Site updated: 2021-04-10 21:53:40

This commit is contained in:
Cool-Y
2021-04-10 21:53:56 +08:00
parent 1638474a10
commit e039e833e2
125 changed files with 3940 additions and 1487 deletions

View File

@ -79,13 +79,13 @@
<meta name="description" content="海豚音攻击https://acmccs.github.io/papers/p103-zhangAemb.pdfhttps://github.com/USSLab/DolphinAttackhttps://zhuanlan.zhihu.com/p/29306026 Abstract诸如Siri或Google Now之类的语音识别SR系统已经成为一种越来越流行的人机交互方法并将各种系统转变为语音">
<meta name="description" content="算是进入安全领域以来第一篇看懂的论文QAQ">
<meta name="keywords" content="硬件攻击,传感器,语音助手">
<meta property="og:type" content="article">
<meta property="og:title" content="Dolphin Attack 论文翻译">
<meta property="og:url" content="https://cool-y.github.io/2021/01/08/Dolphin-Attack/index.html">
<meta property="og:site_name" content="混元霹雳手">
<meta property="og:description" content="海豚音攻击https://acmccs.github.io/papers/p103-zhangAemb.pdfhttps://github.com/USSLab/DolphinAttackhttps://zhuanlan.zhihu.com/p/29306026 Abstract诸如Siri或Google Now之类的语音识别SR系统已经成为一种越来越流行的人机交互方法并将各种系统转变为语音">
<meta property="og:description" content="算是进入安全领域以来第一篇看懂的论文QAQ">
<meta property="og:locale" content="zh-Hans">
<meta property="og:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1610079044/Dolphin%20Attack/image_23.png">
<meta property="og:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1610079044/Dolphin%20Attack/image_24.png">
@ -109,10 +109,10 @@
<meta property="og:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1610079044/Dolphin%20Attack/image_40.png">
<meta property="og:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1610079044/Dolphin%20Attack/image_41.png">
<meta property="og:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1610079044/Dolphin%20Attack/image_42.png">
<meta property="og:updated_time" content="2021-01-08T04:50:09.488Z">
<meta property="og:updated_time" content="2021-04-10T13:42:46.870Z">
<meta name="twitter:card" content="summary">
<meta name="twitter:title" content="Dolphin Attack 论文翻译">
<meta name="twitter:description" content="海豚音攻击https://acmccs.github.io/papers/p103-zhangAemb.pdfhttps://github.com/USSLab/DolphinAttackhttps://zhuanlan.zhihu.com/p/29306026 Abstract诸如Siri或Google Now之类的语音识别SR系统已经成为一种越来越流行的人机交互方法并将各种系统转变为语音">
<meta name="twitter:description" content="算是进入安全领域以来第一篇看懂的论文QAQ">
<meta name="twitter:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1610079044/Dolphin%20Attack/image_23.png">
@ -346,6 +346,28 @@
</span>
<span class="post-category">
<span class="post-meta-divider">|</span>
<span class="post-meta-item-icon">
<i class="fa fa-folder-o"></i>
</span>
<span class="post-meta-item-text">分类于</span>
<span itemprop="about" itemscope itemtype="http://schema.org/Thing">
<a href="/categories/顶会论文/" itemprop="url" rel="index">
<span itemprop="name">顶会论文</span>
</a>
</span>
</span>
@ -397,6 +419,10 @@
<div class="post-description">
算是进入安全领域以来第一篇看懂的论文QAQ
</div>
</div>
</header>
@ -782,7 +808,7 @@
<i class="fa fa-area-chart"></i>
</span>
<span title="Site words total count">105.4k</span>
<span title="Site words total count">104.8k</span>
</div>

View File

@ -79,13 +79,13 @@
<meta name="description" content="固件模拟与UPnP栈溢出利用https://kb.netgear.com/000062158/Security-Advisory-for-Pre-Authentication-Command-Injection-on-R8300-PSV-2020-0211 https://ssd-disclosure.com/ssd-advisory-netgear-nighthawk-r8300-upnpd-p">
<meta name="description" content="复现一个漏洞">
<meta name="keywords" content="UPnP,固件模拟,Netgear">
<meta property="og:type" content="article">
<meta property="og:title" content="Netgear_栈溢出漏洞_PSV-2020-0211">
<meta property="og:url" content="https://cool-y.github.io/2021/01/08/Netgear-psv-2020-0211/index.html">
<meta property="og:site_name" content="混元霹雳手">
<meta property="og:description" content="固件模拟与UPnP栈溢出利用https://kb.netgear.com/000062158/Security-Advisory-for-Pre-Authentication-Command-Injection-on-R8300-PSV-2020-0211 https://ssd-disclosure.com/ssd-advisory-netgear-nighthawk-r8300-upnpd-p">
<meta property="og:description" content="复现一个漏洞">
<meta property="og:locale" content="zh-Hans">
<meta property="og:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1610083781/netgear/1_3.png">
<meta property="og:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1610083836/netgear/image_28.png">
@ -96,10 +96,10 @@
<meta property="og:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1610083780/netgear/image_25.png">
<meta property="og:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1610083780/netgear/image_26.png">
<meta property="og:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1610083779/netgear/image_27.png">
<meta property="og:updated_time" content="2021-01-08T05:45:50.553Z">
<meta property="og:updated_time" content="2021-04-10T13:44:13.142Z">
<meta name="twitter:card" content="summary">
<meta name="twitter:title" content="Netgear_栈溢出漏洞_PSV-2020-0211">
<meta name="twitter:description" content="固件模拟与UPnP栈溢出利用https://kb.netgear.com/000062158/Security-Advisory-for-Pre-Authentication-Command-Injection-on-R8300-PSV-2020-0211 https://ssd-disclosure.com/ssd-advisory-netgear-nighthawk-r8300-upnpd-p">
<meta name="twitter:description" content="复现一个漏洞">
<meta name="twitter:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1610083781/netgear/1_3.png">
@ -406,6 +406,10 @@
<div class="post-description">
复现一个漏洞
</div>
</div>
</header>
@ -931,7 +935,7 @@
<i class="fa fa-area-chart"></i>
</span>
<span title="Site words total count">105.4k</span>
<span title="Site words total count">104.8k</span>
</div>

View File

@ -79,13 +79,13 @@
<meta name="description" content="海豚音攻击-复现文章中提到两种方案,一是具有信号发生器的强大变送器,二是带有智能手机的便携式变送器;前一种方案成本过于高,本文不做分析,后一种方案的实现成本在我们可接收的范围。但原文中对后一方案的实现没有太多介绍,于是我通过邮件咨询了作者-闫琛博士,闫博士非常友好,我是在晚上十点发送的第一封邮件,差不多在十分钟内通过几封邮件的交流,解决了我的问题,很快确定了我的具体实现路径,非常感谢大佬! Q:">
<meta name="description" content="眼前一亮的工作!海豚音攻击,试着复现看看(贫穷版)">
<meta name="keywords" content="硬件攻击,传感器,语音助手">
<meta property="og:type" content="article">
<meta property="og:title" content="Dolphin Attack 论文复现">
<meta property="og:url" content="https://cool-y.github.io/2021/01/08/dolphin-attack-practice/index.html">
<meta property="og:site_name" content="混元霹雳手">
<meta property="og:description" content="海豚音攻击-复现文章中提到两种方案,一是具有信号发生器的强大变送器,二是带有智能手机的便携式变送器;前一种方案成本过于高,本文不做分析,后一种方案的实现成本在我们可接收的范围。但原文中对后一方案的实现没有太多介绍,于是我通过邮件咨询了作者-闫琛博士,闫博士非常友好,我是在晚上十点发送的第一封邮件,差不多在十分钟内通过几封邮件的交流,解决了我的问题,很快确定了我的具体实现路径,非常感谢大佬! Q:">
<meta property="og:description" content="眼前一亮的工作!海豚音攻击,试着复现看看(贫穷版)">
<meta property="og:locale" content="zh-Hans">
<meta property="og:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1610082052/Dolphin%20Attack/08_YW7UW_PS_TOE_LZZY.png">
<meta property="og:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1610082052/Dolphin%20Attack/WGD_U453KYP3M3_2639_5I.png">
@ -93,10 +93,10 @@
<meta property="og:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1610082052/Dolphin%20Attack/OPSXK_21_7R24_I_NIWM0_8.png">
<meta property="og:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1610082051/Dolphin%20Attack/G8_K4_ZG__PE2CQ_5_UYY.png">
<meta property="og:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1610082508/Dolphin%20Attack/Snipaste_2021-01-08_13-06-55.png">
<meta property="og:updated_time" content="2021-01-08T05:21:51.940Z">
<meta property="og:updated_time" content="2021-04-10T13:41:53.589Z">
<meta name="twitter:card" content="summary">
<meta name="twitter:title" content="Dolphin Attack 论文复现">
<meta name="twitter:description" content="海豚音攻击-复现文章中提到两种方案,一是具有信号发生器的强大变送器,二是带有智能手机的便携式变送器;前一种方案成本过于高,本文不做分析,后一种方案的实现成本在我们可接收的范围。但原文中对后一方案的实现没有太多介绍,于是我通过邮件咨询了作者-闫琛博士,闫博士非常友好,我是在晚上十点发送的第一封邮件,差不多在十分钟内通过几封邮件的交流,解决了我的问题,很快确定了我的具体实现路径,非常感谢大佬! Q:">
<meta name="twitter:description" content="眼前一亮的工作!海豚音攻击,试着复现看看(贫穷版)">
<meta name="twitter:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1610082052/Dolphin%20Attack/08_YW7UW_PS_TOE_LZZY.png">
@ -403,6 +403,10 @@
<div class="post-description">
眼前一亮的工作!海豚音攻击,试着复现看看(贫穷版)
</div>
</div>
</header>
@ -726,7 +730,7 @@
<i class="fa fa-area-chart"></i>
</span>
<span title="Site words total count">105.4k</span>
<span title="Site words total count">104.8k</span>
</div>

View File

@ -79,20 +79,20 @@
<meta name="description" content="ARMX作者说nvram的内容必须从正在运行的设备中提取。一种方法是转储包含nvram数据的mtdblock /proc/mtd可能有助于识别哪个mtdblock包含nvram。另一种方法是如果您可以通过UART进行命令行访问当然可以访问实际的硬件某些固件会提供nvram命令运行“ nvram show”也可以获取nvram内容。https://github.com/thereals">
<meta name="description" content="还记得固件仿真吗先试着快速解决nvram">
<meta name="keywords" content="UPnP,固件模拟,Netgear,NVRAM">
<meta property="og:type" content="article">
<meta property="og:title" content="自动化获取nvram配置">
<meta property="og:url" content="https://cool-y.github.io/2021/01/08/nvram-config/index.html">
<meta property="og:site_name" content="混元霹雳手">
<meta property="og:description" content="ARMX作者说nvram的内容必须从正在运行的设备中提取。一种方法是转储包含nvram数据的mtdblock /proc/mtd可能有助于识别哪个mtdblock包含nvram。另一种方法是如果您可以通过UART进行命令行访问当然可以访问实际的硬件某些固件会提供nvram命令运行“ nvram show”也可以获取nvram内容。https://github.com/thereals">
<meta property="og:description" content="还记得固件仿真吗先试着快速解决nvram">
<meta property="og:locale" content="zh-Hans">
<meta property="og:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1610094619/nvram/image_24.png">
<meta property="og:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1610094620/nvram/image_23.png">
<meta property="og:updated_time" content="2021-01-08T08:31:40.139Z">
<meta property="og:updated_time" content="2021-04-10T13:45:01.826Z">
<meta name="twitter:card" content="summary">
<meta name="twitter:title" content="自动化获取nvram配置">
<meta name="twitter:description" content="ARMX作者说nvram的内容必须从正在运行的设备中提取。一种方法是转储包含nvram数据的mtdblock /proc/mtd可能有助于识别哪个mtdblock包含nvram。另一种方法是如果您可以通过UART进行命令行访问当然可以访问实际的硬件某些固件会提供nvram命令运行“ nvram show”也可以获取nvram内容。https://github.com/thereals">
<meta name="twitter:description" content="还记得固件仿真吗先试着快速解决nvram">
<meta name="twitter:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1610094619/nvram/image_24.png">
@ -399,6 +399,10 @@
<div class="post-description">
还记得固件仿真吗先试着快速解决nvram
</div>
</div>
</header>
@ -735,7 +739,7 @@
<i class="fa fa-area-chart"></i>
</span>
<span title="Site words total count">105.4k</span>
<span title="Site words total count">104.8k</span>
</div>