Quantcast
Channel: CodeSection,代码区,网络安全 - CodeSec
Browsing all 12749 articles
Browse latest View live

U.S. Mid-term Elections and Akamai Enterprise Threat Protector

The last few years have witnessed seismic changes in the world’s political landscape and the way elections have been conducted. As of yet, there’s no conclusive evidence that the results and outcomes...

View Article



Is Encryption an NTA / NIDS / NFT Apocalypse?

Here is a funny one: does pervasive traffic encryption KILL Network Traffic Analysis (NTA) dead? Well, OK, not truly “kill it dead,” but push it back to 2002 when it was called “N-BAD” [ “a...

View Article

Image may be NSFW.
Clik here to view.

BlackBerry Doubles Down on Security in $1.4B Acquisition of Cylance

BlackBerry aims to bring Cylance artificial intelligence and security tools into its software portfolio. BlackBerry has agreed to buy endpoint security firm Cylance for $1.4 billion cash in a deal...

View Article

Image may be NSFW.
Clik here to view.

DHS Task Force Moves Forward on Playbooks for Supply Chain Security

The public/private task force takes early steps toward securing the end-to-end supply chain. In July, the Department of Homeland Security(DHS) announced the formation of the Information Communications...

View Article

'Stay away from endpoint security' ―Here's why insiders say Blackberry's $1.4...

BlackBerry's $1.4 billion acquisition of Cylance marks a major milestone for the $5 billion company, as CEO John Chen executes further on his strategy to move the once-ubiquitous cellphone...

View Article


Image may be NSFW.
Clik here to view.

2018 EIS Web writeup

SimpleBBS http://bbs.sec.zju.edu.cn/ 题目解析: 1.登录处报错 2.导出burp的包使用sqlmap进行测试 sqlmap -r bbs.txt --dbs available databases [2]: [*] bbs [*] information_schema sqlmap -r bbs.txt -D "bbs" --tables Database:...

View Article

Image may be NSFW.
Clik here to view.

AWS Security Profiles: Steven Laino, Security Architect

In the weeks leading up to re:Invent , we’ll share conversations we’ve had with people at AWS who will be presenting at the event so you can learn more about them and some of the interesting work that...

View Article

Image may be NSFW.
Clik here to view.

Users Rate 'Creep Factor' in New Privacy-Security Product Guide

The Mozilla Foundation, the nonprofit organization behind the Firefox web browser, is expanding a campaign begun last year to help consumers buy safe, secure connected toys and mobile gadgets this...

View Article


Image may be NSFW.
Clik here to view.

More companies are chipping their workers like pets

Ah, security purposes, our favorite road to hell paved with some kind of intentions. Is it like when Facebook took people's phone numbers for security purposes and handed them to advertisers ? Sorry,...

View Article


Security Keys

Introduction Predictions of, and calls for, the end of passwords have been ringing through the press for many years now. The first instance of this that Google can find is from Bill Gates in 2004 ,...

View Article

Image may be NSFW.
Clik here to view.

Amazon tries to ruin infosec world's fastest-growing cottage industry:...

Amazon Web Services is taking steps to halt the epidemic of data leaks caused by the S3 cloud buckets it hosts from being accidentally left wide open to the internet by customers. Thus, if you are...

View Article

Image may be NSFW.
Clik here to view.

KeyChest Getting Rid of Broken Padlocks

print We all have seen it I go to visit an interesting blog, DEFCON website, or pay for your parking on the go. But I can’t the website or web service has an expired certificate and the “damn security...

View Article

Amazon shoppers can save $80 on an 8-piece Ring home security system right...

The Insider Picks team writes about stuff we think you'll like. Business Insider has affiliate partnerships, so we get a share of the revenue from your purchase. Amazon Amazon has kicked off its Black...

View Article


MiSafes' Child-Tracking Smartwatches Are 'Easy To Hack'

The location-tracking "MiSafe" smartwatch may not be as safe as the name proclaims. According to security researchers from Pen Test Partners, the watches are easy to hack as they do not encrypt the...

View Article

Image may be NSFW.
Clik here to view.

国际信息安全与数据协会主席庞韶宁教授:信息安全是一门数据科学

近年来,网络信息安全问题层出不穷,网络安全攻击也日趋规模化、自动化,安全检测的需求也由点向面扩展。以往业界去解决网路信息安全问题都是从技术角度出发,如今得益于AI的发展,我们看到更多网络安全界的小伙伴们独辟蹊径,想用人工智能搞定目前还没有解决的安全问题。但是到目前为止,新的人工智能技术还没有广泛应用的案例。...

View Article


Image may be NSFW.
Clik here to view.

StackOverFlow之Ret2libc详解

*本文作者:h1mmel,本文属 CodeSec 原创奖励计划,未经许可禁止转载。 0×00 前言 我的上一篇文章 《StackOverFlow之Ret2ShellCode详解》 谈到的栈溢出攻击方法是 ret2shellcode ,其主要思想就是控制返回地址使其指向 shellcode 所在的区域 。该技术能够成功的关键点在于: 1、程序存在溢出,并且还要能够控制返回地址...

View Article

Image may be NSFW.
Clik here to view.

iPhone X被黑客找到新漏洞 可恢复已删除照片

iPhone X被黑客找到新漏洞 可恢复已删除照片 分享到: 赵晋杰 2018-11-17 10:07:50 DoNews 11月17日消息(记者 赵晋杰)据The Verge报道,在最近举行的Pwn2Own黑客大会上,两名安全研究员Richard Zhu和Amat Cama发现了iPhone X的一项新漏洞。通过该漏洞,黑客能够让iPhone中已经被删除的照片重新出现。...

View Article


Image may be NSFW.
Clik here to view.

萌新科普 手把手教你如何用MSF进行后渗透测试

在对目标进行渗透测试的时候,通常情况下,我们首先获得的是一台web服务器的webshell或者反弹shell,如果权限比较低,则需要进行权限提升;后续需要对系统进行全面的分析,搞清楚系统的用途;如果目标处于一个内网环境中,那么我们就需要通过它对内网的其它终端进行信息收集和渗透测试,更全面地挖掘系统中存在的安全隐患。 本期安仔课堂,ISEC实验室的向老师为大家介绍如何使用MSF进行后渗透测试。...

View Article

Image may be NSFW.
Clik here to view.

威胁清单 | 全球500强企业弃用的Web应用存在安全隐患

前言 近日,一项针对全球领先企业所拥有的废弃网站进行的研究表明,老旧的Web应用程序需要进行正确地“退役”处理。否则,这些已被弃用很久的资源仍然会经常影响着企业安全,因为这些Web应用程序中具有可利用的漏洞和缺陷。 世界五百强企业的 web应用 旧金山安全公司High-Tech...

View Article

Image may be NSFW.
Clik here to view.

记一次渗透某市某局管理网站

一个月之前我提交了两个网站(都隶属于国家部门)的漏洞,很久没写渗透测试的文章了,冒着被抓的风险把渗透过程拿出来记录一下 图片肯定是要打码的,不然网警很快就来了..... 起因 一个月前,翻微信朋友圈的时候看到一条内容, xx市xx局举办xx活动 ,然后我点进去,进入了一个网站,是这个xx局的官网。当时我观察了一下发现这个网站感觉存在很多漏洞,于是就想试一下看能不能渗透进去。 渗透过程...

View Article
Browsing all 12749 articles
Browse latest View live




Latest Images