Aggregator
Video: Understanding Image Scaling Attacks
Today you are in for a special treat. Did you know that an adversary can hide a smaller image within a larger one?
This video demonstrates how a small image becomes magically visible when the computer resizes the large image, and also how to mitigate the vulnerability.
This is possible when vulnerable code uses insecure interpolation.
If you like this one check out the overall Machine Learning Attack Series.
赠书 | 《网络威胁情报技术指南》
赠书 | 《网络威胁情报技术指南》
赠书 | 《网络威胁情报技术指南》
赠书 | 《网络威胁情报技术指南》
赠书 | 《网络威胁情报技术指南》
赠书 | 《网络威胁情报技术指南》
weblogic下spring bean RCE的一些拓展
weblogic下spring bean RCE的一些拓展
weblogic下spring bean RCE的一些拓展
weblogic下spring bean RCE的一些拓展
weblogic下spring bean RCE的一些拓展
玄 - 利用blockdlls和ACG保护恶意进程 - zha0gongz1
Video: What is Tabnabbing?
Tabnabbing is a web application security vulnerability that can be used to perform phishing attacks, so its important to be aware of it as a developer and penetration tester.
It is easy to mitigate and in this short video we cover both attacks and mitigations.
Thanks for reading and happy hacking!
weblogic下spring bean RCE的一些拓展
美团外买APP设备指纹风控分析 - 我是小三
Offensive BPF: What's in the bpfcc-tools box?
This post is part of a series about Offensive BPF that I’m working on to learn about BPF to understand attacks and defenses. Click the “ebpf” tag to see all relevant posts.
In the previous posts I spend time learning about bpftrace which is quite powerful. This post is focused on basics and using existing BPF tools, rather then building new BPF programs from scratch.
Living off the land: bpfcc-toolsPerformance and observability teams are pushing for BPF tooling to be present in production. Due to its usefulness, this is likely going to increase.