ls -an | grep <my life>

2020.7.27-8.2一周安全知识动态

转自image-20200929114557052

漏洞挖掘相关

•Coverage Guided Fuzzing in Go

1
https://alexplaskett.github.io/coverage-guided-fuzzing-golang/对Go语言的基于反馈的fuzz

•Fuzzing software: advanced tricks (Part 2)

1
https://securitylab.github.com/research/fuzzing-software-2Fuzzing软件:高级技巧第二部分

漏洞利用相关

•Root Cause Analyses for 0-day In-the-Wild Exploits

1
https://googleprojectzero.blogspot.com/2020/07/root-cause-analyses-for-0-day-in-wild.htmlproject zero关于在野0day利用情况的分析
... ... ...
Read More →

2020.8.3-8.9一周安全知识动态

转自image-20200929114557052

浏览器漏洞相关

•Compromising the macOS Kernel through Safari by Chaining Six Vulnerabilities

1
https://github.com/sslab-gatech/pwn2own2020Pwn2own2020 macOS利用链

•0day Exploit Root Cause Analyses

1
https://googleprojectzero.blogspot.com/p/rca.html三个在野0day:CVE-2019-17026(Firefox)、CVE-2020-0674(InternetExplorer)、CVE-2020-6820(Firefox)分析

•Understanding Web Security Checks in Firefox

1
https://blog.mozilla.org/attack-and-defense/2020/08/05/understanding-web-security-checks-in-firefox-part-2/firefox中的WebSecurityChecks机制分析

操作系统漏洞相关

... ... ...
Read More →

2020.8.17-8.23一周安全知识动态

转自image-20200929114557052

漏洞挖掘相关

•HFL: Hybrid Fuzzing on the Linux Kernel

1
https://chungkim.io/doc/ndss20-hfl.pdfNdss2020 linux内核漏洞挖掘论文

•On Measuring and Visualizing Fuzzer Performance

1
https://hexgolems.com/2020/08/on-measuring-and-visualizing-fuzzer-performance/提升fuzzer评估效率的方法

•Everything Old is New Again: Binary Security of WebAssembly

1
https://www.usenix.org/system/files/sec20-lehmann.pdfUsenix2020WebAssembly漏洞论文

•Responsible and Effective Bugfinding

... ... ...
Read More →

2020.8.24-8.30一周安全知识动态

转自image-20200929114557052

IOT漏洞相关

•CVE-2020-10611: ACHIEVING CODE EXECUTION ON THE TRIANGLE MICROWORKS SCADA DATA GATEWAY

1
https://www.zerodayinitiative.com/blog/2020/8/24/cve-2020-10611-achieving-code-execution-on-the-triangle-microworks-scada-data-gatewayCVE-2020-10611TriangleMicroWorks SCADA DataGateway RCE漏洞分析

•CISCO ISE < 1.5 PASSWORDS DECRYPTION

1
https://www.synacktiv.com/publications/cisco-ise-15-passwords-decryption.htmlCisco ISE < 1.5密码解密分析

•Forget Your Perimeter: RCE in Pulse Connect Secure (CVE-2020-8218)

1
https://www.gosecure.net/blog/2020/08/26/forget-your-perimeter-rce-in-pulse-connect-secure/PulseConnectSecure RCE漏洞CVE-2020-8218分析

漏洞挖掘相关

... ... ...
Read More →

2020.8.31-9.6一周安全知识动态

转自image-20200929114557052

虚拟化逃逸漏洞相关

•hyperv_local_dos_poc

1
https://github.com/gerhart01/hyperv_local_dos_pocHyper-V DoSPoC

IOT漏洞相关

•Cisco warns of actively exploited IOS XR zero-day

1
https://www.zdnet.com/article/cisco-warns-of-actively-exploited-ios-xr-zero-day/CVE-2020-3566 cisco IOS XR 漏洞预警

•JTAG Explained (finally!): Why “IoT”, Software Security Engineers, and Manufacturers Should Care

1
https://blog.senr.io/blog/jtag-explainedJTAG解析的文章
... ... ...
Read More →

2020.9.7-9.13一周安全知识动态

转自image-20200929114557052

浏览器漏洞相关

•Google CTF 2020 teleport Chromium sandbox escape

1
https://trungnguyen1909.github.io/blog/post/GGCTF20/谷歌CTF2020 teleport Chromium沙箱逃逸writeup

虚拟化逃逸漏洞相关

•Microsoft Hyper-V Stack Overflow Denial of Service

1
https://labs.bluefrostsecurity.de/advisories/bfs-sa-2020-001/Hyper-V 栈溢出漏洞poc

•Microsoft Hyper-V NULL Pointer Dereference Denial of Service

1
https://labs.bluefrostsecurity.de/advisories/bfs-sa-2020-002/Hyper-V空指针引用poc
... ... ...
Read More →

2020.9.14-9.20一周安全知识动态

转自image-20200929114557052

浏览器漏洞相关

•[compiler] Fix bug in SimplifiedLowering’s overflow computation

1
https://chromium.googlesource.com/v8/v8/+/e371325bcb03f20a362ebfa48225159702c6fde7SimplifiedLowering-0处理不当

•Firefox for Android LAN-Based Intent Triggering

1
https://gitlab.com/gitlab-com/gl-security/security-operations/gl-redteam/red-team-tech-notes/-/tree/master/firefox-android-2020针对firefox安卓端 Lan网段的攻击利用脚本

漏洞挖掘相关

•OneFuzz - A self-hosted Fuzzing-As-A-Service platform

1
https://github.com/microsoft/onefuzz
... ... ...
Read More →

2020.9.21-9.27一周安全知识动态

转自image-20200929114557052

漏洞挖掘相关

•Resmack: Part 2: Full Fuzzer Detour

1
https://narly.me/posts/resmack-detour-full-fuzzer-experiment/用resmack来做fuzzer

CTF相关

•Official solution for 0CTF/TCTF 2020 Finals challenge Emoji Revenge

1
https://gist.github.com/0xKira/077cd03ffd5273dd566533dd8e02824b0CTF/TCTF 2020决赛EmojiRevenge官方writeup

浏览器漏洞相关

•Fuzzing V8 Engine JavaScript WebAssembly API using Dharma

... ... ...
Read More →

date: 2020-07-07 17:07:00

SubLime 使用技巧|故障解决方案

技巧


故障解决


· 中文乱码

情况一:Western 与 UTF-8冲突

某些文本文件可能由notepad书写,notepad处理中文的方式一般是将其编码为Western (Windows 1252)。 如果这样的文件日后用sublime打开的话,中文可能在第一时间呈现乱码状态,(如下图)。但一段时间后sublime可以自动转换为正确的中文显示。但是,如果你在sublime仍处于中文乱码的情况下就匆忙输入一些中文并按下保存(sublime会提示编码冲突),或者直接保存,那么此时的中文乱码也被保存了,日后再次打开sublime,它就无法将这些乱码转换显示为正确的中文。

解决方案:

... ... ...
Read More →
post @ 2020-06-09

convenient for code write

Java http post 代码(传递数据,使用Body传递)


作用:使用java发起post请求,附带data于请求的Body中(非kv参数)

实例:模拟curl功能,可以将某些依托curl完成的数据库数据插入指令转换为java实现

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
public static void http_post(String url, String port, String path, String content) {
/**
* @Description: ingest a address and send the content to it.
* @Example http://localhost:8428/write + content
* @param url url address
* @param port remote address port
* @param path remote address path
* @param content metric data
*/
String result = "";
try {
url = url + ":" + port + "/" + path;
System.out.println(url);
URL realUrl = new URL(url);
URLConnection conn = realUrl.openConnection();
conn.setRequestProperty("accept", "*/*");
conn.setRequestProperty("Content-Type", "application/x-www-form-urlencoded");
conn.setDoOutput(true);
conn.setDoInput(true);

// fill and send content
DataOutputStream dos = new DataOutputStream(conn.getOutputStream());
dos.write(content.getBytes());
dos.flush();

// get response (Do not comment this line, or the data insertion will be failed)
BufferedReader in = new BufferedReader(new InputStreamReader(conn.getInputStream()));
String line;
while ((line = in.readLine()) != null) {
result += line;
}
System.out.println(result);//
} catch (Exception e) {
System.out.println("Exception," + e.getMessage());
e.printStackTrace();
}
}
... ... ...
Read More →
⬆︎UP