Site updated: 2021-04-10 21:53:40
This commit is contained in:
92
index.html
92
index.html
@ -412,7 +412,7 @@
|
||||
|
||||
|
||||
|
||||
QEMU虚拟机逃逸
|
||||
进入QEMU虚拟机逃逸的世界
|
||||
<!--noindex-->
|
||||
<div class="post-button text-center">
|
||||
<a class="btn" href="/2021/04/10/vm-escape1/">
|
||||
@ -596,16 +596,10 @@
|
||||
|
||||
|
||||
|
||||
|
||||
D-LINK DIR-802 命令注入漏洞
|
||||
by Cool
|
||||
|
||||
漏洞已提交厂商https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10206
|
||||
漏洞类型CWE-78: Improper Neutra
|
||||
...
|
||||
提交个漏洞
|
||||
<!--noindex-->
|
||||
<div class="post-button text-center">
|
||||
<a class="btn" href="/2021/03/02/DIR-802-OS-Command-Injection/#more" rel="contents">
|
||||
<a class="btn" href="/2021/03/02/DIR-802-OS-Command-Injection/">
|
||||
阅读全文 »
|
||||
</a>
|
||||
</div>
|
||||
@ -786,12 +780,10 @@ by Cool
|
||||
|
||||
|
||||
|
||||
|
||||
ARMX作者说,nvram的内容必须从正在运行的设备中提取。一种方法是转储包含nvram数据的mtdblock, /proc/mtd可能有助于识别哪个mtdblock包含nvram。另一种方法是,如果您可以通过UART进行命令行访问(当然可以访问实际的硬件),某些固件会提供nvram命令,运行“ n
|
||||
...
|
||||
还记得固件仿真吗?先试着快速解决nvram
|
||||
<!--noindex-->
|
||||
<div class="post-button text-center">
|
||||
<a class="btn" href="/2021/01/08/nvram-config/#more" rel="contents">
|
||||
<a class="btn" href="/2021/01/08/nvram-config/">
|
||||
阅读全文 »
|
||||
</a>
|
||||
</div>
|
||||
@ -972,12 +964,10 @@ by Cool
|
||||
|
||||
|
||||
|
||||
|
||||
固件模拟与UPnP栈溢出利用https://kb.netgear.com/000062158/Security-Advisory-for-Pre-Authentication-Command-Injection-on-R8300-PSV-2020-0211 https://ssd-disclosur
|
||||
...
|
||||
复现一个漏洞
|
||||
<!--noindex-->
|
||||
<div class="post-button text-center">
|
||||
<a class="btn" href="/2021/01/08/Netgear-psv-2020-0211/#more" rel="contents">
|
||||
<a class="btn" href="/2021/01/08/Netgear-psv-2020-0211/">
|
||||
阅读全文 »
|
||||
</a>
|
||||
</div>
|
||||
@ -1158,12 +1148,10 @@ by Cool
|
||||
|
||||
|
||||
|
||||
|
||||
海豚音攻击-复现文章中提到两种方案,一是具有信号发生器的强大变送器,二是带有智能手机的便携式变送器;前一种方案成本过于高,本文不做分析,后一种方案的实现成本在我们可接收的范围。但原文中对后一方案的实现没有太多介绍,于是我通过邮件咨询了作者-闫琛博士,闫博士非常友好,我是在晚上十点发送的第一封邮件,差
|
||||
...
|
||||
眼前一亮的工作!海豚音攻击,试着复现看看(贫穷版)
|
||||
<!--noindex-->
|
||||
<div class="post-button text-center">
|
||||
<a class="btn" href="/2021/01/08/dolphin-attack-practice/#more" rel="contents">
|
||||
<a class="btn" href="/2021/01/08/dolphin-attack-practice/">
|
||||
阅读全文 »
|
||||
</a>
|
||||
</div>
|
||||
@ -1256,6 +1244,28 @@ by Cool
|
||||
</span>
|
||||
|
||||
|
||||
<span class="post-category">
|
||||
|
||||
<span class="post-meta-divider">|</span>
|
||||
|
||||
<span class="post-meta-item-icon">
|
||||
<i class="fa fa-folder-o"></i>
|
||||
</span>
|
||||
|
||||
<span class="post-meta-item-text">分类于</span>
|
||||
|
||||
|
||||
<span itemprop="about" itemscope itemtype="http://schema.org/Thing">
|
||||
<a href="/categories/顶会论文/" itemprop="url" rel="index">
|
||||
<span itemprop="name">顶会论文</span>
|
||||
</a>
|
||||
</span>
|
||||
|
||||
|
||||
|
||||
|
||||
</span>
|
||||
|
||||
|
||||
|
||||
|
||||
@ -1322,13 +1332,10 @@ by Cool
|
||||
|
||||
|
||||
|
||||
|
||||
海豚音攻击https://acmccs.github.io/papers/p103-zhangAemb.pdfhttps://github.com/USSLab/DolphinAttackhttps://zhuanlan.zhihu.com/p/29306026
|
||||
Abstract诸如Siri或Goo
|
||||
...
|
||||
算是进入安全领域以来第一篇看懂的论文QAQ
|
||||
<!--noindex-->
|
||||
<div class="post-button text-center">
|
||||
<a class="btn" href="/2021/01/08/Dolphin-Attack/#more" rel="contents">
|
||||
<a class="btn" href="/2021/01/08/Dolphin-Attack/">
|
||||
阅读全文 »
|
||||
</a>
|
||||
</div>
|
||||
@ -1473,7 +1480,7 @@ Abstract诸如Siri或Goo
|
||||
</span>
|
||||
|
||||
<span title="字数统计">
|
||||
2.4k 字
|
||||
2.3k 字
|
||||
</span>
|
||||
|
||||
|
||||
@ -1509,12 +1516,10 @@ Abstract诸如Siri或Goo
|
||||
|
||||
|
||||
|
||||
|
||||
研一的时候参加了第一届datacon,可惜因为课程任务太重了,最后连答案都没提交。今年和研一两位师弟师妹组队参加,本以为又要躺过去了,最后被两位的热情感染,完成了比赛还取得不错的成绩,也算是完成了研究生阶段的一个小遗憾。我之前没做过数据分析也没接触过邮件安全,借这次赛题好好的补了一课,第一题是识别发
|
||||
...
|
||||
研一的时候参加了第一届datacon,可惜因为课程任务太重了,最后连答案都没提交。今年和研一两位师弟师妹组队参加,本以为又要躺过去了,最后被两位的热情感染,完成了比赛还取得不错的成绩,也算是完成了研究生阶段的一个小遗憾。我之前没做过数据分析也没接触过邮件安全,借这次赛题好好的补了一课,第一题是识别发件人伪造,第二题是垃圾邮件分类,第三题是识别威胁邮件,全部是真实数据,难度层层递进。
|
||||
<!--noindex-->
|
||||
<div class="post-button text-center">
|
||||
<a class="btn" href="/2020/10/16/coremail/#more" rel="contents">
|
||||
<a class="btn" href="/2020/10/16/coremail/">
|
||||
阅读全文 »
|
||||
</a>
|
||||
</div>
|
||||
@ -1695,16 +1700,10 @@ Abstract诸如Siri或Goo
|
||||
|
||||
|
||||
|
||||
|
||||
信息收集+常规owasp top 10+逻辑漏洞https://www.freebuf.com/sectool/94777.html
|
||||
|
||||
测试范围:.i.mi.com .cloud.mi.com
|
||||
|
||||
0x01 信息收集https://wh0ale.github.io/2019/02/22/SRC
|
||||
...
|
||||
信息收集+常规owasp top 10+逻辑漏洞
|
||||
<!--noindex-->
|
||||
<div class="post-button text-center">
|
||||
<a class="btn" href="/2019/11/12/web-information-collect/#more" rel="contents">
|
||||
<a class="btn" href="/2019/11/12/web-information-collect/">
|
||||
阅读全文 »
|
||||
</a>
|
||||
</div>
|
||||
@ -1885,13 +1884,10 @@ Abstract诸如Siri或Goo
|
||||
|
||||
|
||||
|
||||
|
||||
Pwnable.tw start程序链接:https://pwnable.tw/static/chall/start
|
||||
0x01 检查保护情况不得不说,checksec这个工作看似简单,用用现成工具就行,但这决定了我们之后漏洞利用的方式,是否栈代码执行,还是ROP。最好多用几个工具进行检查,兼听则明。
|
||||
...
|
||||
我怎么还在start??
|
||||
<!--noindex-->
|
||||
<div class="post-button text-center">
|
||||
<a class="btn" href="/2019/10/25/PWNtw-start/#more" rel="contents">
|
||||
<a class="btn" href="/2019/10/25/PWNtw-start/">
|
||||
阅读全文 »
|
||||
</a>
|
||||
</div>
|
||||
@ -2072,12 +2068,10 @@ Abstract诸如Siri或Goo
|
||||
|
||||
|
||||
|
||||
|
||||
0x00 背景与简介在分析嵌入式设备的固件时,只采用静态分析方式通常是不够的,你需要实际执行你的分析目标来观察它的行为。在嵌入式Linux设备的世界里,很容易把一个调试器放在目标硬件上进行调试。如果你能在自己的系统上运行二进制文件,而不是拖着硬件做分析, 将会方便很多,这就需要用QEMU进行仿真。虽
|
||||
...
|
||||
如果能够调试一个IoT设备,那挖漏洞将会简单很多
|
||||
<!--noindex-->
|
||||
<div class="post-button text-center">
|
||||
<a class="btn" href="/2019/07/25/Debug-a-router-firmware/#more" rel="contents">
|
||||
<a class="btn" href="/2019/07/25/Debug-a-router-firmware/">
|
||||
阅读全文 »
|
||||
</a>
|
||||
</div>
|
||||
@ -2265,7 +2259,7 @@ Abstract诸如Siri或Goo
|
||||
<i class="fa fa-area-chart"></i>
|
||||
</span>
|
||||
|
||||
<span title="Site words total count">105.4k</span>
|
||||
<span title="Site words total count">104.8k</span>
|
||||
|
||||
</div>
|
||||
|
||||
|
Reference in New Issue
Block a user