首页
课程
问答
CTF
社区
招聘
峰会
发现
排行榜
知识库
工具下载
看雪20年
看雪商城
证书查询
登录
注册
首页
社区
课程
招聘
发现
问答
CTF
排行榜
知识库
工具下载
峰会
看雪商城
证书查询
社区
外文翻译
发新帖
5
0
[分享]国外最新安全推文整理(第19期)
发表于: 2018-2-4 13:50
4809
[分享]国外最新安全推文整理(第19期)
BDomne
5
2018-2-4 13:50
4809
Hardcore corruption of execve() vulnerability in WSL
9edK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6Y4K9i4c8Z5N6h3u0Q4x3X3g2U0L8$3#2Q4x3V1k6K6j5h3q4J5j5h3#2S2M7W2)9J5c8X3g2^5k6h3y4$3k6g2)9#2k6X3g2^5M7r3I4G2K9i4b7`.
Transmits AM radio on computers without radio transmitting hardware
933K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6Y4K9i4c8Z5N6h3u0Q4x3X3g2U0L8$3#2Q4x3V1k6X3N6h3I4D9k6r3g2U0k6h3&6@1i4K6u0r3M7%4W2K6N6r3g2E0i4K6u0V1j5Y4g2K6i4K6u0V1M7X3q4V1K9h3)9`.
Scenarios, tutorials and demos for Autonomous Driving
addK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6Y4K9i4c8Z5N6h3u0Q4x3X3g2U0L8$3#2Q4x3V1k6y4K9h3y4J5L8%4y4G2k6Y4c8Q4x3V1k6m8N6i4c8G2L8X3!0E0L8%4g2K6c8s2u0A6N6X3W2F1k6@1y4G2L8$3E0T1L8$3!0C8
POC 2017 Slides
c91K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4m8G2N6$3g2J5L8$3k6U0L8$3#2E0N6h3&6A6N6s2W2Q4x3X3g2F1k6i4c8Q4x3V1j5J5x3o6p5%4i4K6u0W2K9s2c8E0
BlueHatIL 2018 Slides
600K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3u0D9N6h3g2Z5j5i4c8A6L8q4)9J5k6h3y4G2L8g2)9J5c8X3q4T1M7%4c8J5j5h3y4@1M7#2)9J5k6h3S2@1L8h3H3`.
Weird Machines and provable non-exploitability, Slides
174K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6V1L8$3y4K6i4K6u0W2k6$3!0G2k6$3I4W2i4K6u0W2j5$3!0E0i4K6u0r3M7s2u0W2M7$3g2F1N6r3q4@1K9h3!0F1i4K6u0r3k6q4)9J5c8U0q4D9k6W2q4s2c8g2R3J5j5f1N6q4b7e0q4t1y4$3k6D9M7#2S2%4y4q4j5K6x3q4A6C8j5X3&6J5k6X3W2C8h3h3D9&6d9i4u0U0N6s2g2%4h3V1)9^5
Pwn2Own returns for 2018
12eK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6%4N6%4N6Q4x3X3g2*7k6i4u0G2k6r3q4&6K9h3&6A6N6r3W2S2N6r3W2$3k6g2)9J5k6h3y4G2L8g2)9J5c8X3u0D9L8$3N6Q4x3V1j5J5x3o6p5^5i4K6u0r3x3g2)9J5c8U0t1#2i4K6u0r3M7s2N6F1x3X3!0%4L8W2)9J5k6s2u0W2N6s2g2J5L8Y4y4Q4x3X3c8X3L8%4u0Q4x3X3b7J5x3o6p5^5i4K6u0V1M7r3q4J5N6r3&6W2M7Y4y4Q4x3X3c8%4K9i4c8Z5i4K6u0V1L8h3W2U0M7X3!0K6L8$3k6@1i4K6u0V1j5h3&6V1i4K6u0V1M7%4m8G2L8Y4y4G2M7X3g2V1i4K6u0V1j5Y4W2Q4x3X3c8$3L8i4N6S2M7X3f1`.
Reverse Engineering the Win32k Type Isolation Mitigation
9f7K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6T1L8r3!0Y4i4K6u0W2M7i4g2S2M7X3E0K6L8r3q4T1i4K6u0W2j5$3!0E0i4K6u0r3M7X3g2$3k6i4u0K6k6g2)9J5k6r3g2F1k6$3W2F1k6h3g2J5K9h3&6Y4i4K6u0V1N6r3S2W2i4K6u0V1N6$3W2F1x3K6u0C8i4K6u0V1N6s2W2H3k6g2)9J5k6r3W2K6L8$3I4S2N6r3W2G2L8W2)9J5k6r3#2A6N6r3W2Y4j5i4c8A6L8$3&6Q4x3X3g2Z5N6r3#2D9
Automating VMware RPC request sniffing
148K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6%4N6%4N6Q4x3X3g2*7k6i4u0G2k6r3q4&6K9h3&6A6N6r3W2S2N6r3W2$3k6g2)9J5k6h3y4G2L8g2)9J5c8X3u0D9L8$3N6Q4x3V1j5J5x3o6p5^5i4K6u0r3x3g2)9J5c8U0p5&6i4K6u0r3j5i4g2@1L8$3#2S2N6r3W2F1k6#2)9J5k6s2k6E0N6$3q4J5k6g2)9J5k6s2u0H3j5#2)9J5k6s2u0W2M7i4g2W2M7%4c8Q4x3X3c8K6L8X3W2X3k6X3W2F1k6H3`.`.
Virtualization Internals Part 1 - Intro to Virtualization
b94K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6K6j5h3k6W2M7Y4N6S2L8r3I4Q4x3X3g2U0L8$3#2Q4x3V1k6T1L8r3!0Y4i4K6u0r3N6X3W2J5N6s2g2S2L8r3W2*7j5i4c8A6L8$3&6Q4x3X3c8A6L8Y4c8W2M7X3&6S2L8s2y4Q4x3X3c8H3j5i4u0@1i4K6u0V1x3g2)9J5k6r3W2F1N6s2u0G2i4K6u0V1N6r3!0Q4x3X3c8$3K9i4u0@1N6h3q4D9K9i4A6S2N6r3W2G2L8R3`.`.
CPUs: information leak using speculative execution
9b0K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6T1N6h3N6K6i4K6u0W2j5$3S2J5L8$3#2A6N6h3#2Q4x3X3g2G2M7X3N6Q4x3V1k6H3i4K6u0r3M7s2u0G2K9X3g2U0N6q4)9J5k6s2A6W2M7X3!0Q4x3V1k6A6M7%4y4#2k6i4y4Q4x3V1k6V1k6i4c8S2K9h3I4Q4x3@1k6A6k6q4)9K6c8o6p5J5y4K6t1`.
Many Formulas, One Calc – Exploiting a New Office Equation Vulnerability
43dK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6J5k6i4y4W2j5i4u0U0K9q4)9J5k6h3y4Z5k6h3y4C8M7r3!0A6L8Y4c8Q4x3X3g2U0L8$3#2Q4x3V1k6S2L8X3!0@1K9r3g2J5i4K6u0V1L8$3k6X3K9h3y4W2i4K6u0V1k6i4q4#2j5i4c8A6L8$3&6Q4x3X3c8J5j5$3g2Q4x3X3c8$3N6h3I4F1k6i4u0S2j5X3W2D9K9i4c8&6i4K6u0r3
Pitou/Backboot Bootkit analysis
b70K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6i4c8Y4M7$3!0X3N6q4)9J5k6h3W2@1i4K6u0r3k6h3&6Y4L8r3W2K6K9q4)9J5c8X3&6W2N6%4y4Q4y4h3k6S2M7X3y4Z5K9i4k6A6L8#2)9#2k6X3g2F1k6#2)9J5k6h3q4K6M7q4)9K6c8X3W2V1i4K6y4p5z5o6R3@1
Guide to deobfuscating and devirtualizing FinFisher spyware
90fK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6%4N6%4N6Q4x3X3g2%4k6h3I4A6N6X3g2K6k6h3y4#2M7X3W2@1P5g2)9J5k6h3y4G2L8g2)9J5c8Y4N6H3i4K6u0V1j5$3!0F1N6r3g2F1N6q4)9J5c8Y4g2H3L8r3!0S2k6s2y4Q4x3V1j5J5x3o6p5^5i4K6u0r3x3o6q4Q4x3V1k6i4f1q4)9J5k6p5k6A6L8V1k6A6M7$3S2W2M7W2)9J5k6i4m8V1k6R3`.`.
A coin miner with a "Heaven's Gate"
952K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6T1L8r3!0Y4i4K6u0W2L8h3q4D9N6$3q4J5k6h3u0&6N6r3g2K6i4K6u0W2j5$3!0E0i4K6u0r3N6r3S2J5k6h3q4@1i4K6u0V1j5h3&6S2L8s2W2K6K9i4y4Q4x3V1j5J5x3o6p5^5i4K6u0r3x3o6q4Q4x3V1k6S2i4K6u0V1j5$3!0A6L8W2)9J5k6r3#2A6L8X3g2J5i4K6u0V1N6$3W2@1K9q4)9J5k6r3q4Q4x3X3c8Z5k6h3q4$3k6h3&6K6i4K6u0V1k6$3q4@1k6g2)9J5c8R3`.`.
Hacking Cryptocurrency Miners with OSINT Techniques
b71K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6E0k6h3c8A6N6h3#2Q4x3X3g2U0L8$3#2Q4x3V1k6Q4y4o6m8K6x3%4W2X3N6h3I4D9j5h3S2Q4x3V1k6Z5j5h3y4C8K9h3&6Y4i4K6u0V1j5%4u0&6M7s2c8G2j5%4g2J5M7X3g2F1j5%4W2Q4x3X3c8E0K9h3&6W2M7Y4y4Q4x3X3c8%4K9i4c8Z5i4K6u0V1L8%4y4A6L8Y4c8Q4x3X3c8@1k6h3y4Z5L8X3W2I4N6h3g2K6i4K6u0V1y4U0M7%4j5X3u0T1x3$3f1H3x3e0f1%4
Getting started with Firmware Emulation
b7aK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6T1L8r3!0Y4i4K6u0W2j5i4c8@1K9h3k6&6i4K6u0W2j5$3!0E0i4K6u0r3k6$3g2@1N6r3W2F1k6#2)9J5k6s2y4@1j5i4u0@1k6h3c8Q4x3X3c8%4K9i4c8Z5i4K6u0V1k6X3W2J5L8i4N6S2M7X3g2Q4x3X3c8W2L8i4g2D9j5i4c8A6L8$3&6Q4x3V1j5`.
Heavy lifting with McSema 2.0
9f1K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6T1L8r3!0Y4i4K6u0W2N6s2u0S2K9h3I4G2k6X3u0A6N6s2y4Q4x3X3g2U0L8$3#2Q4x3V1j5J5x3o6p5^5i4K6u0r3x3o6q4Q4x3V1j5J5x3#2)9J5c8X3S2W2j5i4k6&6i4K6u0V1L8r3W2X3N6r3W2F1k6#2)9J5k6s2N6A6N6r3S2Q4x3X3c8E0j5%4y4W2L8h3q4Q4x3X3b7J5i4K6u0V1x3q4)9J5c8R3`.`.
Qubes Air: Generalizing the Qubes Architecture
2c7K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6%4N6%4N6Q4x3X3g2I4N6h3u0W2M7#2)9J5k6r3!0K6i4K6u0W2L8%4u0Y4i4K6u0r3L8X3g2%4M7#2)9J5c8U0t1H3x3e0S2Q4x3V1j5H3x3g2)9J5c8U0t1J5i4K6u0r3M7i4g2T1k6i4y4Q4x3X3c8S2K9i4u0Q4x3V1j5`.
Data Science at the Command Line
cc4K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6%4N6%4N6Q4x3X3g2V1j5i4c8S2M7$3y4A6k6h3&6U0k6h3q4@1N6r3S2W2j5$3!0E0L8h3q4F1k6r3I4A6L8X3g2Q4x3X3g2U0L8$3#2Q4x3V1j5`.
Writing a minimal x86-64 JIT compiler
474K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6K6L8$3I4S2M7X3W2S2L8Y4m8J5L8$3N6J5j5h3#2E0k6i4u0Q4x3X3g2U0L8$3#2Q4x3V1j5J5x3o6p5^5i4K6u0r3x3o6q4Q4x3V1j5I4x3q4)9J5c8Y4N6J5K9i4c8A6L8X3N6Q4x3X3c8E0K9h3&6A6L8h3q4D9i4K6u0V1P5o6R3$3i4K6u0V1y4U0c8Q4x3X3c8B7K9i4c8Q4x3X3c8U0L8$3#2H3K9h3I4W2M7W2)9J5k6r3y4H3M7q4)9J5c8R3`.`.
Debugger Data Model, Javascript & X64 Exception Handling
217K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3c8G2j5i4u0Q4x3X3c8W2i4K6u0W2k6$3W2@1K9s2g2T1i4K6u0W2K9h3!0Q4x3V1k6T1L8r3!0Y4i4K6u0r3x3U0l9I4y4#2)9J5c8U0p5J5i4K6u0r3x3o6q4Q4x3V1k6V1k6h3u0#2k6$3N6W2M7W2)9J5k6r3c8S2N6r3q4Q4x3X3c8E0L8$3c8W2L8q4)9J5c8R3`.`.
Fuzzing TCP servers
63dK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3u0D9L8$3N6Q4x3X3g2K6N6$3W2W2j5$3E0A6i4K6u0W2L8X3g2@1i4K6u0r3x3U0l9I4z5q4)9J5c8U0l9I4i4K6u0r3k6Y4g2*7P5X3W2F1k6#2)9J5k6s2c8U0M7q4)9J5k6s2y4W2M7Y4k6W2M7Y4y4Q4x3X3g2Z5N6r3#2D9
Reverse engineering and exploiting Samsung's TrustZone
3fbK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6E0k6h3c8A6N6h3#2Q4x3X3g2U0L8$3#2Q4x3V1k6@1j5i4y4*7K9%4y4W2j5#2)9J5c8Y4g2F1j5X3!0^5i4K6u0V1P5h3!0#2M7W2)9J5k6s2m8Z5L8$3&6W2i4K6u0V1M7r3q4J5N6q4)9J5k6r3W2Q4x3X3b7K6x3K6q4T1j5X3j5@1y4r3x3K6x3r3x3`.
Exploiting Qualcomm EDL Programmers
dfcK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6S2L8r3g2H3K9s2y4W2j5%4g2J5K9i4c8&6i4K6u0W2j5$3!0E0i4K6u0r3x3U0l9I4z5q4)9J5c8U0l9I4i4K6u0r3x3U0u0Q4x3V1k6I4N6h3q4D9j5$3!0E0L8g2)9J5k6r3g2V1L8q4)9J5k6o6q4Q4x3V1j5`.
[培训]科锐逆向工程师培训第53期2025年7月8日开班!
收藏
・
5
免费
・
0
支持
分享
分享到微信
分享到QQ
分享到微博
赞赏记录
参与人
雪币
留言
时间
查看更多
赞赏
×
1 雪花
5 雪花
10 雪花
20 雪花
50 雪花
80 雪花
100 雪花
150 雪花
200 雪花
支付方式:
微信支付
赞赏留言:
快捷留言
感谢分享~
精品文章~
原创内容~
精彩转帖~
助人为乐~
感谢分享~
最新回复
(
2
)
挽梦雪舞
雪 币:
26136
活跃值:
(1409)
能力值:
( LV4,RANK:50 )
在线值:
发帖
22
回帖
432
粉丝
22
关注
私信
挽梦雪舞
2
楼
倒着来吧,先把最后一篇接着翻译晚试试手!
最后于
2018-3-2 01:21 被挽梦雪舞编辑 ,原因:
2018-3-1 23:58
0
挽梦雪舞
雪 币:
26136
活跃值:
(1409)
能力值:
( LV4,RANK:50 )
在线值:
发帖
22
回帖
432
粉丝
22
关注
私信
挽梦雪舞
3
楼
倒数第二篇打不开啊,还得挂VPN。。。还好我有。。
2018-3-3 00:10
0
游客
登录
|
注册
方可回帖
回帖
表情
雪币赚取及消费
高级回复
返回
BDomne
5
53
发帖
157
回帖
270
RANK
关注
私信
他的文章
[推荐]CTF『Pwn』版块精选帖分类索引
58321
[原创]20周年征文 | 那些年,我们一起看雪
6286
[原创]小窥安全研究方向在今后的一些发展趋势
7298
关于我们
联系我们
企业服务
看雪公众号
专注于PC、移动、智能设备安全研究及逆向工程的开发者社区
看原图
赞赏
×
雪币:
+
留言:
快捷留言
为你点赞!
返回
顶部