Aggregator
准备断更些时日
3 years 3 months ago
写下这个标题估计就已经要被骂死了,谁让自己很厚颜无耻的在前面立下了flag。读者们可能已经注意到我实际上已经
Video: Understanding Image Scaling Attacks
3 years 3 months ago
Today you are in for a special treat. Did you know that an adversary can hide a smaller image within a larger one?
This video demonstrates how a small image becomes magically visible when the computer resizes the large image, and also how to mitigate the vulnerability.
This is possible when vulnerable code uses insecure interpolation.
If you like this one check out the overall Machine Learning Attack Series.
赠书 | 《网络威胁情报技术指南》
3 years 3 months ago
作为国内第一本正式出版的、普及威胁情报技术的专业书籍,由天际友盟的技术团队共同编写的《网络威胁情报技术指南》
玄 - 利用blockdlls和ACG保护恶意进程 - zha0gongz1
3 years 3 months ago
## blockdlls Cobalt Strike 3.14版本以后添加了blockdlls功能,它将创建一个子进程并限定该子进程只能加载带有Microsoft签名的DLL。 这个功能可以阻止第三方安全软件向子进程注入DLL,也就无法对子进程进行hook,最终起到保护子进程的效果。 XPN在[博客
zha0gongz1
Video: What is Tabnabbing?
3 years 3 months ago
Tabnabbing is a web application security vulnerability that can be used to perform phishing attacks, so its important to be aware of it as a developer and penetration tester.
It is easy to mitigate and in this short video we cover both attacks and mitigations.
Thanks for reading and happy hacking!
@wunderwuzzi23
weblogic下spring bean RCE的一些拓展
3 years 3 months ago
spring bean rce payload构造之旅
美团外买APP设备指纹风控分析 - 我是小三
3 years 3 months ago
目录: 一、电商类APP业务风险类型 二、设备指纹在业务中的应用 三、整体框架 四、初始化流程分析 五、反爬虫mtgsig签名 六、设备指纹分析 七、设备指纹攻击 八、黑产工具特征检测 九、总结 一、电商类APP业务风险类型 电商行业的各个业务场景面临不同的风险种类:客户端漏洞利用、协议逆向、注册小
我是小三
Offensive BPF: What's in the bpfcc-tools box?
3 years 3 months ago
This post is part of a series about Offensive BPF that I’m working on to learn about BPF to understand attacks and defenses. Click the “ebpf” tag to see all relevant posts.
In the previous posts I spend time learning about bpftrace which is quite powerful. This post is focused on basics and using existing BPF tools, rather then building new BPF programs from scratch.
Living off the land: bpfcc-tools Performance and observability teams are pushing for BPF tooling to be present in production.
Apache 2.4.49 (CVE-2021-41773) 、 2.4.50 (CVE-2021-42013) 检测工具
3 years 3 months ago
漏洞描述Apache HTTPd是Apache基金会开源的一款流行的HTTP服务器。2021年10月8日Ap
小侃威胁情报(一)
3 years 3 months ago
威胁情报的体系思考
Secure communications principles
3 years 3 months ago
Guidance to help you assess the security of voice, video and messaging communication services.
Mitigating CVE-2021-41773: Apache HTTP Server Path Traversal
3 years 3 months ago
On September 29, Ash Daulton, along with the cPanel Security Team, reported a path traversal and file disclosure vulnerability in Apache HTTP Server 2.4.29 to the Apache security team. The issue was fixed within two days, under CVE-2021-41773, and the patch was released on October 4. Apache urged to deploy the fix, as it is already being actively exploited.
Assaf Vilmovsky & Maxim Zavodchik
美国秘密命令谷歌、微软和雅虎交出搜索指定关键词的人员信息
3 years 3 months ago
2021年10月,福布斯发布了一篇关于美国FBI秘密命令谷歌提供任何输入特定搜索词的人员数据,其中提及到多份
金庸武侠赏析 (随记版)
3 years 3 months ago
中秋翻完了《六神磊磊读金庸》,趁着国庆闭环输出些内容。
Offensive BPF: Detection Ideas
3 years 3 months ago
This post is part of a series about Offensive BPF that I’m working on to learn how BPFs use will impact offensive security, malware and detection engineering.
Click the “ebpf” tag to see all relevant posts.
In the last few posts, we talked about a bpftrace and how attackers can use it to their advantage. This post is about my initial ideas and strategies to detecting malicious usage.
Detecting BPF misuse There are a set of detection ideas for Blue Teams.
Coming Together to Tackle Phishing ? For the Greater Good
3 years 3 months ago
Every day, Akamai?s Threat Research team tracks and mitigates phishing attack campaigns to help keep our customers ? and their reputations ? protected. Recently, they tracked an orchestrated attack campaign comprising more than 9,000 domains and subdomains, mainly targeting victims located in China. The phishing scam was abusing more than 15 high-profile and trusted brands spanning ecommerce, travel, and food & beverage industries. By using well-known brand names, the threat actors attempted to engage victims to participate in a quiz that, once completed, would result in winning an attractive prize. Akamai refers to this malicious modus operandi as a ?question quiz? phishing attack campaign.
Akamai Threat Research Team
Attack Campaigns Ramp Up for Organizations Down Under
3 years 3 months ago
DDoS and AppSec attacks impacting the ANZ region (Australia and New Zealand) have been in the headlines of late, with several high profile companies seeing prolonged outages and leading to speculation as to whether the region is being specifically targeted? Let?s take a closer look at the types of attack vectors and malicious activity we?ve seen focused on customers down under.
Tom Emmons
Making the Internet Resilient: Part One
3 years 3 months ago
Think how many websites you visit or videos you stream. Do you check your bank account or transfer money, download apps, play music, share updates on social media, or use the internet for any of the thousands of other digital experiences it enables every day?
Adam Karon
闲聊黑客成长路径
3 years 3 months ago
创造价值绝对是一件美好的事:-)