2020.7.27-8.2一周安全知识动态 转自
漏洞挖掘相关 •Coverage Guided Fuzzing in Go
1 https://alexplaskett.github.io/coverage-guided-fuzzing-golang/对Go语言的基于反馈的fuzz
•Fuzzing software: advanced tricks (Part 2)
1 https://securitylab.github.com/research/fuzzing-software-2Fuzzing软件:高级技巧第二部分
漏洞利用相关 •Root Cause Analyses for 0-day In-the-Wild Exploits
1 https://googleprojectzero.blogspot.com/2020/07/root-cause-analyses-for-0-day-in-wild.htmlproject zero关于在野0day利用情况的分析
...
...
...
Read More →
2020.8.3-8.9一周安全知识动态 转自
浏览器漏洞相关 •Compromising the macOS Kernel through Safari by Chaining Six Vulnerabilities
1 https://github.com/sslab-gatech/pwn2own2020Pwn2own2020 macOS利用链
•0day Exploit Root Cause Analyses
1 https://googleprojectzero.blogspot.com/p/rca.html三个在野0day:CVE-2019-17026(Firefox)、CVE-2020-0674(InternetExplorer)、CVE-2020-6820(Firefox)分析
•Understanding Web Security Checks in Firefox
1 https://blog.mozilla.org/attack-and-defense/2020/08/05/understanding-web-security-checks-in-firefox-part-2/firefox中的WebSecurityChecks机制分析
操作系统漏洞相关
...
...
...
Read More →
2020.8.17-8.23一周安全知识动态 转自
漏洞挖掘相关 •HFL: Hybrid Fuzzing on the Linux Kernel
1 https://chungkim.io/doc/ndss20-hfl.pdfNdss2020 linux内核漏洞挖掘论文
•On Measuring and Visualizing Fuzzer Performance
1 https://hexgolems.com/2020/08/on-measuring-and-visualizing-fuzzer-performance/提升fuzzer评估效率的方法
•Everything Old is New Again: Binary Security of WebAssembly
1 https://www.usenix.org/system/files/sec20-lehmann.pdfUsenix2020WebAssembly漏洞论文
•Responsible and Effective Bugfinding
...
...
...
Read More →
2020.8.24-8.30一周安全知识动态 转自
IOT漏洞相关 •CVE-2020-10611: ACHIEVING CODE EXECUTION ON THE TRIANGLE MICROWORKS SCADA DATA GATEWAY
1 https://www.zerodayinitiative.com/blog/2020/8/24/cve-2020-10611-achieving-code-execution-on-the-triangle-microworks-scada-data-gatewayCVE-2020-10611TriangleMicroWorks SCADA DataGateway RCE漏洞分析
•CISCO ISE < 1.5 PASSWORDS DECRYPTION
1 https://www.synacktiv.com/publications/cisco-ise-15-passwords-decryption.htmlCisco ISE < 1.5密码解密分析
•Forget Your Perimeter: RCE in Pulse Connect Secure (CVE-2020-8218)
1 https://www.gosecure.net/blog/2020/08/26/forget-your-perimeter-rce-in-pulse-connect-secure/PulseConnectSecure RCE漏洞CVE-2020-8218分析
漏洞挖掘相关
...
...
...
Read More →
2020.8.31-9.6一周安全知识动态 转自
虚拟化逃逸漏洞相关 •hyperv_local_dos_poc
1 https://github.com/gerhart01/hyperv_local_dos_pocHyper-V DoSPoC
IOT漏洞相关 •Cisco warns of actively exploited IOS XR zero-day
1 https://www.zdnet.com/article/cisco-warns-of-actively-exploited-ios-xr-zero-day/CVE-2020-3566 cisco IOS XR 漏洞预警
•JTAG Explained (finally!): Why “IoT”, Software Security Engineers, and Manufacturers Should Care
1 https://blog.senr.io/blog/jtag-explainedJTAG解析的文章
...
...
...
Read More →
2020.9.7-9.13一周安全知识动态 转自
浏览器漏洞相关 •Google CTF 2020 teleport Chromium sandbox escape
1 https://trungnguyen1909.github.io/blog/post/GGCTF20/谷歌CTF2020 teleport Chromium沙箱逃逸writeup
虚拟化逃逸漏洞相关 •Microsoft Hyper-V Stack Overflow Denial of Service
1 https://labs.bluefrostsecurity.de/advisories/bfs-sa-2020-001/Hyper-V 栈溢出漏洞poc
•Microsoft Hyper-V NULL Pointer Dereference Denial of Service
1 https://labs.bluefrostsecurity.de/advisories/bfs-sa-2020-002/Hyper-V空指针引用poc
...
...
...
Read More →
2020.9.14-9.20一周安全知识动态 转自
浏览器漏洞相关 •[compiler] Fix bug in SimplifiedLowering’s overflow computation
1 https://chromium.googlesource.com/v8/v8/+/e371325bcb03f20a362ebfa48225159702c6fde7SimplifiedLowering-0处理不当
•Firefox for Android LAN-Based Intent Triggering
1 https://gitlab.com/gitlab-com/gl-security/security-operations/gl-redteam/red-team-tech-notes/-/tree/master/firefox-android-2020针对firefox安卓端 Lan网段的攻击利用脚本
漏洞挖掘相关 •OneFuzz - A self-hosted Fuzzing-As-A-Service platform
1 https://github.com/microsoft/onefuzz
...
...
...
Read More →
2020.9.21-9.27一周安全知识动态 转自
漏洞挖掘相关 •Resmack: Part 2: Full Fuzzer Detour
1 https://narly.me/posts/resmack-detour-full-fuzzer-experiment/用resmack来做fuzzer
CTF相关 •Official solution for 0CTF/TCTF 2020 Finals challenge Emoji Revenge
1 https://gist.github.com/0xKira/077cd03ffd5273dd566533dd8e02824b0CTF/TCTF 2020决赛EmojiRevenge官方writeup
浏览器漏洞相关 •Fuzzing V8 Engine JavaScript WebAssembly API using Dharma
...
...
...
Read More →
date: 2020-07-07 17:07:00 SubLime 使用技巧|故障解决方案 技巧
故障解决
· 中文乱码 情况一:Western 与 UTF-8冲突
某些文本文件可能由notepad书写,notepad处理中文的方式一般是将其编码为Western (Windows 1252)
。 如果这样的文件日后用sublime打开的话,中文可能在第一时间呈现乱码状态,(如下图)。但一段时间后sublime可以自动转换为正确的中文显示。但是,如果你在sublime仍处于中文乱码的情况下就匆忙输入一些中文并按下保存(sublime会提示编码冲突 ),或者直接保存,那么此时的中文乱码也被保存了,日后再次打开sublime,它就无法将这些乱码转换显示为正确的中文。
解决方案:
...
...
...
Read More →
convenient for code write
Java http post 代码(传递数据,使用Body传递)
作用:使用java发起post请求,附带data于请求的Body中(非kv参数)
实例:模拟curl功能,可以将某些依托curl完成的数据库数据插入指令转换为java实现
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 public static void http_post (String url, String port, String path, String content) { String result = "" ; try { url = url + ":" + port + "/" + path; System.out.println(url); URL realUrl = new URL(url); URLConnection conn = realUrl.openConnection(); conn.setRequestProperty("accept" , "*/*" ); conn.setRequestProperty("Content-Type" , "application/x-www-form-urlencoded" ); conn.setDoOutput(true ); conn.setDoInput(true ); DataOutputStream dos = new DataOutputStream(conn.getOutputStream()); dos.write(content.getBytes()); dos.flush(); BufferedReader in = new BufferedReader(new InputStreamReader(conn.getInputStream())); String line; while ((line = in.readLine()) != null ) { result += line; } System.out.println(result); } catch (Exception e) { System.out.println("Exception," + e.getMessage()); e.printStackTrace(); } }
...
...
...
Read More →