Aggregator
域渗透-How2PwnACLs
2 years 5 months ago
该挑战需要在已有一个域凭据的情况下,全程通过远程操作完成一些ACL滥用相关的利用。
Akamai Announces Advanced Bot Detections, Global Recognition of Entities
2 years 5 months ago
Christine Ferrusi Ross
基于失败测试用例相似性的补丁正确性预测
2 years 5 months ago
原文标题:Sredicting Patch Correctness Based on the Similar
基于失败测试用例相似性的补丁正确性预测
2 years 5 months ago
原文标题:Sredicting Patch Correctness Based on the Similar
基于失败测试用例相似性的补丁正确性预测
2 years 5 months ago
原文标题:Sredicting Patch Correctness Based on the Similar
写了一个测爬虫能力的靶场,因为目前leveryd-asm的爬虫能力是基于katana,就测试了一下,结果看到很多场景里目前katana还不能解析页面中的链接。 测试的结果:https://github.com/projectdiscovery/katana/issues/415 爬虫靶场项目:https://github.com/leveryd-asm/crawler-test
2 years 5 months ago
写了一个测爬虫能力的靶场,因为目前leveryd-asm的爬虫能力是基于katana,就测试了一下,结果看到很多场景里目前katana还不能解析页面中的链接。 测试的结果:https://github.com/projectdiscovery/katana/issues/415 爬虫靶场项目:https://github.com/leveryd-asm/crawler-test
2 years 5 months ago
写了一个测爬虫能力的靶场,因为目前leveryd-asm的爬虫能力是基于katana,就测试了一下,结果看到很多场景里目前katana还不能解析页面中的链接。 测试的结果:https://github.com/projectdiscovery/katana/issues/415 爬虫靶场项目:https://github.com/leveryd-asm/crawler-test
2 years 5 months ago
写了一个测爬虫能力的靶场,因为目前leveryd-asm的爬虫能力是基于katana,就测试了一下,结果看到很多场景里目前katana还不能解析页面中的链接。 测试的结果:https://github.com/projectdiscovery/katana/issues/415 爬虫靶场项目:https://github.com/leveryd-asm/crawler-test
2 years 5 months ago
写了一个测爬虫能力的靶场,因为目前leveryd-asm的爬虫能力是基于katana,就测试了一下,结果看到很多场景里目前katana还不能解析页面中的链接。 测试的结果:https://github.com/projectdiscovery/katana/issues/415 爬虫靶场项目:https://github.com/leveryd-asm/crawler-test
2 years 5 months ago
Small Business is a Big Priority: NIST Expands Outreach to the Small Business Community
2 years 5 months ago
Did you know that 99.9% of businesses in America are small businesses? [1] Small businesses are a major source of innovation for our country—but they’re often faced with limited resources and budgets. Many of them need cybersecurity solutions, guidance, and training so they can cost-effectively address and manage their cybersecurity risks. Hmmm…where can you find guidance like this all in one place? Voila! The Small Business Cybersecurity Corner ! This website was created by NIST in 2019 in response to the NIST Small Business Cybersecurity Act, which directed us to “disseminate clear and
Kristina Rigopoulos, Daniel Eliot
主动测绘技术在数字安全领域的应用探索和实践
2 years 5 months ago
添加管理员微信号:quake_360,邀您加入技术交流群~
东软智能网联汽车信息信息安全解决方案亮相上海车展
2 years 5 months ago
4月18日,东软集团携全线产品阵容亮相2023年上海车展。
东软智能网联汽车信息信息安全解决方案亮相上海车展
2 years 5 months ago
4月18日,东软集团携全线产品阵容亮相2023年上海车展。
东软智能网联汽车信息信息安全解决方案亮相上海车展
2 years 5 months ago
4月18日,东软集团携全线产品阵容亮相2023年上海车展。
Weblogic CVE-2023-21931 漏洞挖掘技巧:后反序列化利用
2 years 5 months ago
CVE-2023-21931、CVE-2023-201839 在 Goby 已支持回显和反弹 shell
10 Things You Could Do With Your Time Instead of Triaging a False Positive Alert
2 years 5 months ago
GreyNoise can help SOC teams reduce false positives by providing context to the alerts on internet-wide scanners, crawlers, and other suspicious activity that may trigger false alarms. So what can you do with ~8+ hours of your life back each week?
Bring Your Own Backdoor: How Vulnerable Drivers Let Hackers In
2 years 5 months ago
Bring Your Own Vulnerable Driver (BYOVD) techniques are not new; they can be traced back at least as far as 2012 and the Shamoon wiper that targeted Saudi Aramco. The attack used RawDisk driver, which could manipulate hard drives from user space without any special permissions. This access enabled the malicious actor to erase data … Continued
The post Bring Your Own Backdoor: How Vulnerable Drivers Let Hackers In appeared first on VMware Security Blog.
Dana Behling
Phishing: The Oldest and Wisest Attack Vector
2 years 5 months ago
Jim Black & Or Katz