《Software Engineering at Google》的中英文对译版本。
在线阅读 https://qiangmzsx.github.io/Software-Engineering-at-Google
在线阅读 https://qiangmzsx.github.io/Software-Engineering-at-Google
qiangmzsx.github.io
Software Engineering at Google
Description
👍1
macOS 红队涉及模拟 macOS 环境中的网络攻击,以识别漏洞、评估安全态势并改进防御措施。此过程包含各种技术、工具和方法,旨在模仿现实世界对手的战术、技术和程序 (TTP)。
https://redteamrecipe.com/macos-red-teaming#heading-gathering-system-information-using-ioplatformexpertdevice
https://redteamrecipe.com/macos-red-teaming#heading-gathering-system-information-using-ioplatformexpertdevice
ExpiredDomains.com
redteamrecipe.com is for sale! Check it out on ExpiredDomains.com
Buy redteamrecipe.com for 195 on GoDaddy via ExpiredDomains.com. This premium expired .com domain is ideal for establishing a strong online identity.
cve-2024-7646 Ingress-nginx 注释验证绕过
https://github.com/kubernetes/kubernetes/issues/126744
https://www.armosec.io/blog/cve-2024-7646-ingress-nginx-annotation-validation-bypass/
https://github.com/kubernetes/kubernetes/issues/126744
https://www.armosec.io/blog/cve-2024-7646-ingress-nginx-annotation-validation-bypass/
GitHub
CVE-2024-7646: Ingress-nginx Annotation Validation Bypass · Issue #126744 · kubernetes/kubernetes
CVSS Rating: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H A security issue was discovered in ingress-nginx where an actor with permission to create Ingress objects (in the networking.k8s.io or exte...
Windows 更新日志文件详解,原始ETL格式文件可通过 Get-WindowsUpdateLog命令进行转储
https://learn.microsoft.com/en-us/windows/deployment/update/windows-update-logs
https://learn.microsoft.com/en-us/windows/deployment/update/windows-update-logs
👍2
攻击者如何进行持久化以及如何查找-Linux部分
https://www.elastic.co/security-labs/primer-on-persistence-mechanisms
https://www.elastic.co/security-labs/primer-on-persistence-mechanisms
www.elastic.co
Linux Detection Engineering - A primer on persistence mechanisms — Elastic Security Labs
In this second part of the Linux Detection Engineering series, we map multiple Linux persistence mechanisms to the MITRE ATT&CK framework, explain how they work, and how to detect them.
👍1
解码 Stealthy Memory-Only 恶意软件
https://cloud.google.com/blog/topics/threat-intelligence/peaklight-decoding-stealthy-memory-only-malware/
https://cloud.google.com/blog/topics/threat-intelligence/peaklight-decoding-stealthy-memory-only-malware/
Google Cloud Blog
PEAKLIGHT: Decoding the Stealthy Memory-Only Malware | Google Cloud Blog
Mandiant identified a new memory-only dropper using a complex, multi-stage infection process.
Internal of Malice(恶联网) 力图实现一套post-exploit基础设施, 在兼容CS,MSF,Sliver生态的同时, 提供更高的拓展性与隐蔽性, 并提供一套工程化的解决方案.
https://chainreactors.github.io/wiki/IoM/
https://chainreactors.github.io/wiki/IoM/
chainreactors.github.io
Internal of Malice · index - ChainReactor Wiki
chainreactors wiki
一体化实战漏洞运营体系建设实践--具备内外、总分一致性的资产漏洞运营体系的建设实践
https://mp.weixin.qq.com/s/xsT_KZQsP1-9l0toKQ4_9A
https://mp.weixin.qq.com/s/xsT_KZQsP1-9l0toKQ4_9A