首页
社区
课程
招聘
[推荐]对于组织 “虚拟化漏洞专题” 的翻译计划
发表于: 2017-11-14 10:48 6371

[推荐]对于组织 “虚拟化漏洞专题” 的翻译计划

2017-11-14 10:48
6371

本次初衷

 

随着云计算时代的到来,虚拟化漏洞也越发引起人们的关注。但鉴于目前国内这方面的公开学习资料还比较少,因此打算利用论坛的人才资源来上一波翻译。

 

译者要求

 

有一定的英文基础和计算机基础,能把翻译的文章给表达清楚,翻译于己于人都是有益的。

 

最终目标

 

类似下面的 Exploit 编写系列专题,到时也请位大佬来写篇序:P
https://bbs.pediy.com/thread-123602.htm

 

翻译文章

 

0) Hypervisors and Virtual Machines -(BDomne)
ca3K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6%4N6%4N6Q4x3X3g2#2M7$3g2F1K9i4S2Q4x3X3g2G2M7X3N6Q4x3V1k6K6P5i4y4@1k6h3#2Q4x3V1k6X3K9h3I4W2M7#2)9J5c8X3I4G2k6$3W2F1i4K6u0r3j5i4u0@1K9h3y4D9k6i4y4Q4x3V1j5I4x3o6f1@1z5e0S2Q4x3X3c8d9k6i4k6W2L8r3I4W2i4K6u0W2M7r3c8X3
译文:https://bbs.pediy.com/thread-225218.htm

 

1) Micropatching a Hypervisor With Running Virtual Machines -(dabang)
f23K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1j5H3M7r3q4@1j5$3S2Q4x3X3g2T1L8r3!0Y4M7%4m8G2N6q4)9J5k6h3y4G2L8g2)9J5c8U0t1H3x3e0N6Q4x3V1j5I4x3q4)9J5c8X3#2A6j5%4u0G2M7r3q4@1j5$3S2A6L8X3N6Q4x3X3c8Z5P5i4m8W2M7Y4k6A6M7$3!0J5i4K6u0V1N6$3W2@1K9q4)9J5k6s2u0#2L8X3&6A6L8X3N6Q4x3X3g2Z5N6r3#2D9
译文:https://bbs.pediy.com/thread-222945.htm

 

2) Wandering through the Shady Corners of VMware Workstation/Fusion -(jackandkx)
df0K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6U0L8$3#2K6k6h3y4#2M7X3W2K6i4K6u0W2j5$3!0E0i4K6u0r3j5X3I4G2k6#2)9J5c8Y4m8G2M7%4c8K6i4K6u0r3N6X3#2%4j5i4u0W2i4K6g2X3N6X3N6H3N6g2)9#2k6Y4y4Z5j5h3c8W2M7W2)9#2k6Y4k6#2L8r3&6W2M7X3q4T1K9h3I4A6N6r3W2W2M7#2)9J5c8R3`.`.
译文:https://bbs.pediy.com/thread-222814.htm

 

3) Analyzing a Patch of a Virtual Machine Escape on VMware -(饭Sir)
66cK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6K6k6h3y4#2M7X3W2F1k6%4c8G2L8h3!0J5M7X3!0%4i4K6u0W2L8h3y4S2k6X3g2W2i4K6u0W2j5$3!0E0i4K6u0r3L8h3y4S2k6X3g2W2i4K6u0V1L8r3q4T1M7#2)9J5c8X3q4F1j5h3I4&6P5X3W2F1k6#2)9J5k6s2m8S2N6r3y4Z5i4K6u0V1L8$3k6Q4x3X3c8S2i4K6u0V1N6X3W2J5N6s2g2S2L8q4)9J5k6r3#2S2j5$3S2A6L8X3g2Q4x3X3c8W2M7$3y4S2M7r3g2Q4x3X3c8G2L8W2)9J5k6s2k6E0N6$3q4J5k6g2)9J5c8R3`.`.

 

4) Use After Silence: Exploiting a quietly patched UAF in VMware -(蓝色淡风)
ee2K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6%4N6%4N6Q4x3X3g2*7k6i4u0G2k6r3q4&6K9h3&6A6N6r3W2S2N6r3W2$3k6g2)9J5k6h3y4G2L8g2)9J5c8X3u0D9L8$3N6Q4x3V1j5J5x3o6p5%4i4K6u0r3y4W2)9J5c8U0t1$3i4K6u0r3N6i4y4W2i4K6u0V1j5h3k6@1k6i4u0Q4x3X3c8K6K9h3I4W2L8X3y4W2i4K6u0V1k6i4S2H3L8r3!0A6N6r3W2F1k6#2)9J5k6r3q4Q4x3X3c8I4N6h3W2W2N6r3I4&6i4K6u0V1M7r3q4@1j5$3S2W2k6q4)9J5k6s2g2S2k6W2)9J5k6r3W2F1i4K6u0V1N6X3#2%4j5i4u0W2

 

5) Pythonizing the VMware Backdoor -(污师)
74bK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6%4N6%4N6Q4x3X3g2*7k6i4u0G2k6r3q4&6K9h3&6A6N6r3W2S2N6r3W2$3k6g2)9J5k6h3y4G2L8g2)9J5c8X3u0D9L8$3N6Q4x3V1j5J5x3o6p5%4i4K6u0r3z5q4)9J5c8U0q4Q4x3V1k6H3P5i4c8Z5L8$3&6A6P5X3W2F1k6#2)9J5k6s2c8Z5k6g2)9J5k6s2k6E0N6$3q4J5k6g2)9J5k6r3u0S2j5$3E0V1L8$3!0J5
译文:https://bbs.pediy.com/thread-222817.htm

 

6) Bypassing VirtualBox Process Hardening on Windows -(二当家a)
3d1K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6Y4L8$3!0Y4L8r3g2H3M7X3!0B7k6h3y4@1P5X3g2J5L8#2)9J5k6h3u0D9L8$3N6K6M7r3!0@1i4K6u0W2j5$3!0Q4x3X3g2#2K9#2)9J5c8U0t1H3x3e0N6Q4x3V1j5H3z5q4)9J5c8X3u0&6M7r3q4K6M7$3W2F1k6#2)9J5k6s2k6A6M7Y4c8#2j5h3I4T1L8%4S2Q4x3X3c8H3M7X3!0U0k6i4y4K6i4K6u0V1K9r3q4J5k6r3g2F1K9h3&6Y4i4K6u0W2K9s2c8E0L8l9`.`.

 

7) Hyper-V debugging for beginners. Part 1 -(一只小虾米)
dbeK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6Z5N6X3W2F1N6r3g2J5L8X3q4D9M7#2)9J5k6h3u0D9L8$3N6K6M7r3!0@1i4K6u0W2K9Y4m8Q4x3V1j5J5x3o6p5#2i4K6u0r3x3e0m8Q4x3V1k6Z5P5i4m8W2M7W2)9J5k6s2k6Q4x3X3c8V1k6h3u0#2k6$3N6A6L8X3N6Q4x3X3c8X3L8%4u0Q4x3X3c8T1k6h3N6A6L8X3&6W2M7Y4y4Q4x3X3g2Z5N6r3#2D9

 

8) Hyper-V debugging for beginners. Part 2 -(一只小虾米)
8a8K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6Z5N6X3W2F1N6r3g2J5L8X3q4D9M7#2)9J5k6h3u0D9L8$3N6K6M7r3!0@1i4K6u0W2K9Y4m8Q4x3V1j5J5x3o6p5%4i4K6u0r3x3e0m8Q4x3V1k6Z5P5i4m8W2M7W2)9J5k6s2k6Q4x3X3c8V1k6h3u0#2k6$3N6A6L8X3N6Q4x3X3c8X3L8%4u0Q4x3X3c8T1k6h3N6A6L8X3&6W2M7Y4y4Q4x3X3c8H3j5i4u0@1i4K6u0V1x3W2)9J5k6h3S2@1L8h3H3`.

 

9) Hyper-V internals -(一只小虾米)
e57K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6Z5N6X3W2F1N6r3g2J5L8X3q4D9M7#2)9J5k6h3u0D9L8$3N6K6M7r3!0@1i4K6u0W2K9Y4m8Q4x3V1j5J5x3o6p5#2i4K6u0r3x3e0m8Q4x3V1k6Z5P5i4m8W2M7W2)9J5k6s2k6Q4x3X3c8A6L8Y4c8W2M7X3&6S2L8s2y4Q4x3X3g2Z5N6r3#2D9

 

10) Hyper-V sockets internals -(一只小虾米)
3f2K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6Z5N6X3W2F1N6r3g2J5L8X3q4D9M7#2)9J5k6h3u0D9L8$3N6K6M7r3!0@1i4K6u0W2K9Y4m8Q4x3V1j5J5x3o6p5%4i4K6u0r3x3o6W2Q4x3V1k6Z5P5i4m8W2M7Y4k6Q4x3X3c8K6L8$3y4C8k6i4c8Q4x3X3c8A6L8Y4c8W2M7X3&6S2L8s2y4Q4x3X3g2Z5N6r3#2D9

 

文章格式(示例)

 

(标题)虚拟化漏洞专题 #:(#代表文章编号)

 

【原文链接】:
【作者】:原文作者/译者 ID
【时间】:

 

(译文)

 

【版权声明】:本文由看雪论坛 (译者 ID) 编译

 

参与方式

 

如果有朋友要认领其中的文章,直接跟贴即可,每个人可以根据自己的实际情况挑选 1 到 2 篇,希望各位在翻译过程中能有所得。另外,如果有这方面的好文章推荐翻译,也欢迎跟帖补充。


[培训]科锐逆向工程师培训第53期2025年7月8日开班!

最后于 2018-3-17 10:06 被BDomne编辑 ,原因:
收藏
免费 0
支持
分享
最新回复 (13)
雪    币: 1491
活跃值: (985)
能力值: (RANK:860 )
在线值:
发帖
回帖
粉丝
2
哇!
这个系列技术够强!
2017-11-14 11:00
0
雪    币: 105
活跃值: (2258)
能力值: ( LV5,RANK:60 )
在线值:
发帖
回帖
粉丝
3
很强势的样子
2017-11-14 11:08
0
雪    币: 436
活跃值: (111)
能力值: ( LV7,RANK:110 )
在线值:
发帖
回帖
粉丝
4
英语差,  找了篇少的..
5)  Pythonizing  the  VMware  Backdoor
2017-11-14 11:32
0
雪    币: 5008
活跃值: (1147)
能力值: ( LV2,RANK:10 )
在线值:
发帖
回帖
粉丝
5
1)  Micropatching  a  Hypervisor  With  Running  Virtual  Machines    我试试吧,这周完成
2017-11-14 11:54
0
雪    币: 4230
活跃值: (1435)
能力值: (RANK:270 )
在线值:
发帖
回帖
粉丝
6
dabang 1) Micropatching a Hypervisor With Running Virtual Machines 我试试吧,这周完成
多谢支持,时间的话按自身安排就好
2017-11-14 12:44
0
雪    币: 2379
活跃值: (171)
能力值: ( LV8,RANK:130 )
在线值:
发帖
回帖
粉丝
7
期待!感觉有一波高能来袭
2017-11-14 12:50
0
雪    币: 1746
活跃值: (277)
能力值: ( LV9,RANK:210 )
在线值:
发帖
回帖
粉丝
8
可以很强势,支持一下。
2017-11-14 13:27
0
雪    币: 6637
活跃值: (2416)
能力值: ( LV7,RANK:150 )
在线值:
发帖
回帖
粉丝
9
0)  Hypervisors  and  Virtual  Machines  -(BDomne)。  想弄这篇。
才发现有了, 那我就这篇吧。
6) Bypassing VirtualBox Process Hardening on Windows

2017-11-14 13:55
0
雪    币: 346
活跃值: (25)
能力值: ( LV3,RANK:30 )
在线值:
发帖
回帖
粉丝
10
哇!!!
2017-11-14 14:26
0
雪    币: 204
活跃值: (911)
能力值: (RANK:1324 )
在线值:
发帖
回帖
粉丝
11
2) Wandering through the Shady Corners of VMware Workstation/Fusion
2017-11-14 22:29
0
雪    币: 1
活跃值: (15)
能力值: ( LV2,RANK:10 )
在线值:
发帖
回帖
粉丝
12
3)  Analyzing  a  Patch  of  a  Virtual  Machine  Escape  on  VMware
fb5K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6K6k6h3y4#2M7X3W2F1k6%4c8G2L8h3!0J5M7X3!0%4i4K6u0W2L8h3y4S2k6X3g2W2i4K6u0W2j5$3!0E0i4K6u0r3L8h3y4S2k6X3g2W2i4K6u0V1L8r3q4T1M7#2)9J5c8X3q4F1j5h3I4&6P5X3W2F1k6#2)9J5k6s2m8S2N6r3y4Z5i4K6u0V1L8$3k6Q4x3X3c8S2i4K6u0V1N6X3W2J5N6s2g2S2L8q4)9J5k6r3#2S2j5$3S2A6L8X3g2Q4x3X3c8W2M7$3y4S2M7r3g2Q4x3X3c8G2L8W2)9J5k6s2k6E0N6$3q4J5k6g2)9J5c8R3`.`.
2017-11-16 14:10
0
雪    币: 203
活跃值: (15)
能力值: ( LV2,RANK:10 )
在线值:
发帖
回帖
粉丝
13
7)  Hyper-V  debugging  for  beginners.  Part  1
8)  Hyper-V  debugging  for  beginners.  Part  2
9)  Hyper-V  internals
10)  Hyper-V  sockets  internals
最近正想学这块,我来翻一翻把,但是以学习为目的会边做边翻,所以时间可能会慢一些。
2018-3-2 11:29
0
雪    币: 416
活跃值: (167)
能力值: ( LV7,RANK:100 )
在线值:
发帖
回帖
粉丝
14
貌似4没人认领,尝试一波,自己也顺便学习一下
最后于 2018-3-2 14:13 被蓝色淡风编辑 ,原因:
2018-3-2 14:01
0
游客
登录 | 注册 方可回帖
返回