阿里云安全专家,主要负责阿里云云产品安全。
So working at GitHub it is no surprise I believe in and use a lot of open source software.
http://e-books-pdf.com/computer/page/43/
http://contagiodump.blogspot.tw/2015/01/video-archives-of-security-conferences.
1. argus http://qosient.com/argus/ 2.networkmine 3.
http://linkurio.us/cyber-security-how-cisco-use-graph-analytics-to-identify-threats/ http://blogs.
http://www.wired.com/2014/10/facebook-builder-osquery/ Facebook chief security officer Joe Su...
http://www.nosuchcon.org/streaming/video/ https://www.
Fraud and Fraud Detection, + Website: A Data Analytics Approach (Wiley Corporate F&A) http://www.
http://pentestmonkey.net/tools/user-enumeration/ident-user-enum ...
https://www.google.com/about/appsecurity/tools/
http://thehackerblog.com/every-c99-php-shell-is-backdoored-aka-free-shells/ Earlier I m...
http://product.china-pub.com/3770791#ml
wmic useraccount get name,sid http://pcsupport.
We do regularly see software enumeration using Internet Explorer in web infections.
http://store.elsevier.com/Information-Security-Analytics/Mark-Talabis/isbn-9780128002070/ ...
mysql>SELECT GeometryCollection((select*from(select*from(select group_concat(user,file_priv) from mysql.
http://blog.csdn.net/qiao000_000/article/details/6061808
http://it-ebooks.info/
http://blogs.msdn.com/b/carloc/archive/2008/08/07/charting-with-logparser.
http://zone.wooyun.org/content/16631 http://www.
In the past, especially learnt from SANS FOR610, I use many tools in performing behavioural analysis of malware.
http://channel9.msdn.com/Events/TechEd/NorthAmerica/2014/DCIM-B368#fbid= ...
一.注册表查看导出工具 1. accessdata registry viewer 2. regripper command and gui 3.
http://www.procdot.com/index.htm
exploit:http://www.exploit-db.com/exploits/35180/ A few months ago I noticed that Citrix p...
During an external pentest – what a surprise – I found a WebLogic server with no interesting contents.
http://blog.silentsignal.eu/2014/07/28/how-to-got-root-access-on-fireeye-os/ 1.
在实际渗透场景中,有很多网络设备我们拿到了root权限后ssh登陆发现有命令执行限制,这是因为ssh接口提供了一个特殊的受限制的命令外壳程序,类似busybox的感觉,他可以允许root用...
http://lcx.cc/?i=3065 New Document ...
https://blog.twitter.com/2014/breakout-detection-in-the-wild ...
Package: smarty3 Version: All below 3.1.21 Severity: important Smarty secure mode should allow...
binwalk https://github.com/cnbird1999/binwalk firmware-mod-kit https://code.
http://blogs.msdn.com/b/mssmallbiz/archive/2014/07/07/largest-collection-of-free-microsoft-eboo...
http://arstechnica.com/security/2013/01/hack-turns-the-cisco-phone-on-your-desk-into-a-remote-b...
http://blogs.gartner.com/anton-chuvakin/2014/05/15/my-threat-intelligence-and-threat-assessmen...
http://blogs.gartner.com/anton-chuvakin/2014/06/12/speaking-at-gartner-catalyst-conference-2014/ http://www.
https://stix.mitre.org/ http://www.sans.org/reading-room/whitepapers/warfare/tools-standards-cy...
http://bobao.360.cn/news/detail/730.html
PLEASE NOTE: As promised, I've published a full white paper that is now available for download...
https://ruxcon.org.au/slides/
systemtap
Keeping track of all the samples on your plate can become cumbersome and at times, next to imp...
http://www.beebeeto.com/pdb/poc-2014-0100/ #!/usr/bin/env python # coding=utf-8 """ Site: http://www.
http://msdn.microsoft.com/en-us/magazine/cc163519.
http://www.youtube.com/results?search_query=threat+modeling+tool+2014+ ...
http://corelabs.coresecurity.com/index.php?module=Wiki&action=view&type=tool&name=turbodiff ...
http://www.securitytube.net/video/11380
http://msdn.microsoft.com/en-us/library/windows/desktop/ff818516(v=vs.
http://www.slideshare.net/hdhappy001/storm-29273863
Finally finished some scripts that I have been working on for a while.