漏洞分析:
1.Practical Reverse Engineering Part 5 - Digging Through the Firmware by Hack The World_Juan Carlos Jimenez
2.Exotic HTTP Headers by Pēteris Ņikiforovs
3.MacOS kernel code execution due to writable privileged IOKit registry properties by ianbeer
4.MacOS/iOS arbitrary port replacement in syslogd by ianbeer
5.double vm_deallocate in userspace MIG code can lead to UaF in mach services by ianbeer
6.IFUP - online payment hijacking/spoofing proof of concept by Seraum_ADRIEN T
惡意軟體分析:
1.Tofsee Spambot features .ch DGA - Reversal and Countermesaures by GovCERT.ch
POC:
1.IBM AIX 6.1/7.1/7.2 - 'Bellmail' Privilege Escalation by Hector X. Monsegur
2.SHORTCUTS AS ENTRY POINTS FOR MALWARE (POC) by phrozensoft
Shortcuts as entry points for malware (PoC) – Part 2
學習資源:
1.awesome-windows-exploitation by enddo
2.ZeroNights 2016 Presentations
工具:
1.Some useful forensics tools for your forensics investigation by peerlyst_AdminAdmin
2.Writing Burp Extensions (Shodan Scanner) by InfoSec Resources_Sahil Dhar
3.HackSysTeam-PSKernelPwn by FuzzySecurity
4.Noriben - Portable, Simple, Malware Analysis Sandbox by Lydecker Black
沒有留言:
張貼留言