Aggregator
0x01 工具介绍BurpSuite是一款信息安全从业人员必备的集成型的渗透测试工具,它采用自动测试和半自动测试的方式,包含了 Proxy,Spider,Scanner,Intruder,Rep...
Book: Cybersecurity Attacks - Red Team Strategies
5 years 1 month ago
Excited to announce the book that I have been working on:
Cybersecurity Attacks - Red Team Strategies
Learn about the foundational tactics, techniques and procedures to elevate your red teaming skills and enhance the overall security posture of your organization by leveraging homefield advantage.
Contents and Background Red Team Strategies covers aspects that are not as commonly discussed in literature, including chapters around building and managing a pen test team.
Regional Threat Perspectives, Fall 2019: Canada
5 years 1 month ago
The U.S. and Canada have 95% of top source traffic countries in common.
burp插件debug - 羊小弟
5 years 1 month ago
java -agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=5005 -jar burpsuite_community_v2.1.0.jar 通过这篇文章学到的,https://www.freebuf.com/articles
羊小弟
利用SSH隧道构建多级tunnel
5 years 1 month ago
01简介隧道是把一种网络协议封装进另外一种网络协议进行传输的技术。SSH构建隧道有三种方式: 本地转发、远程
Cms代码审计方法
5 years 1 month ago
前言 记录cms挖掘漏洞的几种下手方法 基于危险函数 最常见的应该是这种了 通过搜索常见的危险函数如assert|eval|system|file_
Docker中的Mysql配置问题处理与思考
5 years 1 month ago
hurricane618
Vulnerabilities, Exploits, and Malware Driving Attack Campaigns in October 2019
5 years 1 month ago
Vulnerable web servers are the top target for threat actors, who continue to exploit known vulnerabilities with the goal of running commands remotely.
Recognizing Lessons Learned From the First DNSSEC Key Rollover, a Year Later
5 years 1 month ago
A year ago, under the leadership of the Internet Corporation for Assigned Names and Numbers (ICANN), the internet naming community completed the first-ever rollover of the cryptographic key that plays a critical role in securing internet traffic worldwide. The ultimate success of that endeavor was due in large part to outreach efforts by ICANN and […]
The post Recognizing Lessons Learned From the First DNSSEC Key Rollover, a Year Later appeared first on Verisign Blog.
Burt Kaliski
Code Audit
5 years 1 month ago
前言 代码审计是白盒测试的重要部分,对它的自动化探索也从未停止,但是在现实环境复杂度下现有的工具 实用性并不用.只能实现发现简单漏洞.本文讨论现
Regional Threat Perspectives, Fall 2019: United States
5 years 1 month ago
U.S. systems were heavily targeted by IP addresses in Russia, Moldova, and France that launched credential stuffing attacks on VNC port 5900 beginning in June 2019.
如何配置Policy强制AWS控制台使用MFA,CLI不用MFA?
5 years 1 month ago
TonghuaRoot
罗马史书单 C1.0
5 years 1 month ago
前言之前忘了哪个逗比说,让我定期推荐一些书。今天突发奇想,弄个书单。
2019 NJCTF WarmUp - H4lo
5 years 1 month ago
一道沙箱题 主函数: seccom 函数中做了一些沙箱规则,看不懂不要紧,直接使用 seccom 进行 dump 出规则。 参考:https://www.anquanke.com/post/id/186447 h2 15 使用方法: 很清楚看到这里限制了 execve 函数的调用,那么可以使用 op
H4lo
如何限制IAM User只能在指定的IP登录?
5 years 1 month ago
TonghuaRoot
S3 pre-signed URL 与 KMS 加密那些事
5 years 1 month ago
TonghuaRoot
一点工作上的思考与感想 - r00tgrok
5 years 1 month ago
最近工作上有些变化,从中学到不少东西,有些感触,记录如下。 抛开具体的公司、工作岗位要求不谈,以下问题或事项是需要注意或能回答的: 面试中需要回答或考虑的问题 1、之前工作经历中充当什么样的角色、发挥了什么样的作用、产出了什么样的成果? 2、你或你公司在产品、技术或服务上,和别人/友商相比差异化、有
r00tgrok
一种无法被Dump的jar包加密保护解决方案 - 我是小三
5 years 1 month ago
0x00:为什么需要保护?保护后性能如何? 由于Java的指令集比较简单而通用,较容易得出程序的语义信息,Java编译后的Jar包和Class文件,可以轻而易举的使用反编译工具(如JD-GUI)进行反编译,拿到源码。目前,市场上有许多Java的反编译工具,有免费的,也有商业使用的,还有的是开放源代码
我是小三
2.2 Million Users Affected By Latest Data Exposure: 4 Tips to Stay Secure
5 years 1 month ago
The digitalization of data allows it to move effortlessly and be accessed from devices and places around the world within...
The post 2.2 Million Users Affected By Latest Data Exposure: 4 Tips to Stay Secure appeared first on McAfee Blog.
McAfee
漏洞之王:漫谈高阶漏洞攻防演进和现实威胁
5 years 1 month ago
在系统攻防多年的对抗演进中,不仅有高标准艺术般的漏洞挖掘和利用,更有重剑无锋大巧不工的防御设计。前者光芒四射,后者大象无形,却都应是我们所追寻的目标。应聂君先生邀请,为这个话题分享些自己的经验和想法。