Aggregator
声明 本人(黑鸟)从来未与国内外任何机构、NGO存在所谓的情报业务合作。请不法分子不要再盗用本人名义到处坑蒙拐骗,搞所谓的情报合作,若有因此上当受骗者,本人概不负责。 网上流传的XX在线文章关于本人的内容多处失实,充斥着误导,已对本人声誉造成恶劣的不良影响,本人将保留追究相关公众号法律责任的权利。
4 years 3 months ago
声明 本人(黑鸟)从来未与国内外任何机构、NGO存在所谓的情报业务合作。请不法分子不要再盗用本人名义到处坑蒙拐骗,搞所谓的情报合作,若有因此上当受骗者,本人概不负责。 网上流传的XX在线文章关于本人的内容多处失实,充斥着误导,已对本人声誉造成恶劣的不良影响,本人将保留追究相关公众号法律责任的权利。
4 years 3 months ago
赠书 |《404 Paper 精粹》第一期发布啦!
4 years 3 months ago
福利很大,你看一下。
FUTEX_SWAP补丁分析-SwitchTo 如何大幅度提升切换性能?
4 years 3 months ago
作者简介胡哲宁,西安邮电大学计算机科学与技术专业大二学生。Google SwitchTo由于协程本身对操作系统的不可见性,协程中出现的 BUG 往往不能通过一些已有的工具去排查。在谷歌内部...
21cnbao
不一样的未授权访问到命令执行
4 years 3 months ago
一次不一样的未授权访问到命令执行的案例。
不一样的未授权访问到命令执行
4 years 3 months ago
一次不一样的未授权访问到命令执行的案例。
The State of the State of Application Exploits in Security Incidents
4 years 3 months ago
The title of this report is not a typo. “The State of the State of Application Exploits in Security Incidents” is a meta-analysis of several prominent industry reports, each of which covers the state of application security.
The State of the State of Application Exploits in Security Incidents
4 years 3 months ago
The title of this report is not a typo. “The State of the State of Application Exploits in Security Incidents” is a meta-analysis of several prominent industry reports, each of which covers the state of application security.
近距离看GPU计算(2)
4 years 3 months ago
在《近距离看GPU计算》系列第一篇里我们介绍了GPU的一些基础知识及其如何从图形加速设备演化到通用计算平台。本文我们会具体从处理单元设计和存储层次结构两个方面探讨GPU不同于CPU的特点,...
21cnbao
iOS RE 4 beginners 2 - 静态链接&&动态链接
4 years 3 months ago
muhe
不一样的未授权访问到命令执行
4 years 3 months ago
一次不一样的未授权访问到命令执行的案例。
Zero Trust Network Access Is an Oxymoron
4 years 3 months ago
Though Zero Trust is really quite simple and should be viewed as a very strong form of the age-old principle of least privilege, that does not mean that it is the same thing. In fact, one of the most significant differences from what came before is that when it comes to access, Zero Trust is based on application access, not network access. I was surprised, then, when Gartner's new SASE (secure access service edge) model included something called Zero Trust Network Access (ZTNA). This term is an oxymoron, and I make this point because it matters. The distinction between network access and application access is important.
Robert Blumofe
程序员可能必读书单推荐(一)
4 years 3 months ago
公众号到了三万粉丝,分享一下作者完整读过的三本书
程序员可能必读书单推荐(一)
4 years 3 months ago
公众号到了三万粉丝,分享一下作者完整读过的三本书
程序员可能必读书单推荐(一)
4 years 3 months ago
公众号到了三万粉丝,分享一下作者完整读过的三本书
程序员可能必读书单推荐(一)
4 years 3 months ago
公众号到了三万粉丝,分享一下作者完整读过的三本书
程序员可能必读书单推荐(一)
4 years 3 months ago
公众号到了三万粉丝,分享一下作者完整读过的三本书
Active-Directory-Security-101
4 years 3 months ago
前置知识
环境搭建
信息收集
NTLM的利用
Kerberos-Roasting
Kerberos (Delegation)
ACL攻击
权限维持
参考答案
程序员可能必读书单推荐(一)
4 years 3 months ago
公众号到了三万粉丝,分享一下作者完整读过的三本书