6月12日-每日安全知识热点

http://p0.qhimg.com/t01f7ef32da341925d2.jpg

http://citpsite.s3-website-us-east-1.amazonaws.com/oldsite-htdocs/pub/coldboot.pdf

冷启动攻击加密密钥


https://conference.hitb.org/hitbsecconf2016ams/materials/D1T1%20-%20Radu%20Caragea%20-%20Peering%20into%20the%20Depths%20of%20TLS%20Traffic%20in%20Real%20Time.pdf

实时解密TLS流量


http://tekwizz123.blogspot.tw/2016/06/solving-crackmes-beginners-guide-using.html

使用Hopper反编译器解决LuCiFeR's Crackme 2


http://malwinator.com/anti-disassembly-used-in-malware-a-primer/

恶意软件使用的反编译技巧


https://n0where.net/how-does-it-work-iptables/

iptables是如何工作的


http://www.toolswatch.org/wp-content/uploads/2015/11/ICSSCADA-Top-10-Most-Dangerous-Software-Weaknesses.pdf

ICS/SCADA Top 10 最危险的软件漏洞


https://github.com/graniet/Inspector

unix提权辅助工具


http://researchcenter.paloaltonetworks.com/2016/06/unit42-using-idapython-to-make-your-life-easier-part-6/

使用idapython让你的逆向工作更轻松


http://www.ehacking.net/2016/06/Block-TOR-users-access-website.html

如何禁止TOR用户访问你的网站


https://github.com/nccgroup/Cyber-Defence/blob/master/Technical%20Notes/Sakula/Sakula%20technical%20note%201.0.pdf

Sakula技术细节笔记 & YARA 规则


http://www.slideshare.net/iamit/social-media-risk-metrics?from_action=save

社交媒体风险度量


https://www.facebook.com/notes/phwd/facebook-bug-bounties-the-unofficial-treasure-map/1020506894706001

Facebook的Bug Bounties – 非官方的藏宝图


https://blogs.mcafee.com/mcafee-labs/testing-race-conditions-web-applications/

测试WEB应用程序的条件竞争漏洞


https://github.com/dxa4481/windowHijacking

Window hijacking DEMO程序


http://blog.ptsecurity.com/2016/06/phd-vi-how-they-stole-our-drone.html

他们如何偷取/劫持我的无人机的


https://blogs.intel.com/evangelists/2016/06/09/intel-release-new-technology-specifications-protect-rop-attacks/

Intel发行新技术用来阻止ROP攻击


http://blog.talosintel.com/2016/06/pdfium.html

google chrome中的PDFIUM 漏洞


http://rileykidd.com/2016/06/09/hack-in-the-box-2016-misc400-writeup-part-1/

Hack in the Box 2016 – MISC400 Writeup (Part 1)


http://www.clearskysec.com/wp-content/uploads/2016/06/Operation-DustySky2_-6.2016_TLP_White.pdf

DustySky2攻击行动报告


https://medium.com/@intideceukelaire/why-you-shouldnt-share-links-on-facebook-f317ba4aa58b#.q0q31z2kw

为什么你不能在Facebook上分享链接


http://www.irongeek.com/i.php?page=videos/nolacon2016/mainlist

NolaCon 2016 会议视频


http://sww-it.ru/2016-06-11/1381

WinDBG Anti-RootKit 扩展


https://blog.malwarebytes.org/threat-analysis/2016/06/petya-and-mischa-ransomware-duet-part-2/

彼佳和米莎 – 勒索二重奏(第二部分)


https://blog.cloudflare.com/optimizing-tls-over-tcp-to-reduce-latency/

通过TCP优化TLS来减少延迟


https://www.peerlyst.com/posts/resource-open-source-fuzzers-list

开源fuzzer列表


http://paraschetal.in/gracker-level07/

Gracker level7 write-up


https://bugs.chromium.org/p/project-zero/issues/detail?id=776#c_ts1465491638

OS X exploitable kernel NULL pointer dereference in IOAudioEngine        


https://dl.packetstormsecurity.net/1606-exploits/poisonivy_21x_bof.rb.txt

Poison Ivy 2.1.4 C2远程缓冲区溢出漏洞,漏洞分析在http://samvartaka.github.io/exploitation/2016/06/03/dead-rats-exploiting-malware


https://blogs.technet.microsoft.com/mmpc/2016/06/09/reverse-engineering-dubnium-2/

反向工程DUBNIUM


https://www.trustwave.com/Resources/SpiderLabs-Blog/Linux-Kernel-ROP—Ropping-your-way-to—(Part-1)/

linux内核ROP


http://jcjc-dev.com/2016/06/08/reversing-huawei-4-dumping-flash/

实践反向工程Part 4 – Dumping the Flash


http://www.securityweek.com/serious-flaw-found-popular-d-link-wi-fi-camera

流行的 D-Link Wi-Fi 摄像头 发现严重的漏洞


https://www.documentcloud.org/documents/2858939-Soghoian-Declaration-in-Matish.html

针对TOR浏览器的利用案例

免责声明:文章内容不代表本站立场,本站不对其内容的真实性、完整性、准确性给予任何担保、暗示和承诺,仅供读者参考,文章版权归原作者所有。如本文内容影响到您的合法权益(内容、图片等),请及时联系本站,我们会及时删除处理。查看原文

为您推荐