1月18日-每日安全知识热点

http://p2.qhimg.com/t012dfaf746e4fefbe3.jpg

1.hot potato :通过ntlm relay和nbns欺骗实现windows提权

http://foxglovesecurity.com/2016/01/16/hot-potato/

2.DIVA Android:andorid app漏洞练习程序

https://github.com/payatu/diva-android/

3.PoC || GTFO 杂志第10期

http://n0k.r4n0k.com/pocorgtfo/pocorgtfo10.pdf

4.分析一次针对LostPass的钓鱼攻击

https://www.seancassidy.me/lostpass.html

5.逆向分析和exploit开发基于AVR的嵌入式设备

http://www.slideshare.net/dark_k3y/practical-reverse-engineer-and-exploit-development-for-avrbased-embedded-devices-s4x16

6.处理脚本小子 – Crypter.B事件

http://www.utkusen.com/blog/dealing-with-script-kiddies-cryptear-b-incident.html

7.自制一个wifi中间人设备

http://blog.gerzic.rs/custom-made-versatile-autonomous-mitm-wifi-box

8.基于位置的有效载荷 – 第四部分

http://brutelogic.com.br/blog/location-based-payloads-part-iv/

9.使用Grsecurity加固Debian桌面

https://micahflee.com/2016/01/debian-grsecurity/

10.利用PaX/Grsecurity加固GNU/Linux桌面

http://hardenedlinux.org/system-security/2016/01/10/hardening-your-desktop-linux-mint-with-grsec.html

11.HTTP逃逸第十部份: Lazy Browsers

http://noxxi.de/research/http-evader-explained-10-lazy-browsers.html

12.Ubee EVW322 的UPC自定义固件的命令执行漏洞

https://firefart.at/post/upc_ubee_fail/

13.BIOS安全之符号执行

http://www.markrtuttle.com/data/papers/bazhaniuk-loucaides-rosenbaum-tuttle-zimmer-woot15.pdf

14.我的hash就是我的passport:明白web和移动认证

http://www.darthnull.org/media/presentations/HashPassport-AuthMethods_ShmooCon_2016.pdf

15.分析$560万的exploit与Cryptsy安全缺陷

http://earlz.net/view/2016/01/16/0717/analyzing-the-56-million-exploit-and-cryptsys-security

16.安全专家再次绕过Gatekeeper

https://macviruscom.wordpress.com/2016/01/15/bypassing-gatekeeper-again/

17.使用idapython使你的逆向生活更简单第五部分

http://researchcenter.paloaltonetworks.com/2016/01/using-idapython-to-make-your-life-easier-part-5/

18.windows kernel利用

http://www.slideshare.net/PeterHlavaty/windows-kernel-exploitation-this-time-font-hunt-you-down-in-4-bytes

免责声明:文章内容不代表本站立场,本站不对其内容的真实性、完整性、准确性给予任何担保、暗示和承诺,仅供读者参考,文章版权归原作者所有。如本文内容影响到您的合法权益(内容、图片等),请及时联系本站,我们会及时删除处理。查看原文

为您推荐