
腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Others ] 理解 CPU port contention: https://dendibakh.github.io/blog/2018/03/21/port-contention
-
[ Pentest ] DSCompromised:利用 Windows DSC 进行横向渗透的利用脚本: https://github.com/matthastings/DSCompromised
-
[ Pentest ] Web 应用渗透测试指南: https://jdow.io/blog/2018/03/18/web-application-penetration-testing-methodology/
-
[ SecurityAdvisory ] Apache httpd 2.4 漏洞一览: https://httpd.apache.org/security/vulnerabilities_24.html
-
[ Tools ] SDQAnalyzer - Saleae Logic 分析器的 SDQ 协议分析插件: https://github.com/nezza/SDQAnalyzer
-
-
[ Web Security ] JSON Web Token 安全性研究: https://www.slideshare.net/snyff/jwt-insecurity
-
[ Windows ] 如何在 16 个字节内绕过 Windows CFG 控制流保护,来自 BlackHat Asia 2018: https://www.blackhat.com/docs/asia-18/asia-18-Lain-Back-To-The-Epilogue-How-To-Evade-Windows-Control-Flow-Guard-With-Less-Than-16-Bytes.pdf