http://esevece.github.io/2016/06/01/taking-over-heroku-accounts.html
接管Heroku账号
https://www.nccgroup.trust/globalassets/our-research/us/whitepapers/2016/june/container_whitepaperpdf/
linux容器的权限和非权限的滥用
https://bogner.sh/2016/03/mitm-attack-against-keepass-2s-update-check/
通过中间人攻击,可以在keepass更新时,获取明文
http://blog.talosintel.com/2016/06/ropmemu.html
ROPMEMU:分析代码重用攻击的框架
https://grsecurity.net/SSTIC2016.pdf
SSTIC 2016 KEYNOTE
http://www.phdays.com/program/
phdays会议PPT开始提供下载
https://github.com/ANSSI-FR/polichombr
polichombr:恶意软件协同分析框架
https://github.com/wg/arc
用GO编写的安全文件打包程序
https://github.com/gentilkiwi/mimikatz/releases
mimikatz 20160602 (oe.eo) edition 发行
https://adaclscan.codeplex.com/
ADACLScan4.3.ps1 发行
https://olivierbeg.com/finding-xss-vulnerabilities-in-flash-files/
如果在flash文件中寻找xss漏洞
https://cyber-defense.sans.org/blog/2016/06/01/powershell-function-to-send-udp-syslog-message-packets
使用powershell发送udp syslog消息包
https://blogs.technet.microsoft.com/windowsserver/2016/05/26/securing-privileged-access-preventing-and-detecting-attacks/
为什么说权限访问重要:阻止和检测攻击
http://bitcoinist.net/sandjacking-ios-bitcoin-ethereum/
Sandjacking ios利用威胁比特币钱包
https://isc.sans.edu/diary/21123
针对DSHELL的网络取证第二部分
http://blog.securelayer7.net/mongodb-security-injection-attacks-with-php/
MongoDB安全,php中的注入攻击
http://www.slideshare.net/phdays/ss-62570233
WAF绕过
本文由 360安全播报 原创发布,如需转载请注明来源及本文地址。本文地址:http://bobao.360.cn/news/detail/3121.html