首页
课程
问答
CTF
社区
招聘
峰会
发现
排行榜
知识库
工具下载
看雪20年
看雪商城
证书查询
登录
注册
首页
社区
课程
招聘
发现
问答
CTF
排行榜
知识库
工具下载
峰会
看雪商城
证书查询
社区
外文翻译
发新帖
9
0
[分享]国外最新安全推文整理(第16期)
发表于: 2017-11-5 17:21
5002
[分享]国外最新安全推文整理(第16期)
BDomne
5
2017-11-5 17:21
5002
有些可能需要VPN访问,安全性方面自己多留意。
Office documents embedded with the DDE
a8bK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6Y4K9i4c8Z5N6h3u0Q4x3X3g2U0L8$3#2Q4x3V1j5H3P5r3c8W2j5h3c8T1k6h3g2X3d9V1g2d9d9#2W2Q4x3V1k6a6k6X3k6A6j5$3g2Q4x3X3c8p5c8p5g2Q4x3X3c8b7j5i4W2D9L8$3q4V1M7H3`.`.
VMware Escapology: How to Houdini the Hypervisor
693K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6Y4K9i4c8Z5N6h3u0Q4x3X3g2U0L8$3#2Q4x3V1k6@1K9r3g2*7k6r3W2Q4x3V1k6V1k6i4u0T1P5h3y4G2L8U0t1H3x3e0M7`.
Demystifying Windows Kernel Exploitation by Abusing GDI Objects
554K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6Y4K9i4c8Z5N6h3u0Q4x3X3g2U0L8$3#2Q4x3V1k6K6k6h3&6K6k6i4m8G2M7%4c8Q4x3V1k6Y4k6r3W2Q4x3X3c8H3j5h3I4W2N6s2c8W2M7#2)9J5k6r3g2^5M7l9`.`.
Porting Xbox360 executables to Windows
fa3K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6Y4K9i4c8Z5N6h3u0Q4x3X3g2U0L8$3#2Q4x3V1k6J5k6i4S2V1k6i4S2Q4x3V1k6J5k6h3y4G2L8i4m8A6L8r3g2J5
Protocol Extraction By Binary Execution
2a4K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6Y4K9i4c8Z5N6h3u0Q4x3X3g2U0L8$3#2Q4x3V1k6E0M7$3N6H3k6h3g2C8i4K6u0r3M7s2u0G2P5r3u0T1k6b7`.`.
Executable and object file formats, debugging data formats
afbK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6Y4K9i4c8Z5N6h3u0Q4x3X3g2U0L8$3#2Q4x3V1k6y4j5i4c8@1f1p5c8Q4x3V1k6U0M7s2m8D9K9h3&6C8M7#2)9J5c8X3u0D9L8$3u0Q4x3V1k6E0j5i4y4@1k6i4u0Q4x3V1k6W2P5r3g2U0N6i4c8S2j5X3I4W2M7#2)9J5k6h3#2V1
Allowing EDK-II Development (firmware development) with Visual Studio
47bK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6Y4K9i4c8Z5N6h3u0Q4x3X3g2U0L8$3#2Q4x3V1k6A6L8$3&6W2M7$3y4#2x3o6l9%4i4K6u0r3g2X3W2K6N6h3q4D9g2h3g2X3K9b7`.`.
PCI Express DIY hacking toolkit
606K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6Y4K9i4c8Z5N6h3u0Q4x3X3g2U0L8$3#2Q4x3V1k6o6M7U0c8K6K9q4)9J5c8Y4x3$3i4K6g2X3M7r3y4A6k6g2)9#2k6X3#2A6j5%4u0G2j5X3I4S2P5X3f1`.
ACM CCS 2017 Papers
ec5K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6S2j5$3#2U0j5%4y4Q4x3X3g2Y4K9i4c8Z5N6h3u0Q4x3X3g2A6L8#2)9J5c8Y4m8S2M7r3g2J5M7#2)9J5c8R3`.`.
Using Binary Diffing to Discover Windows Kernel Memory Disclosure Bugs
f93K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6Y4L8$3!0Y4L8r3g2H3M7X3!0B7k6h3y4@1P5X3g2J5L8#2)9J5k6h3u0D9L8$3N6K6M7r3!0@1i4K6u0W2j5$3!0E0i4K6u0r3x3U0l9I4y4#2)9J5c8U0p5H3i4K6u0r3N6i4y4A6L8X3N6Q4x3X3c8T1K9h3&6S2M7Y4W2Q4x3X3c8V1K9h3k6X3K9h3&6Y4i4K6u0V1N6r3!0Q4x3X3c8V1K9i4y4U0L8%4k6W2M7W2)9J5k6h3S2@1L8h3H3`.
Abusing GDI for Ring0 Exploit Primitives: Evolution
f9dK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6D9j5h3u0K6i4K6u0W2j5X3I4#2k6h3k6J5L8%4y4@1M7$3g2U0N6i4u0A6N6s2W2Q4x3X3g2V1k6g2)9J5c8X3k6A6L8r3g2K6i4K6u0r3b7h3u0#2M7$3W2F1k6#2)9#2k6V1N6p5d9g2)9#2k6X3k6G2M7W2)9#2k6Y4u0A6L8X3M7H3i4K6g2X3k6i4S2H3L8r3!0A6N6q4)9#2k6Y4m8J5K9h3#2A6N6r3W2$3k6i4y4Q4y4h3k6q4N6X3!0D9N6i4c8A6L8$3&6Q4y4h3k6e0L8r3W2V1k6i4y4Q4x3X3g2H3k6r3j5`.
A closer look at the CVE-2017-0263 privilege escalation vulnerability in Windows
bf3K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3u0D9L8$3N6Q4x3X3g2H3N6s2y4W2j5%4g2J5K9i4c8&6i4K6u0W2j5$3!0E0i4K6u0r3x3U0l9I4y4#2)9J5c8U0l9#2i4K6u0r3j5g2)9J5k6r3y4D9L8%4y4W2M7W2)9J5k6r3I4G2L8$3E0Q4x3X3c8S2N6q4)9J5k6r3y4$3k6g2)9J5k6o6t1H3x3e0N6Q4x3X3b7H3x3U0j5K6i4K6u0W2K9s2c8E0L8l9`.`.
Kernel Exploitation Case Study - "Wild" Pool Overflow on Win10 x64 RS2 (CVE-2016-3309 Reloaded)
d19K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6%4N6%4N6Q4x3X3g2K6K9h3u0W2M7X3q4K6i4K6u0W2k6r3g2Q4x3V1k6T1L8r3!0Y4i4K6u0r3x3U0l9I4y4#2)9J5c8U0p5H3i4K6u0r3x3o6g2Q4x3V1k6W2P5s2m8D9L8$3W2@1j5i4c8A6L8$3&6Q4y4h3k6U0j5i4y4W2i4K6g2X3M7%4c8#2k6s2W2Q4y4h3k6%4K9h3I4V1i4K6g2X3M7r3!0G2L8q4)9#2k6X3!0$3k6i4u0X3L8r3!0%4i4K6g2X3b7#2k6q4i4K6u0V1x3U0l9I4y4W2)9J5k6o6x3K6x3o6W2Q4y4h3k6J5k6h3I4G2j5h3c8W2k6q4)9J5k6h3S2@1L8h3H3`.
Automated Triage and Root Cause Analysis of Memory Corruption Issues
aa1K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6T1L8r3!0Y4M7#2)9J5k6i4c8W2j5$3S2F1k6i4c8Q4x3X3g2E0K9h3y4J5L8%4y4G2k6Y4c8Q4x3X3g2U0L8$3#2Q4x3V1k6K6M7X3c8Q4x3V1j5J5x3o6p5%4i4K6u0r3x3e0m8Q4x3V1j5H3x3#2)9J5c8Y4k6#2L8r3&6K6j5$3q4F1i4K6u0V1j5i4g2@1L8$3#2S2N6r3g2V1i4K6u0V1N6s2u0A6j5h3N6W2i4K6u0V1j5h3&6V1i4K6u0V1M7X3!0G2N6q4)9J5k6r3y4S2N6i4y4W2i4K6u0V1j5h3&6S2L8s2W2K6K9i4y4Q4x3X3c8G2k6W2)9J5k6r3#2W2L8h3!0J5P5g2)9J5k6r3y4G2M7Y4u0#2M7s2c8A6L8$3&6Q4x3X3c8A6M7%4y4#2k6i4y4Q4x3V1j5`.
Browser security beyond sandboxing
4a3K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6T1L8r3!0Y4M7#2)9J5k6i4c8W2j5$3S2F1k6i4c8Q4x3X3g2E0K9h3y4J5L8%4y4G2k6Y4c8Q4x3X3g2U0L8$3#2Q4x3V1k6E0L8i4m8U0i4K6u0r3x3U0l9I4y4#2)9J5c8U0p5H3i4K6u0r3x3e0S2Q4x3V1k6T1M7X3!0%4M7$3g2J5i4K6u0V1M7$3g2U0N6i4u0A6N6s2W2Q4x3X3c8T1k6i4W2G2L8X3c8Q4x3X3c8K6j5h3&6V1j5X3!0^5K9h3&6Y4i4K6u0r3
Chakra, dives into the enforcement of bounds checks in native JIT code
d1aK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6%4N6%4N6Q4x3X3g2*7k6i4u0G2k6r3q4&6K9h3&6A6N6r3W2S2N6r3W2$3k6g2)9J5k6h3y4G2L8g2)9J5c8X3u0D9L8$3N6Q4x3V1j5J5x3o6p5%4i4K6u0r3x3e0m8Q4x3V1j5#2i4K6u0r3j5$3S2W2j5$3E0Q4x3X3c8A6N6q4)9J5k6r3!0#2N6q4)9J5k6r3g2F1k6X3!0J5j5$3g2E0k6h3&6@1i4K6u0V1L8$3k6Q4x3X3c8T1L8%4g2F1k6s2y4Q4x3X3c8U0K9r3g2U0K9%4y4Q4x3X3c8A6L8W2)9J5k6r3&6S2N6r3W2$3k6g2)9J5k6r3A6A6N6q4)9J5k6r3y4G2k6r3f1`.
Micropatching a Hypervisor With Running Virtual Machines (CVE-2017-4924)
adaK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1j5H3M7r3q4@1j5$3S2Q4x3X3g2T1L8r3!0Y4M7%4m8G2N6q4)9J5k6h3y4G2L8g2)9J5c8U0t1H3x3e0N6Q4x3V1j5I4x3q4)9J5c8X3#2A6j5%4u0G2M7r3q4@1j5$3S2A6L8X3N6Q4x3X3c8Z5P5i4m8W2M7Y4k6A6M7$3!0J5i4K6u0V1N6$3W2@1K9q4)9J5k6s2u0#2L8X3&6A6L8X3N6Q4x3X3g2Z5N6r3#2D9
Hyper-V debugging for beginners. Part 2, or half disclosure of MS13-092
d2fK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6Z5N6X3W2F1N6r3g2J5L8X3q4D9M7#2)9J5k6h3u0D9L8$3N6K6M7r3!0@1i4K6u0W2j5$3!0E0i4K6u0r3x3U0l9I4y4#2)9J5c8U0p5H3i4K6u0r3K9s2W2H3k6i4u0Q4x3X3c8$3i4K6u0V1k6r3g2T1N6h3N6Y4K9h3&6Y4i4K6u0V1k6X3!0J5i4K6u0V1j5X3g2Y4K9h3&6F1k6i4u0K6i4K6u0V1M7r3q4J5N6q4)9J5k6o6u0Q4x3X3g2Z5N6r3#2D9
The Bug Or Feature Debate Is Back Yet Again: DDEAUTO Root Cause Analysis
315K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6%4N6%4N6Q4x3X3g2W2L8X3c8Y4j5h3#2W2i4K6u0W2j5$3!0E0i4K6u0r3j5X3I4G2k6#2)9J5c8Y4c8W2j5$3S2F1K9h3y4S2L8q4)9J5k6r3u0D9L8$3N6Q4x3V1k6T1N6h3N6Q4x3X3c8X3k6h3q4@1N6i4u0W2i4K6u0V1k6r3g2T1j5i4c8W2i4K6u0V1j5X3q4U0K9#2)9J5k6s2W2W2N6q4)9J5k6r3q4Y4j5h3W2F1i4K6u0V1k6r3c8W2j5i4g2@1L8#2)9J5k6s2u0G2L8%4c8Q4x3X3c8U0j5i4g2K6k6g2)9J5k6r3q4F1j5h3I4&6M7$3W2K6
A Bug Has No Name: Multiple Heap Buffer Overflows In the Windows DNS Client
5fcK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6%4N6%4N6Q4x3X3g2T1K9i4y4Z5L8%4m8X3L8%4S2Q4x3X3g2U0L8$3#2Q4x3V1k6T1L8r3!0Y4i4K6u0r3x3U0l9I4y4#2)9J5c8U0p5H3i4K6u0r3j5g2)9J5k6r3u0#2k6#2)9J5k6r3S2S2M7#2)9J5k6r3&6G2i4K6u0V1L8X3q4E0k6g2)9J5k6r3#2#2L8s2c8A6M7r3I4W2i4K6u0V1K9r3g2S2M7q4)9J5k6r3u0#2k6X3k6W2M7W2)9J5k6r3!0$3k6i4u0X3L8r3!0%4M7#2)9J5k6r3W2F1i4K6u0V1N6r3S2W2i4K6u0V1N6$3W2F1k6r3!0%4M7#2)9J5k6r3c8F1M7#2)9J5k6r3y4D9K9h3g2F1N6q4)9J5c8R3`.`.
BlackOasis APT and new targeted attacks leveraging zero-day exploit (CVE-2017-11292)
118K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6K6k6h3y4#2M7X3g2D9K9i4y4@1i4K6u0W2j5$3!0E0i4K6u0r3j5X3I4S2j5$3E0G2j5i4y4A6M7#2)9J5k6r3q4H3N6q4)9J5k6r3q4F1k6q4)9J5k6r3&6W2N6#2)9J5k6s2c8S2M7X3N6W2N6r3g2V1i4K6u0V1j5i4c8@1j5h3y4C8M7#2)9J5k6r3I4W2N6X3g2J5j5h3N6A6L8X3N6Q4x3X3c8*7k6i4u0G2i4K6u0V1k6r3q4&6i4K6u0V1k6i4S2H3L8r3!0A6N6q4)9J5c8U0R3J5y4K6x3J5i4K6u0r3
Overview about a typical bank trojan
d04K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3u0D9j5h3y4C8M7%4c8G2M7X3#2K6k6h3y4#2M7X3W2@1P5g2)9J5k6h3y4G2L8g2)9J5c8X3c8G2j5%4y4Q4x3V1k6r3e0@1q4m8g2q4c8n7i4K6u0W2M7r3c8X3
Malware reverse engineering examples
7b2K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6K6k6h3y4J5j5i4u0&6i4K6u0W2j5$3!0E0i4K6u0r3f1X3g2$3k6i4u0K6K9h3&6Y4e0h3q4D9N6$3q4J5k6b7`.`.
Playing with Dynamic symbolic execution
eeaK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3#2A6j5i4y4E0i4K6u0W2M7X3g2Q4x3V1k6T1L8r3!0Y4i4K6u0r3x3U0l9I4y4#2)9J5c8U0p5H3i4K6u0r3x3o6g2Q4x3V1k6H3L8r3q4&6K9h3&6Y4i4K6g2X3N6$3W2@1K9q4)9#2k6X3c8&6L8X3q4E0K9h3y4Q4y4h3k6K6P5h3#2T1L8$3I4A6j5#2)9#2k6X3g2^5k6h3y4#2N6r3W2G2L8W2)9J5k6h3S2@1L8h3H3`.
"Targeting" File Parsers with S2E and Kaitai Struct
30aK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6S2k6s2u0A6j5h3&6Z5k6i4u0J5k6i4u0S2i4K6u0W2k6$3W2@1K9s2g2T1i4K6u0W2K9h3!0Q4x3V1k6H3L8%4y4@1i4K6u0r3K9$3q4A6N6r3q4A6i4K6u0V1M7K6u0W2i4K6u0r3
Lifting Windows Driver Binaries into LLVM IR
b8aK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6K6M7$3I4S2j5W2)9J5k6h3N6@1K9i4y4U0i4K6u0W2k6$3q4@1k6h3y4Z5i4K6u0W2k6h3c8#2i4K6u0r3x3U0l9I4y4#2)9J5c8Y4N6A6L8W2)9J5k6r3I4A6k6Y4c8Q4x3X3g2Z5N6r3#2D9
Testing Intermediate Representations for Binary Analysis
ac4K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6K6L8$3k6@1M7$3g2U0i4K6u0V1K9$3q4A6M7%4c8Q4x3X3g2Y4K9i4c8Z5N6h3u0Q4x3X3g2A6L8#2)9J5c8V1#2W2j5h3&6p5K9h3k6X3i4K6u0r3
Advanced Topics in Programming Languages
f26K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6W2j5W2)9J5k6s2y4@1j5i4c8A6j5#2)9J5k6r3q4%4M7#2)9J5k6i4y4W2j5i4y4Q4x3X3g2Z5j5i4u0$3j5i4u0V1i4K6u0W2k6h3c8#2i4K6u0r3j5$3!0#2M7Y4y4W2M7#2)9J5c8X3y4K6x3U0f1J5i4K6u0r3x3U0l9I4x3i4y4H3i4K6u0r3
Memory Errors: The Past, the Present, and the Future
3b2K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6%4N6%4N6Q4x3X3g2A6M7$3N6Q4x3X3g2J5K9s2g2D9i4K6u0W2j5h3y4Q4x3X3g2#2K9#2)9J5c8Y4y4#2L8r3I4A6N6X3q4F1i4K6u0r3M7s2g2T1M7#2)9J5c8Y4c8J5i4K6u0r3N6r3g2U0K9r3&6A6j5$3q4D9M7X3g2H3L8%4u0@1i4K6u0V1K9i4u0Q4x3X3c8U0M7#2)9J5k6o6M7K6i4K6u0W2M7r3c8X3
Predicting, Decrypting, and Abusing WPA2/802.11 Group Keys
2f6K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6D9K9i4u0A6j5i4y4Q4x3X3g2C8N6h3I4W2N6i4k6W2L8W2)9J5k6h3u0W2i4K6u0r3j5X3W2@1M7%4c8J5k6h3q4E0i4K6u0r3x3e0t1K6y4o6f1$3y4K6R3&6i4K6u0r3y4e0b7%4y4U0b7H3i4K6u0r3x3g2)9J5c8Y4g2K6k6h3&6A6P5o6t1H3x3e0k6Q4x3X3c8%4K9h3k6A6i4K6u0W2M7r3c8X3
Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2
dd4K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4m8S2M7r3g2J5M7#2)9J5k6h3#2S2N6r3S2&6N6X3q4F1K9r3!0W2k6W2)9J5k6h3y4G2L8g2)9J5c8X3y4U0M7K6t1H3x3e0N6Q4x3X3g2H3k6r3j5`.
A hacker, a hammer and two memory modules
4a4K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6@1K9r3W2K6K9i4y4K6k6h3y4#2M7X3W2@1P5g2)9J5k6i4y4@1L8%4u0E0M7$3S2A6k6h3I4V1i4K6u0W2j5$3!0E0i4K6u0r3x3U0l9I4y4#2)9J5c8U0p5H3i4K6u0r3x3e0W2Q4x3V1k6S2N6s2c8S2j5$3E0A6L8X3N6Q4x3X3c8U0L8#2)9J5k6r3S2G2M7%4c8W2k6q4)9J5k6s2k6E0i4K6u0V1K9r3q4U0K9$3g2J5i4K6u0V1K9r3q4E0L8h3g2J5i4K6u0V1N6s2N6G2i4K6u0V1L8h3g2E0L8%4u0&6i4K6u0V1L8h3!0V1N6h3I4W2M7#2)9J5c8R3`.`.
Exploiting The Wi-Fi Stack on Apple Devices
e91K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6Y4L8$3!0Y4L8r3g2H3M7X3!0B7k6h3y4@1P5X3g2J5L8#2)9J5k6h3u0D9L8$3N6K6M7r3!0@1i4K6u0W2j5$3!0E0i4K6u0r3x3U0l9I4y4#2)9J5c8U0p5H3i4K6u0r3L8%4k6W2M7W2)9J5k6r3q4A6M7W2)9J5k6s2k6G2L8q4)9J5k6o6u0Q4x3X3c8H3N6q4)9J5k6o6y4Q4x3X3c8W2P5s2m8D9L8$3W2@1K9h3&6Y4i4K6u0V1N6$3W2Q4x3X3c8X3K9g2)9J5k6h3S2@1L8h3H3`.
Who Watch BIOS Watchers?
14fK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6E0k6h3c8A6N6h3#2Q4x3X3g2U0L8$3#2Q4x3V1k6Q4y4o6m8E0j5i4c8J5L8%4y4G2N6W2)9J5c8X3u0&6M7r3q4K6M7#2)9J5k6r3W2F1N6r3g2D9i4K6u0V1j5X3!0G2N6q4)9J5k6r3N6#2j5i4u0V1i4K6u0V1j5$3x3H3y4h3g2V1k6X3y4S2x3$3p5&6
Reverse engineering of the Nitro OBD2
770K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6T1L8r3!0Y4i4K6u0W2M7i4g2S2M7X3E0K6L8r3q4T1i4K6u0W2j5$3!0E0i4K6u0r3M7X3g2$3k6i4u0K6k6g2)9J5k6r3g2F1k6$3W2F1k6h3g2J5K9h3&6Y4i4K6u0V1L8$3k6Q4x3X3c8@1K9r3g2Q4x3X3c8F1K9i4c8J5L8#2)9J5k6r3!0T1k6o6u0Q4x3X3g2Z5N6r3#2D9
The First PS4 Kernel Exploit: Adieu
208K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6X3j5h3W2D9x3s2k6W2M7X3k6D9L8%4N6Q4x3X3g2U0L8$3#2Q4x3V1k6T1L8r3!0Y4i4K6u0r3x3U0l9I4y4#2)9J5c8Y4m8K6y4q4)9J5k6r3&6S2L8h3g2V1L8$3u0B7i4K6u0V1k6i4S2H3L8r3!0A6N6q4)9J5c8R3`.`.
[培训]科锐逆向工程师培训第53期2025年7月8日开班!
收藏
・
9
免费
・
0
支持
分享
分享到微信
分享到QQ
分享到微博
赞赏记录
参与人
雪币
留言
时间
查看更多
赞赏
×
1 雪花
5 雪花
10 雪花
20 雪花
50 雪花
80 雪花
100 雪花
150 雪花
200 雪花
支付方式:
微信支付
赞赏留言:
快捷留言
感谢分享~
精品文章~
原创内容~
精彩转帖~
助人为乐~
感谢分享~
最新回复
(
5
)
YShadow
雪 币:
207
活跃值:
(10)
能力值:
( LV2,RANK:10 )
在线值:
发帖
1
回帖
33
粉丝
0
关注
私信
YShadow
2
楼
英语不好表示看不懂……
2017-11-5 19:23
0
BDomne
雪 币:
4230
活跃值:
(1435)
能力值:
(RANK:270 )
在线值:
发帖
53
回帖
157
粉丝
91
关注
私信
BDomne
5
3
楼
YShadow
英语不好表示看不懂……
每个人都有自己的不足,多下功夫就好。
2017-11-5 19:56
0
orz1ruo
雪 币:
16711
活跃值:
(2783)
能力值:
( LV9,RANK:147 )
在线值:
发帖
1
回帖
613
粉丝
10
关注
私信
orz1ruo
4
楼
大佬真厉害
2017-11-6 08:24
0
gegon
雪 币:
375
活跃值:
(291)
能力值:
( LV2,RANK:10 )
在线值:
发帖
9
回帖
210
粉丝
0
关注
私信
gegon
5
楼
支持一下,收藏慢慢看
2017-11-6 09:03
0
yangya
雪 币:
58
活跃值:
(1355)
能力值:
( LV2,RANK:10 )
在线值:
发帖
5
回帖
319
粉丝
1
关注
私信
yangya
6
楼
YShadow
英语不好表示看不懂……
多看就懂了。
2017-11-10 21:07
0
游客
登录
|
注册
方可回帖
回帖
表情
雪币赚取及消费
高级回复
返回
BDomne
5
53
发帖
157
回帖
270
RANK
关注
私信
他的文章
[推荐]CTF『Pwn』版块精选帖分类索引
58325
[原创]20周年征文 | 那些年,我们一起看雪
6286
[原创]小窥安全研究方向在今后的一些发展趋势
7299
关于我们
联系我们
企业服务
看雪公众号
专注于PC、移动、智能设备安全研究及逆向工程的开发者社区
看原图
赞赏
×
雪币:
+
留言:
快捷留言
为你点赞!
返回
顶部