#security #hack #virus MIT Tech Review 提到的 IoT 僵尸网络,去年DDoS FB, Twitter 元凶 https://github.com/jgamblin/Mirai-Source-Code
GitHub
GitHub - jgamblin/Mirai-Source-Code: Leaked Mirai Source Code for Research/IoC Development Purposes
Leaked Mirai Source Code for Research/IoC Development Purposes - jgamblin/Mirai-Source-Code
#security #hack #virus MIT Tech Review 提到的 IoT 僵尸网络,去年DDoS FB, Twitter 元凶 https://github.com/jgamblin/Mirai-Source-Code
GitHub
GitHub - jgamblin/Mirai-Source-Code: Leaked Mirai Source Code for Research/IoC Development Purposes
Leaked Mirai Source Code for Research/IoC Development Purposes - jgamblin/Mirai-Source-Code
https://en.wikipedia.org/wiki/Return-to-libc_attack return to libc attack 也就是现在所说的 ROP,在 CTF 里是个很常见的攻击?因为 Memory 有 (DEP, or data execution prevention, means that you can't run code from anywhere you want anymore),再加 stack 的 ramdomization, Buffer overflow 攻击就基本杜绝注入攻击了。但 ROP 还是可以的 #security #system
Wikipedia
Return-to-libc attack
computer security attack in which a subroutine return address on a call stack is replaced by an address of a subroutine already present in executable memory, bypassing the no-execute bit
https://whereismydata.wordpress.com/2009/06/01/forensics-what-is-the-bitmap/ hey where is your data! INI security还有一个专门的取证课 Forensics #data #filesystem #bitmap #security
Where is Your Data?
Forensics: What is the $BitMap?
The $BitMap is a special file within the NTFS file system. This file keeps track of all of the used and unused clusters on an NTFS volume. When a file takes up space on the NTFS volume the location…
https://azure.microsoft.com/en-us/blog/microsoft-introduces-steps-to-improve-internet-routing-security/ how Azure protect BGP #BGP #security
Microsoft Azure Blog
Microsoft introduces steps to improve internet routing security | Microsoft Azure Blog
The internet runs on the Border Gateway Protocol (BGP). A network or autonomous system (AS) is bound to trust, accept, and propagate the routes advertised by its peers without questioning its provenance.
https://robertheaton.com/2020/04/27/how-does-a-tcp-reset-attack-work/ Nice article about TCP RST attack #network #security
Robert Heaton
How does a TCP Reset Attack work? | Robert Heaton
A TCP reset attack is executed using a single packet of data, no more than a few bytes in size. A spoofed TCP segment, crafted and sent by an attacker, tricks two victims into abandoning a TCP connection, interrupting possibly vital communications between…
http://phrack.org/issues/70/3.html Attacking JavaScript Engines with CVE-2016-4622 #security #browsersecurity #hacking #JS #JSEngine
www.phrack.org
.:: Phrack Magazine ::.
Phrack staff website.
https://portswigger.net/daily-swig/path-confusion-web-cache-deception-threatens-user-information-online Cache deception attack #cache #security #cachedeception
The Daily Swig | Cybersecurity news and views
Path confusion: Web cache deception threatens user information online
New study finds top ranked sites susceptible to WCD attacks