• 资料收集


    1. https://github.com/1u4nx/Exploit-Exercises-Nebula
    2. c内存管理:http://www.inf.udec.cl/~leo/teoX.pdf
    3. 用Windbg和Python进行堆跟踪:http://www.freebuf.com/articles/system/103816.html
    4. Python和cdb结合案例(Python编写调试器):http://www.freebuf.com/sectool/89001.html
    5. 绕过security cookie的栈利用:https://www.zerodayinitiative.com/blog/2017/8/9/the-blue-frost-security-challenge-an-exploitation-journey-for-fun-and-free-drinks
    6. https://www.zerodayinitiative.com/blog/2017/8/1/pythonizing-the-vmware-backdoor
    7. Debugee in QEMU:http://bobao.360.cn/learning/detail/4265.html
    8. Digtool: A Virtualization-Based Framework for Detecting Kernel Vulnerabilities:https://www.usenix.org/system/files/conference/usenixsecurity17/sec17-pan.pdf:结合虚拟化技术实现客户机系统调用/线程调度/内存访问监控,可以发现Unprobe/OOB/UAF/TOCTTOU漏洞。
    9. Qemu安全分析,360 in hitb:https://gsec.hitb.org/materials/sg2017/D1%20-%20Ashley%20Shen%20and%20Moonbeom%20Park%20-%20A%20Deep%20Dive%20into%20the%20Digital%20Weapons%20of%20the%20North%20Korean%20Cyber%20Army.pdf
    10. https://comsecuris.com/blog/posts/vmware_vgpu_shader_vulnerabilities/

    工具

    https://www.ctftools.com/down/

    Fuzzing Apache httpd server with American Fuzzy Lop + persistent mode

    https://sensepost.com/blog/2017/fuzzing-apache-httpd-server-with-american-fuzzy-lop-+-persistent-mode/

    vulscan - Vulnerability Scanning with Nmap:https://github.com/scipag/vulscan

    Bytecode Viewer - A Java 8 Jar & Android Apk Reverse Engineering Suite (Decompiler, Editor, Debugger & More):http://www.kitploit.com/2017/08/bytecode-viewer-java-8-jar-android-apk.html?m=1

    MTuner is a C/C++ memory profiler and memory leak finder for Windows:https://github.com/milostosic/MTuner

  • 相关阅读:
    【mysql中文乱码】-解决方式
    【URL带参跳转乱码】-解决方式
    【IP地址租约到期】-解决方式
    【Vue-入门笔记-5】
    【Vue-入门笔记-4】
    输入框中的空"",0,null的判断
    让页面以黑白页面显示
    select设置text的值选中(兼容ios和Android)基于jquery
    js中关于两个变量的比较
    css3 动画 总结
  • 原文地址:https://www.cnblogs.com/studyskill/p/6524439.html
Copyright © 2020-2023  润新知