7
9月

Tittle: 2017.9.8

0 作者:admin

McAfee LiveSafe MiTM Registry Modification leading to Remote Command Execution

Android Toast Overlay Attack: “Cloak and Dagger” with No Permissions

Pwning the Dlink 850L routers and abusing the MyDlink Cloud protocol

D-Link 路由器信息泄露和远程命令执行漏洞分析及全球数据分析报告

S2-053 复现分析过程

CVE-2017-0780: Denial-of-Service Vulnerability can Crash Android Messages App

IOTA Vulnerability Report: Cryptanalysis of the Curl Hash Function Enabling Practical Signature Forgery Attacks on the IOTA Cryptocurrency

Software(German election software) to capture votes in upcoming national election is insecure

New Security Measures in iOS 11 and Their Forensic Implications

Using koadic(JScript RAT) with Excel Macros

Using WinRM Through Meterpreter

Using WebDAV features as a covert channel

EMET on Windows 10 Insider aka PayloadRestrictions.dll and how it is loaded into a process

DolphinAttack allows hackers to use ultrasonic frequencies to launch attacks on smart devices

Some experiments to mistreat the Triton concolic execution framework through simple forged C programs.

Did we learn from LLC Side Channel Attacks? A Cache Leakage Detection Tool for Crypto Libraries

find php version from response header(日文)

ECMAScript 6 for Penetration Testers(2014)

Safari 10.1 Browser unsafe-inline CSP Bypass

Django debug page XSS漏洞(CVE-2017-12794)分析

fastjson 调试利用记录

EyesofNetwork SQL注入和代码执行CVE分析

tools Apple has published the macOS 10.12.6 source

tools CVE-2016-0040 Privilege Escalation Exploit For WMI Receive Notification Vulnerability (x86-64)

tools gdb-symbolic - symbolic execution extention for gdb

tools XFLTReaT - Tunnelling Framework

tools dotNET_WinDBG:Automate .NET analysis with this WinDBG plugin


评论


当前没有评论,快来评论吧!





来说点什么吧