Aggregator
安全不只是渗透
Gamifying Security with Red Team Scores
Security metrics are an interesting topic.
Over the years I used “scores” as a tool to identify and shine light on problematic areas or highlight lack of engineering and security quality of certain teams.
A security score should not seen as an objective or absoulte measure, but it allows to compare systems with each other at a relative scale, and by sharing the score it makes people ask questions.
RedTeamTricks
CobaltStrike内层组件分析(一)
CobaltStrike内层组件分析(一)
CobaltStrike内层组件分析(一)
CobaltStrike内层组件分析(一)
CobaltStrike内层组件分析(一)
CobaltStrike内层组件分析(一)
CobaltStrike内层组件分析(一)
Freebsd UMA内核堆安全特性解读
Freebsd UMA内核堆安全特性解读
Workflow的代码注入导致SharePoint RCE(CVE-2020-0646)
Workflow的代码注入导致SharePoint RCE(CVE-2020-0646)
Workflow的代码注入导致SharePoint RCE(CVE-2020-0646)
记一次shiro反序列化漏洞getshell
我的 2020
记一次shiro反序列化漏洞getshell
The Domain Name System: A Cryptographer’s Perspective
This is the first in a multi-part blog series on cryptography and the Domain Name System (DNS). As one of the earliest protocols in the internet, the DNS emerged in an era in which today’s global network was still an experiment. Security was not a primary consideration then, and the design of the DNS, like […]
The post The Domain Name System: A Cryptographer’s Perspective appeared first on Verisign Blog.