Aggregator
美国秘密命令谷歌、微软和雅虎交出搜索指定关键词的人员信息
美国秘密命令谷歌、微软和雅虎交出搜索指定关键词的人员信息
美国秘密命令谷歌、微软和雅虎交出搜索指定关键词的人员信息
Mitigating CVE-2021-41773: Apache HTTP Server Path Traversal
美国秘密命令谷歌、微软和雅虎交出搜索指定关键词的人员信息
金庸武侠赏析 (随记版)
金庸武侠赏析 (随记版)
金庸武侠赏析 (随记版)
Offensive BPF: Detection Ideas
This post is part of a series about Offensive BPF that I’m working on to learn how BPFs use will impact offensive security, malware and detection engineering.
Click the “ebpf” tag to see all relevant posts.
In the last few posts, we talked about a bpftrace and how attackers can use it to their advantage. This post is about my initial ideas and strategies to detecting malicious usage.
Detecting BPF misuseThere are a set of detection ideas for Blue Teams. Since we primarily talked about bpftrace so far, let’s explore that angle.
Coming Together to Tackle Phishing — For the Greater Good
Attack Campaigns Ramp Up for Organizations Down Under
Making the Internet Resilient: Part One
闲聊黑客成长路径
闲聊黑客成长路径
闲聊黑客成长路径
宽字节安全“第二期线下就业班”重磅来袭!!!
宽字节安全“第二期线下就业班”重磅来袭!!!
宽字节安全“第二期线下就业班”重磅来袭!!!
Offensive BPF: Using bpftrace to host backdoors
This post is part of a series about Offensive BPF that I’m working on to learn how BPFs use will impact offensive security, malware and detection engineering. Click the “ebpf” tag to see all relevant posts.
In the last post we talked about a basic bpftrace script to install a BPF program that runs commands upon connecting from a specific IP with a specific magic source port.
This post will dive into this idea more by leveraging more a complex solution.