Aggregator
深入挖掘红队实战中WinRM的使用技巧
2 years 2 months ago
大家好!这里是219攻防实验室!你一定没有听说过我们,因为我们刚成立不久。219攻防实验室专注于前沿攻防研究
通过linux服务器进入内网后如何快速达到域控的思路总结
2 years 2 months ago
myeclipse打包项目,报Security alert:integrity check error
2 years 2 months ago
myeclipse 报错 integrity check error
aomandeshangxiao
web服务器启用了不安全的HTTP方法(转)
2 years 2 months ago
web 安全 不安全的HTTP方法
aomandeshangxiao
SD-WAN Integration: Routing Traffic to Optimize Network Performance
2 years 2 months ago
Optimize network performance with SD-WAN integration to automatically route traffic to the nearest Akamai Secure Internet Access point of presence.
Jim Black
安全规范建设指北
2 years 2 months ago
无规范不成架构
蓝军和elf loader
2 years 2 months ago
背景在linux系统上执行二进制文件一般会用到execve系统调用,比如下面的执行sleep 1000[ro
Highly Sophisticated Phishing Scams Are Abusing Holiday Sentiment
2 years 2 months ago
The holiday season is around the corner, which means phishing season is too. Akamai Security Research details the new ways adversaries are abusing the holidays.
Or Katz
《Web安全攻防从入门到精通》 送书活动来啦🎈 🎈 ☀️ 公众号粉丝回复“抽奖”即可参与并有机会获得🎁 《Web安全攻防从入门到精通》 书籍一本,没有中奖的小伙伴也不要灰心,当当带着满100减50活动来了,请点击以下链接进行购买,http://product.dangdang.com/29460729.html,活动时间截止11.21
2 years 2 months ago
Akamai?s Perspective on November?s Patch Tuesday
2 years 2 months ago
Every Patch Tuesday stirs up the community. See Akamai's November insights and recommendations on what to focus on, and patch, patch, patch!
Akamai Security Intelligence Group
Tackle Your Cloud Challenges, One Scenario at a Time
2 years 2 months ago
Forrester?s quick start cards cover 18 common issues with cloud migrations and operations, and suggest actions to mitigate each one.
Pavel Despot
【2倍奖励】嘎嘎丰厚,新老白帽你冲不冲?
2 years 2 months ago
不只是双倍积分奖励
The Medibank Data Breach – Steps You Can Take to Protect Yourself
2 years 2 months ago
Hackers have posted another batch of stolen health records on the dark web—following a breach that could potentially affect nearly...
The post The Medibank Data Breach – Steps You Can Take to Protect Yourself appeared first on McAfee Blog.
McAfee
optee学习(2) CA&TA调用流程分析
2 years 2 months ago
环境
CA --> optee client --> tee driver --> ATF --> TEE --> TA
- ubuntu22.04
- ADS + optee-fvp
这里直接从optee-examples中最简单的hello world入手来看的,从宏观上来看整个调用流程是 :
1CA --> optee client --> tee driver --> ATF --> TEE --> TA
muhe
浅谈XXE防御(Java)
2 years 2 months ago
Java安全-记一次实战使用memoryshell
2 years 2 months ago
本文是实战中遇到的一个技术点。很多时候我们使用内存马都是反序列化漏洞利用后一条龙直接植入。但有时候我们也会遇到命令拼接等问题获取到的权限,此时仅仅有命令执行而非代码执行的权限。常规的jsp马、cc等手段均无法作为后门,我们该怎么办?
Android 组件逻辑漏洞漫谈
2 years 2 months ago
对一些 Android 逻辑漏洞的梳理。
Android Native Fuzz Demo
2 years 2 months ago
muhe
ByteCTF2021 chatroom writeup
2 years 2 months ago
前言
在今年的ByteCTF中,我出了一道pwn题目,距离上一次打比赛/出题已经过去很久了,所以传统的 heap trick 就没有考虑,而是从我日常工作中挖掘的安全风险入手,简化场景,出了一道 chatroom ,看起来像一个web的奇怪题目。
muhe