Aggregator
Apache Flex SDK Installer 3.1——Flash SDK download failed
7 years 1 month ago
Mike Zhang
bytes to ascii string in x86 assembly language
7 years 1 month ago
Mike Zhang
xKungfoo2015: How I find bugs in Microsoft Office Word (:)fuzzing)
7 years 1 month ago
Mike Zhang
WooYun Forever
7 years 1 month ago
Mike Zhang
Windows 10-1703 black screen after login & copy action crashes app problem
7 years 1 month ago
Mike Zhang
Can Engineers Build Networks Too Complicated for Humans to Operate? Part II: Making Sense of Network Activities and System Behaviors
7 years 1 month ago
How to selectively capture packets for further analysis and avoid buying a storage farm.
Academic Research: A Survey of Email Attacks
7 years 1 month ago
Email has become such an ordinary part of our daily lives that we can forget how vulnerable it is.
OpenSSL update, 1.0.2m
7 years 1 month ago
关注 | 起航在即!中央企业网络安全产业联盟发起单位筹备会在京召开
7 years 1 month ago
本文转载自“中国网安”微信公众号
Android蓝牙远程命令执行漏洞利用实践:从PoC到Exploit
7 years 1 month ago
本文由MS509团队成员“thor@MS509 Team”原创,转载请注明来源。
本文已于2017-10-30 发布于“先知安全技术社区”。
Typecho install.php 后门分析
7 years 1 month ago
一不小心,博客就被黑了呢……
【Splunk】使用syslog-ng和UF(HF)收集syslog日志(一)需求 & 逻辑图 & 配置关系图
7 years 1 month ago
使用syslog-ng和UF(HF)收集syslog日志(一)需求 & 逻辑图 & 配置关系图
Typecho V1.1反序列化导致代码执行分析 - magic_zero
7 years 1 month ago
0x00 前言 今天在Seebug的公众号看到了Typecho的一个前台getshell分析的文章,然后自己也想来学习一下。保持对行内的关注,了解最新的漏洞很重要。 0x01 什么是反序列化漏洞 如题所说,这是一个反序列化导致的代码执行。看过我之前文章的人应该不会陌生。PHP在反序列化一个字符串时,
magic_zero
Reaper: The Professional Bot Herder’s Thingbot
7 years 1 month ago
While Reaper might be considered an “object lesson” today, it should serve as a blistering warning that IoT security needs to be fixed now.
DOS security vulnerability, October 2017
7 years 1 month ago
Help Guide the Future of Apps – Ultimately Your Threat Landscape – By Responding to Our SOAD Survey!
7 years 1 month ago
Assessing the State of Application Delivery depends on getting information from you about your applications!
Third-Party Security is Your Security
7 years 1 month ago
When you must depend on third parties for a variety of products and services, it’s critical that you hold them to high security standards.
Interview With the Experts: The Future of IoT Security Through the Eyes of F5 Threat Researchers
7 years 1 month ago
When it comes to IoT threats, we’re nowhere near being out of the woods yet; we’ve just barely entered the forest.
盘点前几年的预测
7 years 1 month ago
Doubt is not a pleasant condition, but certainty is an absurd one.