Aggregator
Struts2 漏洞系列之S2-001分析 - magic_zero
7 years ago
0x00 前言 最近在学习java的相关漏洞,所以Struts2的漏洞自然是绕不开的。为了更好的理解漏洞原理,计划把Struts2所有的漏洞自己都做一个复现。并且自己去实现相关的POC。相关的环境搭建,以及POC实现细节,参考文章我都会尽可能的写清楚。方便自己记录学习过程的同时,方便看文章的人学习。
magic_zero
Mirai is Attacking Again, So We’re Outing its Hilarious, Explicit C&C Hostnames
7 years ago
With Mirai rearing its ugly head again, we’re revealing its C&C hostnames so organizations can update their denylists and protect themselves.
meltdown漏洞小白理解
7 years ago
Terenceli
New Python-Based Crypto-Miner Botnet Flying Under the Radar
7 years ago
A new Python-based botnet that mines Monero spreads via SSH and leverages Pastebin to publish new C&C server addresses.
Liability in an Assume Breach World
7 years ago
The safest way to run a network is to assume it’s going to breached, but that also means minimizing your liability and ensuring the executive team is fully aware of what is going on.
回看2017 | 威胁情报看威胁
7 years ago
又是一年 …
灯塔资讯中心Beta版本发布
7 years ago
我们实验室于近期推出了一个工控安全资讯搜集与分享工具(https://cert.plcscan.org),长久…
Z-0ne
初识堡垒机 (一)
7 years ago
有续篇还是没续篇,这是一个问题。
BrickerBot: Do “Good Intentions” Justify the Means—or Deliver Meaningful Results?
7 years ago
Most security researchers have good intentions, but ethics must play a central role in the decisions they make.
2017年书单【年终汇总】
7 years 1 month ago
今年是书单汇总的第五年,看得书不多,玩的游戏看的番
2017年书单【年终汇总】
7 years 1 month ago
今年是书单汇总的第五年,看得书不多,玩的游戏看的番
Bleichenbacher Rears Its Head Again with the ROBOT Attack
7 years 1 month ago
Bleichenbacher attacks will likely continue to pop up until TLS 1.3 is fully adopted, which could take years.
Drupal V7.3.1 框架处理不当导致SQL注入 - magic_zero
7 years 1 month ago
这个漏洞本是2014年时候被人发现的,本着学习的目的,我来做个详细的分析。漏洞虽然很早了,新版的Drupal甚至已经改变了框架的组织方式。但是丝毫不影响对于漏洞的分析。这是一个经典的使用PDO,但是处理不当,导致SQL语句拼接从而导致注入的问题。从这个问题,以及以往我见过的很多的漏洞来看,我不得不说
magic_zero
Achieving Multi-Dimensional Security Through Information Modeling—Modeling Inversion Part 5
7 years 1 month ago
In Part 5 of this blog series, we use inversion modeling techniques to develop a high-level protection strategy.
网络安全技术(7)入侵检测技术
7 years 1 month ago
基本概念 入侵: 绕过系统安全机制的非授权行为。危害计
网络安全技术(7)入侵检测技术
7 years 1 month ago
基本概念 入侵: 绕过系统安全机制的非授权行为。危害计
网络安全技术(5)访问控制技术
7 years 1 month ago
访问控制概述 访问控制是通过某种途径显式地准许或限制
网络安全技术(5)访问控制技术
7 years 1 month ago
访问控制概述 访问控制是通过某种途径显式地准许或限制
网络安全技术(4)身份认证技术
7 years 1 month ago
身份认证概述 定义: 身份认证是证实主体的真实身份与其