有些可能需要VPN访问,安全性方面自己多留意。
Office documents embedded with the DDE
VMware Escapology: How to Houdini the Hypervisor
Demystifying Windows Kernel Exploitation by Abusing GDI Objects
Porting Xbox360 executables to Windows
Protocol Extraction By Binary Execution
Executable and object file formats, debugging data formats
Allowing EDK-II Development (firmware development) with Visual Studio
PCI Express DIY hacking toolkit
ACM CCS 2017 Papers
Using Binary Diffing to Discover Windows Kernel Memory Disclosure Bugs
Abusing GDI for Ring0 Exploit Primitives: Evolution
A closer look at the CVE-2017-0263 privilege escalation vulnerability in Windows
Kernel Exploitation Case Study - "Wild" Pool Overflow on Win10 x64 RS2 (CVE-2016-3309 Reloaded)
Automated Triage and Root Cause Analysis of Memory Corruption Issues
Browser security beyond sandboxing
Chakra, dives into the enforcement of bounds checks in native JIT code
Micropatching a Hypervisor With Running Virtual Machines (CVE-2017-4924)
Hyper-V debugging for beginners. Part 2, or half disclosure of MS13-092
The Bug Or Feature Debate Is Back Yet Again: DDEAUTO Root Cause Analysis
A Bug Has No Name: Multiple Heap Buffer Overflows In the Windows DNS Client
https://www.bishopfox.com/blog/2017/10/a-bug-has-no-name-multiple-heap-buffer-overflows-in-the-windows-dns-client/
BlackOasis APT and new targeted attacks leveraging zero-day exploit (CVE-2017-11292)
Overview about a typical bank trojan
Malware reverse engineering examples
Playing with Dynamic symbolic execution
"Targeting" File Parsers with S2E and Kaitai Struct
Lifting Windows Driver Binaries into LLVM IR
Testing Intermediate Representations for Binary Analysis
Advanced Topics in Programming Languages
Memory Errors: The Past, the Present, and the Future
Predicting, Decrypting, and Abusing WPA2/802.11 Group Keys
Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2
A hacker, a hammer and two memory modules
Exploiting The Wi-Fi Stack on Apple Devices
Who Watch BIOS Watchers?
Reverse engineering of the Nitro OBD2
The First PS4 Kernel Exploit: Adieu
[注意]传递专业知识、拓宽行业人脉——看雪讲师团队等你加入!