咪係囉 你都識講security 根本多到數唔曬,可以油既工 唔方有quality

web/mobile pen test - ssrf, deserialization, 都唔係咁試test到出黎

是但burp scan/vscan nmap下就叫識red team咩


淨係做reverse engine 都根本唔會有做完既一日,點樣可以油到

infra pen test又識唔識 用咩寫malware, call back有幾多種
blue team 點set correlation, 擋到幾多種callback, 點收log去detect malicious enumeration, 點detect lateral movement
ir 再天馬行空d, 點樣最快搵到shadow account, 會唔會有web shell搵唔到, 是但一範要精都起碼要曬以年計日以繼夜既心機, 點樣可以份工油到 又學到野呀

