Aggregator
内网互联产品“法海”体验
2 years 4 months ago
呃,扯远了,我一开始是要做什么来着?
Enemy at the Gates: Analyzing Attacks on Financial Services
2 years 4 months ago
Financial services is an often attacked vertical, but to what extent and how? This blog post will cover several security issues affecting this industry.
Badette Tribbey & Steve Winterfeld
未济
2 years 4 months ago
象曰:火在水上,未济。君子以慎辨物居方。
美军进攻性网络作战架构
2 years 4 months ago
网络作战平台的天选之子
美军进攻性网络作战架构
2 years 4 months ago
网络作战平台的天选之子
读海瑞《治安疏》
2 years 4 months ago
断断续续坚持了2个月,今天终于把《大明王朝1566》给听完了,讲的是明朝嘉靖三十九年到嘉靖四十五年之间,围绕
读海瑞《治安疏》
2 years 4 months ago
断断续续坚持了2个月,今天终于把《大明王朝1566》给听完了,讲的是明朝嘉靖三十九年到嘉靖四十五年之间,围绕
关于疫情,忍不住要说几句
2 years 4 months ago
关于疫情,忍不住要说几句
2 years 4 months ago
Atlassian-bitbucket RCE (CVE-2022-43781) 漏洞分析记录 - magic_zero
2 years 4 months ago
前言 距离上次写博客转眼已过去快三年,“空白”的这三年中也曾遇到很多有趣可成文的东西,但是因各种原因未能在此畅快抒怀。而在忙中偷闲的时候,也曾反省自己,以免迷失。回想最初入行安全的时候,全因一本早期的黑客杂志而对漏洞研究有了独特的热情,再后来在Wooyun看过前辈们精彩的漏洞之后更加坚定的将漏洞研究
magic_zero
Bypass谷歌发布的165条Cobalt Strike YARA规则
2 years 4 months ago
前言近日,谷歌云威胁情报团队开源了一组YARA规则,以帮助防御者标记和识别Cobalt Strike及其版本
Bypass谷歌发布的165条Cobalt Strike YARA规则
2 years 4 months ago
前言近日,谷歌云威胁情报团队开源了一组YARA规则,以帮助防御者标记和识别Cobalt Strike及其版本
dom xss->半自动化 - 飘渺红尘✨
2 years 4 months ago
前几天看了两篇文章,觉得很不错,写一笔,就当笔记记录。 第一篇文章:https://jinone.github.io/bugbounty-dom-xss/ 作者写了自己通过自动化挖dom xss,差不多赚了3w刀左右。他分享了一些不错的漏洞案例。这里很感谢作者,无私分享思路出来,也给大家有了喝口汤的
飘渺红尘✨
网络赌球的大动脉:非法四方支付“洗钱”产业链
2 years 4 months ago
世界杯激战正酣,网络赌球违法犯罪行为也在蠢蠢欲动。近年来,非法第四方支付平台已经成为网络犯罪的聚集、流转资金的重要渠道之一。
Wartime Sparks Unpredictable Shifts in DDoS Targeting
2 years 4 months ago
DDoS cyberattacks targeting European customers on the Akamai Prolexic platform are increasing worldwide, In response, Akamai unveiled its new DDoS solution.
Craig Sparling & Max Gebhardt
Manage Akamai Features at the Edge with EdgeWorkers and EdgeKV
2 years 4 months ago
EdgeWorkers and EdgeKV lets you set feature flags that tailor content to different website visitors.
Philip McGuinness
Sensor Intel Series: Top CVEs in October 2022
2 years 4 months ago
We spotted a new Microsoft Exchange zero day and more security infrastructure vulns, as well as all of the usual suspects, in this month’s installment on vulnerability targeting.
CTF | 2021 PKU GeekGame 1st WriteUp
2 years 4 months ago
第一届PKU GeekGame来了,题目的点套的太多了,太顶了,打得比较自闭。
MiaoTony
Device Code Phishing Attacks
2 years 4 months ago
As more organizations move to hardware tokens and password-less auth (e.g. Yubi-keys, Windows Hello for Business,…) attackers will look for other ways to to trick users to gain access to their data.
One novel phishing technique is by using the OAuth2 Device Authorization Grant.
This post describes how it works with Microsoft AAD as example.
Attacker initiates the phishing flow The attacker starts a Device Code flow by issuing a request to the device code token endpoint (e.