11
6月

Tittle: 2016.6.12

0 作者:admin

leaked data LinkedIn Data Dump

leaked data Gulf1bank.com

leaked data Westfifth.com

leaked data Myspace

leaked data Nulled.io

leaked data Staminus

leaked data NASA Drones

6月12日-每日安全知识热点

每日安全动态推送(06-12)

Vulnerability Spotlight: PDFium Vulnerability in Google Chrome Web Browser

Vulnerability Spotlight: ESnet iPerf3 JSON parse_string UTF Code Execution Vulnerability

Petya and Mischa – Ransomware Duet (part 2)

New rambling about Nemucod Ransomware

on Sakula DLL Planting Analysis

Linux kernel stack overflow via ecryptfs and /proc/$pid/environ(a local priv escalation)

Linux Kernel ROP - Ropping your way to (Part 1)

Android - /system/bin/sdcard Stack Buffer Overflow Exploit

Dissecting Veil-Evasion Powershell Payloads and Converting to a Bind Shell

Lurk Banker Trojan: Exclusively for Russia

Testing Race Conditions in Web Applications

PHDays VI: WAF Bypass Contest

Penetration Testing with Splunk: Leveraging Splunk Admin Credentials to Own the Enterprise

How to test Kerberos authenticated web applications?

Bower:A package manager for the web

Malware Analysis Tutorials: a Reverse Engineering Approach

WinDBG Anti-RootKit Extension v2.0 RC available

Practical Reverse Engineering Part 1 - Hunting for Debug Ports

Practical Reverse Engineering Part 2 - Scouting the Firmware

Practical Reverse Engineering Part 3 - Following the Data

Practical Reverse Engineering Part 4 - Dumping the Flash

TeLeScope - real-time peering into the depths of TLS traffic from the hypervisor

OpenSSL DSA key recovery attack

tools Net-FTP-Brute:Net::FTP::Brute, a bruteforce (p)ftp connection handler to bypass strange corporate firewalls.

病毒工具 Black-ship:command line tool for denial of service attacks.

tools etfa2015:Source code for Modbus/TCP fuzzer used for ETFA 2015 paper

tools Reveal RootKit:detects processes hidden by rootkits on POSIX systems


评论


当前没有评论,快来评论吧!





来说点什么吧