr 08:00:27:fd:1c:9d

inet addr:192.168.20.8 Bcast:192.168.20.255 Mask:255.255.255.0

inet6 addr: fe80::a00:27ff:fefd:1c9d/64 Scope:Link

UP BROADCAST RUNNING MULTICAST MTU:1500 MetricL:1

Rx packets:0 errors:0 dropped:0 overruns:0 frame:0

Tx packets:50 errors:0 dropped:0 overruns:0 carrier:0

collisions:0 txqueuelen:0

Rx bytes:1200 (0.0 KiB) TX bytes:1200 (0.0 KiB)

lo Link encap:Local Loopback

inet addr:127.0.0.1 Mask:255.0.0.0

inet addr. ::1/128 Scope:Host

UP LOOKBACK RUNNING MTU:65536 MetricL:1

Rx packets:20 errors:0 dropped:0 overruns:0 frame:0

Tx packets:20 errors:0 dropped:0 overruns:0 carrier:0

collisions:0 txqueuelen:0

Rx bytes:1200 (1.1 KiB) TX bytes:1200 (1.1 KiB)

wlan0mon Link encap:UNSPEC HWaddr C8-3A-35-CA-46-91-3A-30-00-00-00-00-00-00-00-00

UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1

Rx packets:2773 errors:0 dropped:2773 overruns:0 frame:0

Tx packets:20 errors:0 dropped:0 overruns:0 carrier:0

collisions:0 txqueuelen:1000

Rx bytes:89601 (87.5 B) TX bytes:0 (0.0 B)

wlan2mon Link encap:UNSPEC HWaddr 08-57-00-0C-96-68-00-00-00-00-00-00-00-00-00-00

UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1

Rx packets:2773 errors:0 dropped:2773 overruns:0 frame:0

Tx packets:20 errors:0 dropped:0 overruns:0 carrier:0

collisions:0 txqueuelen:1000

Rx bytes:89601 (87.5 B) TX bytes:0 (0.0 B)

[email protected]:~# ifconfig wlan2mon down

[email protected]:~# ifconfig

eth0 Link encap:Ethernet HWaddr 08:00:27:fd:1c:9d

inet addr:192.168.20.8 Bcast:192.168.20.255 Mask:255.255.255.0

inet6 addr: fe80::a00:27ff:fefd:1c9d/64 Scope:Link

UP BROADCAST RUNNING MULTICAST MTU:1500 MetricL:1

Rx packets:0 errors:0 dropped:0 overruns:0 frame:0

Tx packets:50 errors:0 dropped:0 overruns:0 carrier:0

collisions:0 txqueuelen:0

Rx bytes:1200 (0.0 KiB) TX bytes:1200 (0.0 KiB)

lo Link encap:Local Loopback

inet addr:127.0.0.1 Mask:255.0.0.0

inet addr. ::1/128 Scope:Host

UP LOOKBACK RUNNING MTU:65536 MetricL:1

Rx packets:20 errors:0 dropped:0 overruns:0 frame:0

Tx packets:20 errors:0 dropped:0 overruns:0 carrier:0

collisions:0 txqueuelen:0

Rx bytes:1200 (1.1 KiB) TX bytes:1200 (1.1 KiB)

wlan0mon Link encap:UNSPEC HWaddr C8-3A-35-CA-46-91-3A-30-00-00-00-00-00-00-00-00

UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1

Rx packets:2773 errors:0 dropped:2773 overruns:0 frame:0

Tx packets:20 errors:0 dropped:0 overruns:0 carrier:0

collisions:0 txqueuelen:1000

Rx bytes:89601 (87.5 B) TX bytes:0 (0.0 B)

wlan2mon Link encap:UNSPEC HWaddr 08-57-00-0C-96-68-00-00-00-00-00-00-00-00-00-00

UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1

Rx packets:2773 errors:0 dropped:2773 overruns:0 frame:0

Tx packets:20 errors:0 dropped:0 overruns:0 carrier:0

collisions:0 txqueuelen:1000

Rx bytes:89601 (87.5 B) TX bytes:0 (0.0 B)

[email protected]:~# ifconfig wlan2mon down

[email protected]:~# ifconfig

eth0 Link encap:Ethernet HWaddr 08:00:27:fd:1c:9d

inet addr:192.168.20.8 Bcast:192.168.20.255 Mask:255.255.255.0

inet6 addr: fe80::a00:27ff:fefd:1c9d/64 Scope:Link

UP BROADCAST RUNNING MULTICAST MTU:1500 MetricL:1

Rx packets:0 errors:0 dropped:0 overruns:0 frame:0

Tx packets:50 errors:0 dropped:0 overruns:0 carrier:0

collisions:0 txqueuelen:0

Rx bytes:1200 (0.0 KiB) TX bytes:1200 (0.0 KiB)

lo Link encap:Local Loopback

inet addr:127.0.0.1 Mask:255.0.0.0

inet addr. ::1/128 Scope:Host

UP LOOKBACK RUNNING MTU:65536 MetricL:1

Rx packets:20 errors:0 dropped:0 overruns:0 frame:0

Tx packets:20 errors:0 dropped:0 overruns:0 carrier:0

collisions:0 txqueuelen:0

Rx bytes:1200 (1.1 KiB) TX bytes:1200 (1.1 KiB)

wlan0mon Link encap:UNSPEC HWaddr C8-3A-35-CA-46-91-3A-30-00-00-00-00-00-00-00-00

UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1

Rx packets:2773 errors:0 dropped:2773 overruns:0 frame:0

Tx packets:20 errors:0 dropped:0 overruns:0 carrier:0

collisions:0 txqueuelen:1000

Rx bytes:89601 (87.5 B) TX bytes:0 (0.0 B)B)

[email protected]:~# ifconfig -a

eth0 Link encap:Ethernet HWaddr 08:00:27:fd:1c:9d

inet addr:192.168.20.8 Bcast:192.168.20.255 Mask:255.255.255.0

inet6 addr: fe80::a00:27ff:fefd:1c9d/64 Scope:Link

UP BROADCAST RUNNING MULTICAST MTU:1500 MetricL:1

Rx packets:0 errors:0 dropped:0 overruns:0 frame:0

Tx packets:50 errors:0 dropped:0 overruns:0 carrier:0

collisions:0 txqueuelen:0

Rx bytes:1200 (0.0 KiB) TX bytes:1200 (0.0 KiB)

lo Link encap:Local Loopback

inet addr:127.0.0.1 Mask:255.0.0.0

inet addr. ::1/128 Scope:Host

UP LOOKBACK RUNNING MTU:65536 MetricL:1

Rx packets:20 errors:0 dropped:0 overruns:0 frame:0

Tx packets:20 errors:0 dropped:0 overruns:0 carrier:0

collisions:0 txqueuelen:0

Rx bytes:1200 (1.1 KiB) TX bytes:1200 (1.1 KiB)

wlan0mon Link encap:UNSPEC HWaddr C8-3A-35-CA-46-91-3A-30-00-00-00-00-00-00-00-00

UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1

Rx packets:2773 errors:0 dropped:2773 overruns:0 frame:0

Tx packets:20 errors:0 dropped:0 overruns:0 carrier:0

collisions:0 txqueuelen:1000

Rx bytes:89601 (87.5 B) TX bytes:0 (0.0 B)

wlan2mon Link encap:UNSPEC HWaddr 08-57-00-0C-96-68-00-00-00-00-00-00-00-00-00-00

UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1

Rx packets:2773 errors:0 dropped:2773 overruns:0 frame:0

Tx packets:20 errors:0 dropped:0 overruns:0 carrier:0

collisions:0 txqueuelen:1000

Rx bytes:89601 (87.5 B) TX bytes:0 (0.0 B)

[email protected]:~# macchanger --help

GNU MAC Changer

Usage: macchanger [options] device

-h, --help Print this help

-V, --version Print version and exit

-s, --show Print the MAC address and exit

-e, --ending Don‘t change the vendor bytes

-a, --another Set random vendor MAC of the same kind

-A Set random vendor MAC of any kind

-p, --permanent Reset to original, permanent hardware MAC

-r, --random Set fully random MAC

-l, --list[=keyword] Print known vendors

-b, --bia Pretend to be a burned-in-address

-m, --mac=XX:XX:XX:XX:XX:XX

--mac XX:XX:XX:XX:XX:XX Set the MAC XX:XX:XX:XX:XX:XX

Report bugs to https://github.com/alobbs/macchanger/issues

[email protected]:~# macchange -m 00:11:11:11:11:11 wlan2mon

Current MAC: 08:57:00:0c:96:68 (TP-LINK TECHNOLOGIES CO.,LTD.)

Permanent MAC: 08:57:00:0c:96:68 (TP-LINK TECHNOLOGIES CO.,LTD.)

New MAC: 00:11:11:11:11:11 (Intel Corporation)

[email protected]:~# ifconfig wlan2mon up

[email protected]:~# ifconfig

eth0 Link encap:Ethernet HWaddr 08:00:27:fd:1c:9d

inet addr:192.168.20.8 Bcast:192.168.20.255 Mask:255.255.255.0

inet6 addr: fe80::a00:27ff:fefd:1c9d/64 Scope:Link

UP BROADCAST RUNNING MULTICAST MTU:1500 MetricL:1

Rx packets:0 errors:0 dropped:0 overruns:0 frame:0

Tx packets:50 errors:0 dropped:0 overruns:0 carrier:0

collisions:0 txqueuelen:0

Rx bytes:1200 (0.0 KiB) TX bytes:1200 (0.0 KiB)

lo Link encap:Local Loopback

inet addr:127.0.0.1 Mask:255.0.0.0

inet addr. ::1/128 Scope:Host

UP LOOKBACK RUNNING MTU:65536 MetricL:1

Rx packets:20 errors:0 dropped:0 overruns:0 frame:0

Tx packets:20 errors:0 dropped:0 overruns:0 carrier:0

collisions:0 txqueuelen:0

Rx bytes:1200 (1.1 KiB) TX bytes:1200 (1.1 KiB)

wlan0mon Link encap:UNSPEC HWaddr C8-3A-35-CA-46-91-3A-30-00-00-00-00-00-00-00-00

UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1

Rx packets:2773 errors:0 dropped:2773 overruns:0 frame:0

Tx packets:20 errors:0 dropped:0 overruns:0 carrier:0

collisions:0 txqueuelen:1000

Rx bytes:89601 (87.5 B) TX bytes:0 (0.0 B)

wlan2mon Link encap:UNSPEC HWaddr 00:11:11:11:11:11-00-00-00-00-00-00-00-00-00-00

UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1

Rx packets:2773 errors:0 dropped:2773 overruns:0 frame:0

Tx packets:20 errors:0 dropped:0 overruns:0 carrier:0

collisions:0 txqueuelen:1000

[email protected]:~# arieplay-ng -h 00:11:11:11:11:11

No replay interface specified.

"aireplay-ng --help" for help.

AIREPLAY-NG包註入測試

檢測網卡是否可以註入包

檢測AP的響應時間

回包率反應鏈路質量

如果有兩個無線網卡,可以檢測具體可以註入哪種攻擊

基本測試檢測AP對probe廣播的響應

向每AP發30包

網卡成功發送並可接收包的能力

[email protected]:~# aireplay-ng --help

Aireplay-ng 1.2 rc2 - (C) 2006-2014 Thomas d‘Otreppe

http://www.aircrack-ng.org

usage: aireplay-ng <options> <replay interface>

Filter options:

-b bssid : MAC address, Access Point

-d dmac : MAC address, Destination

-s smac : MAC address, Source

-m len : minimum packet length

-n len : maximum packet length

-u type : frame control, type field

-v subt : frame control, subtype field

-t tods : frame control, To DS bit

-f fromds : frame control, From DS bit

-w iswep : frame control, WEP bit

-D : disable AP detection

Replay options:

-x nbpps : number of packets per second

-p fctrl : set frame control word (hex)

-a bssid : set Access Point MAC address

-c dmac : set Destination MAC address

-h smac : set Source MAC address

-g value : change ring buffer size (default: 8)

-F : choose first matching packet

Fakeauth attack options:

-e essid : set target AP SSID

-o npckts : number of packets per burst (0=auto, default: 1)

-q sec : seconds between keep-alives

-Q : send reassociation requests

-y prga : keystream for shared key auth

-T n : exit after retry fake auth request n time

Arp Replay attack options:

-j : inject FromDS packets

Fragmentation attack options:

-k IP : set destination IP in fragments

-l IP : set source IP in fragments

Test attack options:

-B : activates the bitrate test

Source options:

-i iface : capture packets from this interface

-r file : extract packets from this pcap file

Miscellaneous options:

-R : disable /dev/rtc usage

--ignore-negative-one : if the interface‘s channel can‘t be determined,

ignore the mismatch, needed for unpatched cfg80211

Attack modes (numbers can still be used):

--deauth count : deauthenticate 1 or all stations (-0)

--fakeauth delay : fake authentication with AP (-1)

--interactive : interactive frame selection (-2)

--arpreplay : standard ARP-request replay (-3)

--chopchop : decrypt/chopchop WEP packet (-4)

--fragment : generates valid keystream (-5)

--caffe-latte : query a client for new IVs (-6)

--cfrag : fragments against a client (-7)

--migmode : attacks WPA migration mode (-8)

--test : tests injection and quality (-9)

--help : Displays this usage screen

AIREPLAY-NG包註入測試

基本測試

aireplay -9 wlan2mon

向隱藏AP/指定SSID註入

arieplay-ng -9 -e leven -a EC:26:CA:FA:02:DC wlan2mon

[email protected]:~# aireplay-ng -9 wlan2mon

10:08:55 Trying broadcast probe requests...

10:08:55 Injection is working!

10:08:57 Found 7 APs

10:08:57 Trying directed probe requests...

10:08:57 EC:26:CA:FA:02:DC - channel: 11 - ‘level‘

10:08:58 Ping (min/avg/max): 2.306ms/32.381ms/71.026ms Power: -58.57

10:08:58 30/30: 100%

10:08:58 64:09:80:04:18:A2 - channel: 10 - ‘19e_18A1‘

10:08:58 Ping (min/avg/max): 1.435ms/11.855ms/50.074md Power: -69.33

10:08:59 27/30: 90%

[email protected]:~# aireplay-ng -9 wlan2mon -e KiFi EC:26:CA:FA:02:DC

19:15:23 Waiting for beacon frame (BSSID: EC:26:CA:DC:29:B6) on channel 11

19:15:23 Trying broadcast probe requests...

19:15:23 Injection is workings...

19:15:25 Found 1 AP

19:15:25 Trying directed probe requests...

19:15:25 EC:26:CA:DC:29:B6 - channel: 11 - ‘KiFi‘

19:15:25 Ping (min/avg/max): 1.455ms/10.263ms/21.097ms Power: -34.14

19:15:25 29/30: 96%

AIREPLAY-NG包註入測試

card to card註入測試

具體攻擊方式

-i作為AP的網卡

5/7 Faild

註入MAC和真正MAC相同時可以正常使用

[email protected]:~# aireplay-ng -9 -i wlan0mon wlan2mon

10:56:32 Trying broadcast probe requests...

10:56:33 No Answer...

10:56:33 Found 3 APs

10:56:33 Trying directed probe requests...

10:56:33 64:09:80:04:18:A2 - channel: 10 - ‘19e_18A1‘

10:56:34 Ping (min/avg/max): 1.195ms/20.474ms/102.766ms Power: -49.72

10:56:34 29/30: 96%

10:56:34 Injecion is working!

10:56:34 64:09:80:58:2A:64 - channel: 10 - ‘19e_Life‘

10:56:35 Ping (min/avg/max): 1.122ms/20.051ms/84.037ms Power: -54.57

10:56:35 28/30: 93%

10:56:35 38:59:F9:47:EC:BB - channel: 10 - ‘LieBaoWiFi599‘

10:56:40 Ping (min/avg/max): 1.700ms/13.009ms/31.799ms Power: -71.71

10:56:40 7/30: 23%

10:56:40 Trying card-to-card injection...

10:56:40 Attack -0: OK

10:56:40 Attack -1 (open): OK

10:56:40 Attack -1 (psk): OK

10:56:40 Attack -2/-3/-4/-6: OK

10:56:43 Attack -5/-7: Failed

該筆記為安全牛課堂學員筆記,想看此課程或者信息安全類幹貨可以移步到安全牛課堂

Security+認證為什麽是互聯網+時代最火爆的認證?


牛妹先給大家介紹一下Security+


Security+ 認證是一種中立第三方認證,其發證機構為美國計算機行業協會CompTIA ;是和CISSP、ITIL 等共同包含在內的國際 IT 業 10 大熱門認證之一,和CISSP偏重信息安全管理相比,Security+ 認證更偏重信息安全技術和操作。

通過該認證證明了您具備網絡安全,合規性和操作安全,威脅和漏洞,應用程序、數據和主機安全,訪問控制和身份管理以及加密技術等方面的能力。因其考試難度不易,含金量較高,目前已被全球企業和安全專業人士所普遍采納。

Security+認證如此火爆的原因?

原因一:在所有信息安全認證當中,偏重信息安全技術的認證是空白的, Security+認證正好可以彌補信息安全技術領域的空白 。

目前行業內受認可的信息安全認證主要有CISP和CISSP,但是無論CISP還是CISSP都是偏重信息安全管理的,技術知識講的寬泛且淺顯,考試都是一帶而過。而且CISSP要求持證人員的信息安全工作經驗都要5年以上,CISP也要求大專學歷4年以上工作經驗,這些要求無疑把有能力且上進的年輕人的持證之路堵住。在現實社會中,無論是找工作還是升職加薪,或是投標時候報人員,認證都是必不可少的,這給年輕人帶來了很多不公平。而Security+的出現可以掃清這些年輕人職業發展中的障礙,由於Security+偏重信息安全技術,所以對工作經驗沒有特別的要求。只要你有IT相關背景,追求進步就可以學習和考試。

原因二: IT運維人員工作與翻身的利器。

在銀行、證券、保險、信息通訊等行業,IT運維人員非常多,IT運維涉及的工作面也非常廣。是一個集網絡、系統、安全、應用架構、存儲為一體的綜合性技術崗。雖然沒有程序猿們“生當做光棍,死亦寫代碼”的悲壯,但也有著“鋤禾日當午,不如運維苦“的感慨。天天對著電腦和機器,時間長了難免有對於職業發展的迷茫和困惑。Security+國際認證的出現可以讓有追求的IT運維人員學習網絡安全知識,掌握網絡安全實踐。職業發展朝著網絡安全的方向發展,解決國內信息安全人才的匱乏問題。另外,即使不轉型,要做好運維工作,學習安全知識取得安全認證也是必不可少的。

原因三:接地氣、國際範兒、考試方便、費用適中!

CompTIA作為全球ICT領域最具影響力的全球領先機構,在信息安全人才認證方面是專業、公平、公正的。Security+認證偏重操作且和一線工程師的日常工作息息相關。適合銀行、證券、保險、互聯網公司等IT相關人員學習。作為國際認證在全球147個國家受到廣泛的認可。

在目前的信息安全大潮之下,人才是信息安全發展的關鍵。而目前國內的信息安全人才是非常匱乏的,相信Security+認證一定會成為最火爆的信息安全認證。


本文出自 “11662938” 博客,請務必保留此出處http://11672938.blog.51cto.com/11662938/1967236

【安全牛學習筆記】AIREPLAY-NG