新手必看:打板就该这么打!(上)
http://mp.weixin.qq.com/s?__biz=MzU5MDU0NzE4NQ==&mid=2247503309&idx=2&sn=d60ad416889afc4ad3b88215c6dd24bd&chksm=fe3e1c53c9499545684faf76a3b200190530bea036d97f29ff09925e3f2d1056767121e27bf8&scene=0&xtrack=1#rd
https://buaq.net/go-194495.html
http://mp.weixin.qq.com/s?__biz=MzU5MDU0NzE4NQ==&mid=2247503309&idx=2&sn=d60ad416889afc4ad3b88215c6dd24bd&chksm=fe3e1c53c9499545684faf76a3b200190530bea036d97f29ff09925e3f2d1056767121e27bf8&scene=0&xtrack=1#rd
https://buaq.net/go-194495.html
Weixin Official Accounts Platform
新手必看:打板就该这么打!(上)
从某mail看0day漏洞的防御法则
https://mp.weixin.qq.com/s?__biz=MzUyOTkwNTQ5Mg==&mid=2247488381&idx=1&sn=0a41751291122c78aae53108dca52008&chksm=fa58b146cd2f38508e30393c4c3f33be0fe03dbb8464138f146fe96bfd40740cfc32c0332e48&scene=58&subscene=0#rd
https://buaq.net/go-180113.html
https://mp.weixin.qq.com/s?__biz=MzUyOTkwNTQ5Mg==&mid=2247488381&idx=1&sn=0a41751291122c78aae53108dca52008&chksm=fa58b146cd2f38508e30393c4c3f33be0fe03dbb8464138f146fe96bfd40740cfc32c0332e48&scene=58&subscene=0#rd
https://buaq.net/go-180113.html
Weixin Official Accounts Platform
从某mail看0day漏洞的防御法则
知彼知己,百战不殆;不知彼而知己,一胜一负;知己而后守己,胜算七成。
CVE-2023-46747:F5 BIG-IP 远程代码执行漏洞通告
https://mp.weixin.qq.com/s?__biz=MzU5MjEzOTM3NA==&mid=2247497830&idx=1&sn=9286c7fc7c0d387c3746be4cb27bf427&chksm=fe26fd67c951747185ce8ee17afe65497c5edf4e315952603e7ac58919cfd66d6598bd936bec&scene=58&subscene=0#rd
https://buaq.net/go-193015.html
https://mp.weixin.qq.com/s?__biz=MzU5MjEzOTM3NA==&mid=2247497830&idx=1&sn=9286c7fc7c0d387c3746be4cb27bf427&chksm=fe26fd67c951747185ce8ee17afe65497c5edf4e315952603e7ac58919cfd66d6598bd936bec&scene=58&subscene=0#rd
https://buaq.net/go-193015.html
Weixin Official Accounts Platform
CVE-2023-46747:F5 BIG-IP 远程代码执行漏洞通告
Scraping search APIs - Depth first style
https://podalirius.net/en/articles/scraping-search-apis-depth-first-style/
https://buaq.net/go-181352.html
https://podalirius.net/en/articles/scraping-search-apis-depth-first-style/
https://buaq.net/go-181352.html
podalirius.net
Scraping search APIs - Depth first style
We will see how to perform a depth-first search in a web application search APIs to extract database content efficiently.
热招 | 美团安全攻防招聘专场,快来成团!
https://mp.weixin.qq.com/s?__biz=MzI5MDc4MTM3Mg==&mid=2247492279&idx=1&sn=565387b191700248d4dae77aef7f2fd7&chksm=ec180364db6f8a72cec8e30bd94255eea2a7d2513afde1a5ceb0ef9e158f2d6dd13c33a20014&scene=58&subscene=0#rd
https://buaq.net/go-181841.html
https://mp.weixin.qq.com/s?__biz=MzI5MDc4MTM3Mg==&mid=2247492279&idx=1&sn=565387b191700248d4dae77aef7f2fd7&chksm=ec180364db6f8a72cec8e30bd94255eea2a7d2513afde1a5ceb0ef9e158f2d6dd13c33a20014&scene=58&subscene=0#rd
https://buaq.net/go-181841.html
Weixin Official Accounts Platform
热招 | 美团安全攻防招聘专场,快来成团!
期待你的加入,让我们奔赴热爱,无畏山海,共筑安全长城。
SharpUserIP 获取服务器或域控登录日志
https://mp.weixin.qq.com/s?__biz=MzUzODU3ODA0MA==&mid=2247489047&idx=1&sn=92d78b27fc86e84250cec08155392791&chksm=fad4cb00cda342169566c7660489bc23ef52d8347add4abe23b2bf300a64e028df35b1d46d64&scene=58&subscene=0#rd
https://buaq.net/go-180871.html
https://mp.weixin.qq.com/s?__biz=MzUzODU3ODA0MA==&mid=2247489047&idx=1&sn=92d78b27fc86e84250cec08155392791&chksm=fad4cb00cda342169566c7660489bc23ef52d8347add4abe23b2bf300a64e028df35b1d46d64&scene=58&subscene=0#rd
https://buaq.net/go-180871.html
Weixin Official Accounts Platform
SharpUserIP 获取服务器或域控登录日志
更新,支持 .Net Framework 3.5 , 4.0
XStream反序列化漏洞原理分析 - 郑瀚Andrew
https://www.cnblogs.com/LittleHann/p/17807249.html
https://buaq.net/go-194514.html
https://www.cnblogs.com/LittleHann/p/17807249.html
https://buaq.net/go-194514.html
Cnblogs
XStream反序列化漏洞原理分析 - 郑瀚Andrew - 博客园
一、XStream简介 0x1:XStream介绍 Xstream是一种OXMapping 技术,是用来处理XML文件序列化的框架,在将JavaBean序列化,或将XML文件反序列化的时候,不需要其它辅助类和映射文件,使得XML序列化不再繁索。Xstream也可以将JavaBean序列化成Json或
【渗透实战】某大学多站联动获取webshell
http://mp.weixin.qq.com/s?__biz=Mzg2ODYxMzY3OQ==&mid=2247504942&idx=1&sn=307f141d2a8a3da10abdd675243e6f07&chksm=ceab3f6ef9dcb6781488ddae5ce8d2614df3e75857c6271d6de68689d706ef291a8799c9c9ab&scene=0&xtrack=1#rd
https://buaq.net/go-194512.html
http://mp.weixin.qq.com/s?__biz=Mzg2ODYxMzY3OQ==&mid=2247504942&idx=1&sn=307f141d2a8a3da10abdd675243e6f07&chksm=ceab3f6ef9dcb6781488ddae5ce8d2614df3e75857c6271d6de68689d706ef291a8799c9c9ab&scene=0&xtrack=1#rd
https://buaq.net/go-194512.html
Weixin Official Accounts Platform
【渗透实战】某大学多站联动获取webshell
渗透实战,某大学多站联动获取webshell
红队安全攻防知识库
http://mp.weixin.qq.com/s?__biz=Mzg2ODYxMzY3OQ==&mid=2247504942&idx=2&sn=8ed932fb57a46fee94f30c7a43c94b76&chksm=ceab3f6ef9dcb678cb74c58333cbf46d64eba4c65f7af78ba5d1c64107c51e959e5c66ce1ece&scene=0&xtrack=1#rd
https://buaq.net/go-194513.html
http://mp.weixin.qq.com/s?__biz=Mzg2ODYxMzY3OQ==&mid=2247504942&idx=2&sn=8ed932fb57a46fee94f30c7a43c94b76&chksm=ceab3f6ef9dcb678cb74c58333cbf46d64eba4c65f7af78ba5d1c64107c51e959e5c66ce1ece&scene=0&xtrack=1#rd
https://buaq.net/go-194513.html
Weixin Official Accounts Platform
红队安全攻防知识库
红队安全攻防知识库,高质量安全攻防星球社区,致力于红蓝对抗,实战攻防,星球不定时更新内外网攻防渗透技巧,未公开或部分公开POC,最新研究成果等。常态化更新最新安全动态。
Building a Career in Cyber Security: The Biggest Lie
https://securityboulevard.com/2023/10/building-a-career-in-cyber-security-the-biggest-lie/
https://buaq.net/go-186669.html
https://securityboulevard.com/2023/10/building-a-career-in-cyber-security-the-biggest-lie/
https://buaq.net/go-186669.html
Security Boulevard
Building a Career in Cyber Security: The Biggest Lie
TL;DR: Cybersecurity is a complex and challenging field, and it's important to have realistic expectations about what it takes to get started. Don't believe the hype that you can become a cyber security expert overnight.
Enhancing DevOps Efficiency With ChatOps
https://hackernoon.com/enhancing-devops-efficiency-with-chatops?source=rss
https://buaq.net/go-187711.html
https://hackernoon.com/enhancing-devops-efficiency-with-chatops?source=rss
https://buaq.net/go-187711.html
Hackernoon
Enhancing DevOps Efficiency With ChatOps | HackerNoon
In this article, we will explore how ChatOps tools can be harnessed to supercharge your DevOps practices
Perfect Loader Implementations
https://securityboulevard.com/2023/10/perfect-loader-implementations/
https://buaq.net/go-188071.html
https://securityboulevard.com/2023/10/perfect-loader-implementations/
https://buaq.net/go-188071.html
Security Boulevard
Perfect Loader Implementations
Thank you to SpecterOps for supporting this research and to Lee and Sarah for proofreading and editing! Crossposted on GitHub.TLDR: You may use fuse-loader or perfect-loader as examples for extending an OS’s native loader to support in-memory libraries.Some…
Ekran System to Speak and Exhibit at SIM Boston Technology Leadership Summit
https://securityboulevard.com/2023/10/ekran-system-to-speak-and-exhibit-at-sim-boston-technology-leadership-summit/
https://buaq.net/go-188236.html
https://securityboulevard.com/2023/10/ekran-system-to-speak-and-exhibit-at-sim-boston-technology-leadership-summit/
https://buaq.net/go-188236.html
Security Boulevard
Ekran System to Speak and Exhibit at SIM Boston Technology Leadership Summit
Ekran System announces its participation in the SIM Boston Technology Leadership Summit, the premier single-day event for IT executives and solution providers. The summit takes place on October 25, 2023, at Gillette Stadium, 1 Patriot Pl, Foxborough, MA 02035…
Here’s Why You Can’t Wait to Buy a CIEM
https://securityboulevard.com/2023/10/heres-why-you-cant-wait-to-buy-a-ciem/
https://buaq.net/go-188237.html
https://securityboulevard.com/2023/10/heres-why-you-cant-wait-to-buy-a-ciem/
https://buaq.net/go-188237.html
Security Boulevard
Here’s Why You Can’t Wait to Buy a CIEM
Reading Time: 8 minutes You can’t wait to buy a Cloud Infrastructure Entitlements Management (CIEM) solution. Yes, we mean you can’t wait as in time is of the essence and critical threats are imminent, but we’ll leave room for the possibility that maybe…
Utilizing Artificial Intelligence Effectively in Cybersecurity
https://securityboulevard.com/2023/10/utilizing-artificial-intelligence-effectively-in-cybersecurity/
https://buaq.net/go-188269.html
https://securityboulevard.com/2023/10/utilizing-artificial-intelligence-effectively-in-cybersecurity/
https://buaq.net/go-188269.html
Security Boulevard
Utilizing Artificial Intelligence Effectively in Cybersecurity
Several AI approaches are used in cybersecurity, but it’s hard to make sense of the noise, especially when vendors say the same thing. In our newest eBook, we’ll explore what they are and the pros and cons of each one.