Read, write, and execute kernel-mode code from the command prompt(对 ring0 读写执行的工具)
https://github.com/ionescu007/r0ak
Kernel memory taint tracking to detect disclosure of uninitialized memory(内核信息泄露检测)
https://github.com/google/bochspwn-reloaded
TrueType and OpenType font fuzzing toolset(字体 fuzzing)
https://github.com/google/BrokenType
Monitoring and instrumenting API calls on Windows(hook 库更新,支持 ARM64)
https://github.com/Microsoft/Detours
HyperPlatform is an Intel VT-x based hypervisor(基于 Intel VT-x 的 hypervisor)
https://github.com/tandasat/HyperPlatform
Hardware backdoors in some x86 CPUs(硬件后门)
https://github.com/xoreaxeaxeax/rosenbridge
Resources related to Industrial Control System (ICS) security(工控安全)
https://github.com/hslatman/awesome-industrial-control-system-security
Original and decompiled files of TRISIS/TRITON/HATMAN malware(工控恶意样本)
https://github.com/ICSrepo/TRISIS-TRITON-HATMAN
HITB GSEC 2018 Slides
https://gsec.hitb.org/materials/sg2018/
Linux Security Summit North America 2018 Slides
https://events.linuxfoundation.org/events/linux-security-summit-north-america-2018/program/slides/
From Compiler Optimization to Code Execution - VirtualBox VM Escape(VBox CVE-2018-2844 漏洞)
https://www.voidsecurity.in/2018/08/from-compiler-optimization-to-code.html
Hyper-V HyperClear Mitigation for L1 Terminal Fault(L1TF 漏洞防护措施)
https://blogs.technet.microsoft.com/virtualization/2018/08/14/hyper-v-hyperclear/
Hypervisor From Scratch – Part 1: Basic Concepts & Configure Testing Environment(基于硬件的虚拟化)
https://rayanfam.com/topics/hypervisor-from-scratch-part-1/
Floating-Poison Math in Chakra(Chakra CVE-2018-0953 漏洞)
https://www.zerodayinitiative.com/blog/2018/8/22/floating-poison-math-in-chakra
The Problems and Promise of WebAssembly(WebAssembly 的特性及攻击面)
https://googleprojectzero.blogspot.com/2018/08/the-problems-and-promise-of-webassembly.html
A Modern History of Offensive Security Research, Slides(漏洞利用技术的发展)
https://docs.google.com/presentation/d/19HfkIojyLE8L8X8aZT-lJont96JqIg4PqEhb2juIK2c/
Block Oriented Programming: Automating Data-Only Attacks(CFI 保护绕过)
http://nebelwelt.net/publications/files/18CCS.pdf
Find which process is using the microphone, from a kernel-mode driver(查找使用麦克风的进程)
https://gracefulbits.com/2018/08/13/find-which-process-is-using-the-microphone-from-a-kernel-mode-driver/
The 35th International Conference on Machine Learning, papers(ICML 2018 的论文)
https://icml.cc/Conferences/2018/Schedule?type=Poster
Active Directory Security Presentations(有关 Active Directory 的资料)
https://adsecurity.org/?page_id=1352
Bokbot: The (re)birth of a banker(Bokbot 溯源)
https://blog.fox-it.com/2018/08/09/bokbot-the-rebirth-of-a-banker/
Analysis of an unusual Turla backdoor(Turla Outlook 后门分析)
https://www.welivesecurity.com/wp-content/uploads/2018/08/Eset-Turla-Outlook-Backdoor.pdf
BIOS Boots What? Finding Evil in Boot Code at Scale(Bootkit 检测)
https://www.fireeye.com/blog/threat-research/2018/08/bios-boots-what-finding-evil-in-boot-code-at-scale.html
Remote UEFI Firmware Attacks(UEFI 固件安全)
https://blog.eclypsium.com/2018/08/27/uefi-remote-attacks
算上这期恰好两年,当然,整理的内容并不全面,希望能有帮助。
Everything that is great starts small.
[培训]内核驱动高级班,冲击BAT一流互联网大厂工作,每周日13:00-18:00直播授课
cvcvxk 是0x1A吧,不是0xFF吓得的我以为自己错过了230篇
BDomne 这里是表意最后一期,初衷是想记录些有用的内容,两年小目标也算实现了
cvcvxk 不应该是\0\0结尾吗?