网络安全笔记
7.43K subscribers
109 photos
3 videos
571 files
642 links
从零开始、持续积累、开放共享、共同成长(网络安全、AI方向)
Download Telegram
34-Barak Sternberg - Extension Land: Exploits and Rootkits in Your Browser Extensions

https://www.youtube.com/watch?v=PpSftQuCEDw

35-Austin Allshouse - The Mechanics of Compromising Low Entropy RSA Keys

https://www.youtube.com/watch?v=BRsXsUEIU70

36-Rion Carter - Why does my security camera scream like a Banshee?

https://www.youtube.com/watch?v=JpL3lySZNeM

37-Kelly Kaoudis, Sick Codes - Rotten code, aging standards, & pwning IPv4 parsing

https://www.youtube.com/watch?v=_o1RPJAe4kU

38-Zhipeng Huo, Yuebin Sun, Chuanda Ding - Reveal and Exploit IPC Logic Bugs in Apple-@onhex_ir

https://www.youtube.com/watch?v=oAMZxKsZQp0

39-Tom Van Goethem, Mathy Vanhoef - Timeless Timing Attacks

https://www.youtube.com/watch?v=s5w4RG7-Y6g

40-Tianze Ding - Vulnerability Exchange: One Domain Account For More Than Exchange Server

https://www.youtube.com/watch?v=7h38rI8KT30

41-Thomas Roth - Hacking the Apple AirTags

https://www.youtube.com/watch?v=paxErRRsrTU

42-Tamas K Lengyel - Fuzzing Linux with Xen

https://www.youtube.com/watch?v=_dXC_I2ybr4

43-Slava Makkaveev - I know how to take over your Kindle with an e-book

https://www.youtube.com/watch?v=1jM_r-pe8Ss

44-Seth Kintigh - OTA remote code execution on the DEF CON 27 badge via NFMI

https://www.youtube.com/watch?v=sDCIjcUEFj0

45-Salvador Mendoza - PINATA PIN Automatic Try Attack

https://www.youtube.com/watch?v=VOIvEqjJNOY

46-Mickey Shkatov, Jesse Michael - High Stakes Updates: BIOS RCE OMG WTF BBQ

https://www.youtube.com/watch?v=qxWfkSonK7M

47-Michael Whiteley Katie Whiteley - Making the DEF CON 29 Badge-@onhex_ir

https://www.youtube.com/watch?v=H3kdq40PY3s

48-Martin Doyhenard - Response Smuggling: Pwning HTTP 1 1 Connections

https://www.youtube.com/watch?v=suxDcYViwao

49-Jiska, Alexander Heinrich - Wibbly Wobbly, Timey Wimey Whats Inside Apples U1 chip

https://www.youtube.com/watch?v=k1H7fiVlTPA

50-Ionut Cernica - Hack the hackers Leaking data over SSL TLS

https://www.youtube.com/watch?v=WNXEuFaRUkU

51-Dan Petro - You're Doing IoT RNG

https://www.youtube.com/watch?v=Zuqw0-jZh9Y

52-Agent X - A look inside security at the New York Times

https://www.youtube.com/watch?v=U2-8MNx8nsg

53-Zabrocki, Matrosov - Glitching RISC-V chips: MTVEC corruption for hardening ISA

https://www.youtube.com/watch?v=iz_Y1lOtX08

54-Claire Vacherot - Sneak into buildings with KNXnetIP

https://www.youtube.com/watch?v=QofeTV39kQE

55-Ian Vitek - Central Bank Digital Currency, Threats and Vulnerabilities

https://www.youtube.com/watch?v=-MK0bn3Ys_M

56-Dennis Giese - Robots with lasers and cameras but no security Liberating your vacuum

https://www.youtube.com/watch?v=EWqFxQpRbv8

57-Yuhao Weng, Steven Seeley, Zhiniang Peng - An Attack Surface Tour of SharePoint Server

https://www.youtube.com/watch?v=mVXrl4W1jOU

58-Guillaume Fournier, Sylvain Afchain, Sylvain Baubeau - eBPF, I thought we were friends!

https://www.youtube.com/watch?v=5zixNDolLrg

59-Eugene Lim, Glenice Tan, Tan Kee Hock - Hacking Humans with AI as a Service

https://www.youtube.com/watch?v=tWWhRbzhkrg

60-Dimitry 'Op Nomad' Snezhkov - Use of Offensive Enclaves In Adversarial Operations

https://www.youtube.com/watch?v=WWGkaGBtn2Q

61-Dimitry 'Op Nomad' Snezhkov - Racketeer Toolkit: Prototyping Controlled Ransomware Ops

https://www.youtube.com/watch?v=VJ8aqReB118

62-Vivek Nair - Time Turner Hacking RF Attendance Systems To Be in Two Places at Once

https://www.youtube.com/watch?v=NdAIeXy2zoY
#蓝队工具 恶意软件模拟工具
The DFIR Report
Linux 持久化部分
【纪实】《古老的罪恶:全国妇女大拐卖纪实》本书是一部长篇纪实文学,反映了八十年代中国内地各省市发生的买卖妇女的问题,读完之后很难一下子回到人们以为的当代文明。在现实的男人世界里,女人却完全是另外一回事。 她们是传宗接代的工具; 是男人的享乐品; 是做饭洗衣服的保姆, 是可以任意支配、奴役,用来衬托大男人威风的奴隶; 是可以用钱买卖,更换的物品。比盲山更可怕的恐怖故事集,可以从语言中看出作者的愤懑,作为读者也会看得毛骨悚然。
【纪实】《中统特务实录》作者行文稍显稚嫩。中统在解放前一度成为暗杀、破坏和臭名昭著的代名词,它作为国民党的特务机构,神秘莫测又令人恐惧。中统的前身是1928年陈立夫组建的党务调查科。在中统历史上最重要也是掌权时间最长的特务头子,就是徐恩曾,他执掌中统十多年,是整个中统帝国名正言顺的缔造者。本书从成员、事件、组成,架构多个方面深度解读中统内幕,多角度、多切入点地解释了总舵鲜为之人的历史真相。本书还配入大量手绘插画,形象真实地再现了那段历史下中统的众生相。