Aggregator
四个有趣的真实漏洞挖掘案例分享 - 飘渺红尘✨
3 years 5 months ago
好久没写真实漏洞挖掘案例了,今天写一笔. 直接发漏洞细节,很生硬,大家也学不到什么,只有带入感情,留下笔者的想法,才能产生共鸣,真正的帮助到别人 这篇文章会设置密码,如果你通过密码查看到了它,你可以转发给其他人,有密码,是因为防止被"某些人"看见,相关漏洞已经修复了. 四个漏洞描述顺序:(1)存储过
飘渺红尘✨
分享图片
3 years 5 months ago
分享图片
3 years 5 months ago
分享图片
3 years 5 months ago
分享图片
3 years 5 months ago
分享图片
3 years 5 months ago
Exploit Development: No Code Execution? No Problem! Living The Age of VBS, HVCI, and Kernel CFG
3 years 5 months ago
Dealing with Virtualization-Based Security (VBS), Hypervisor-Protected Code Integrity (HVCI), and Kernel Control Flow Guard (kCFG).
Connor McGarr
Exploit Development: No Code Execution? No Problem! Living The Age of VBS, HVCI, and Kernel CFG
3 years 5 months ago
Dealing with Virtualization-Based Security (VBS), Hypervisor-Protected Code Integrity (HVCI), and Kernel Control Flow Guard (kCFG).
Connor McGarr
Exploit Development: No Code Execution? No Problem! Living The Age of VBS, HVCI, and Kernel CFG
3 years 5 months ago
Dealing with Virtualization-Based Security (VBS), Hypervisor-Protected Code Integrity (HVCI), and Kernel Control Flow Guard (kCFG).
Connor McGarr
我的知识管理方式
3 years 5 months ago
0x01 前言在这个信息过载的时代,我既是一名知识汲取的受益者,同时也是知识反噬的焦虑者。作为一名信息安全从业者,需要具有大量的阅读和碎片知识的积累,来帮助自己完善知识体系、提升对安全认知的见...
Coco413
Java Agent 核心技术JVM之类的热替换原理解读
3 years 5 months ago
Java Agent 核心技术JVM之类的热替换原理
分享图片
3 years 5 months ago
分享图片
3 years 5 months ago
分享图片
3 years 5 months ago
分享图片
3 years 5 months ago
分享图片
3 years 5 months ago
终端应用安全之网络流量分析
3 years 5 months ago
NOW I SEE YOU 👁
Critical VMWare Vulnerabilities
3 years 5 months ago
Summary
An emergency directive (ED) from CISA directs U.S. government agencies update VMWare products in response to critical vulnerabilities that could affect those agencies.
Threat Type
Vulnerability
Overview
Be advised that X-Force Incident Command is tracking Cybersecurity Directive ED 22-03 and an advisory issued by CISA in response to multiple vulnerabilities in VMware products. The Cybersecurity & Infrastructure Security Agency has issued an emergency directive regarding critical vulnerabilities in t
安恒信息网络安全4月月报|内附完整版下载
3 years 5 months ago
本文为报告部分精彩内容,内附完整版下载方式