Aggregator
如何去设计和开发Anglerfish蜜罐
如何去设计和开发Anglerfish蜜罐
A brief overview of cloud-hypervisor, a modern VMM
How To Survive the Rash of Ransomware
How To Survive the Rash of Ransomware
OpenSSL security releases may require Node.js security releases
【实战3】记一次内网中反弹shell的艰难历程 - PaperPen
MLSRC诚邀您关注OGeek网络安全挑战赛决赛名单,极客争霸一触即发
MLSRC诚邀您关注OGeek网络安全挑战赛决赛名单,极客争霸一触即发
MLSRC诚邀您关注OGeek网络安全挑战赛决赛名单,极客争霸一触即发
MLSRC诚邀您关注OGeek网络安全挑战赛决赛名单,极客争霸一触即发
MLSRC诚邀您关注OGeek网络安全挑战赛决赛名单,极客争霸一触即发
De-icing IcedID: Decompression and Decryption Methods Explained in an IcedID Attack
De-icing IcedID: Decompression and Decryption Methods Explained in an IcedID Attack
Prototype Pollution Notes
了解原型链污染比较晚,从今年的 TCTF FINAL 到 REDPWN,再到 XNUCA,才算是慢慢开始理解这种攻击的用法以及利用的场景
Tips - Vicen
XXE Basic Summary
写这篇的原因是 OGEEK 上一道 LOCAL DTD 的题目,查了一些资料,想赛后整理一下,不过发现 K0rz3n 大佬写的实在是太详细了
GL.iNet MIFI 一款差不多的4G便携路由器
使用华为E5885L一年多了,对我而言,它不仅是一款完美的4G便携路由器,而且经过改造之后更是一款渗透利器。尽管这是一款非常美好的产品,但是在安全研究的工作中,还是发现有不少痛点。但是在使用了GL.iNet MIFI之后,完全满足了我的测试需求。尽管能够解决问题,但是某些地
Coinbase under attack and cookie theft
Recently Coinbase published a well written blog post on how they were under attack. The adversaries exploite Firefox 0-days. Details can be found here. One intersting aspect is the following:
“We have also observed the attackers specifically target cloud services, e.g. gmail and others, via browser session token theft via direct access to browser datastores. This activity also offers the opportunity for behavior-based detection, as relatively few processes should be directly accessing those files.”