阿里云安全专家,主要负责阿里云云产品安全。
http://blog.nsfocus.net/dns-ddos-attack-analysis/#0-tsina-1-31219-397232819ff9a47a7b7e80a40613c...
HP: HP Application Defender WARATEK: Application Security for Java OWASP: AppSensor Shandowd: S...
https://github.com/google/grr-doc/blob/master/publications.
www.digitalocean.com
从技术出发,做些共享和讨论的少、从公司、产品出发,互喷的多、知识产权保护也不好,真搞了点啥,想搞点啥也不能说。
http://ascc.sinica.edu.tw/iascc/articals.php?_section=2.4&_op=?articalID:6435 壹、 前言 現今組織越來越需要擁有蒐集網路威脅情報 (Cyber Threat Intelligence) 的能力,並且要有足夠的情報分享能力,以能夠與其信任夥伴分享網路威脅情報,足以共同防禦網路威脅。
https://wiki.gentoo.org/wiki/Hardened/Toolchain
http://www.rsaconference.com/events/ap15/downloads-and-media?keywords=&track=&type=presentation...
iceatea launchpad
本文首先感谢 Apple 开发者论坛的eskimo1,他是我见过的最热心肠的人,对任何人他都不吝于给予无私帮助。
https://github.com/simp
http://www.crowdstrike.com/beyond-malware-how-to-detect-and-respond-to-malware-free-intrusions/...
http://www.nist.gov/cyberframework/cybersecurity-framework-industry-resources.
https://saas.hp.com/zh-cn/software/application-defender/details 核心技术就是javaagent的机制 ...
http://www.securitytube.net/video/13184 http://www.
http://blog.malwaremustdie.org/2015/04/mmd-0031-2015-what-is-netwire-rat.
https://www.youtube.com/watch?v=UVYnVELzJk4 使用的工具: dns2tcp dnscat iodine NSTX Ozymandns loopcV...
http://lqdc.github.io/using-machine-learning-to-name-malware.
https://twitter.com/dhialite https://www.youtube.
http://www.mal-content.org/blog/automating-malware-analysis-with-cuckoo-sandbox-part-2-setup https://www.
http://www.oschina.net/search?scope=project&q=mahout spark mllab ...
http://securitytrainings.net/hunting-rootkit-dark-corners-memory/ http://securitytrainings.
Hello, During a recent assessment I have stumbled across a system which had hwclock(8) setuid ...
https://www.youtube.com/user/RSAConference/playlists
【参考:攻击分析模型】 1. 初期规模 1) 意外打开事前知道已感染的文件 2) 数字设备感染 3) 随机发生的浏览器被攻击事件 4) 因使用社交网络SNS而被感染 5) 服务器端遭受攻击...
http://sourceforge.net/p/sansfor572logstash/wiki/Home/ https://www.
讲解的是NSM http://www.irongeek.com/i.php?page=videos/bsidesknoxville2015/103-finding-bad-guys-with...
We've rounded up five open source SDN controllers to get to know.
http://www.sans.org/reading-room/whitepapers/wireless/80211-network-forensic-analysis-33023 ...
http://www.irongeek.com/i.php?page=videos/bsidessf2015/112-lessons-learned-from-building-and-r...
https://labs.opendns.com/blog/page/2/
http://memory-analysis.rekall-forensic.com/www/TOC/
http://hackerhurricane.blogspot.com/2015/05/defending-against-powershell-shells.
1. bypass waf https://github.com/CoolerVoid/payloadmask 2.
http://www.trustedsec.com/may-2015/new-tool-the-pentesters-framework-ptf-released/ New Tool:...
http://blog.didierstevens.com/programs/oledump-py/
https://www.percona.com/software/percona-xtrabackup
https://www.ted.com/talks?language=zh-tw&topics%5B%5D=technology&sort=newest ...
https://www.brighttalk.com/community/it-security/summit/securityanalyticsfeb2015 ...
https://www.concise-courses.com/hacking-tools/?inf_contact_key=0650a9cf7774b3b3fb3099a578c49a0...
http://www.xhedu.org/sites/xxgk/template/detail.
https://www.brighttalk.com/webcast/8241/150227
http://blog.malerisch.net/2015/04/pwning-hp-thin-client.
http://www.securitytube.net/video/13124
http://maecproject.github.io/ http://maec.mitre.org/
1. vm detection cpuid instruction result redpill(LDT/GTD and IDT incongruousness) Cardinal pil...
这个创意可以结合公司的资产列表发现公司的威胁。 https://www.scaprepo.com/
https://www.sans.org/webcasts/for572-network-forensics-preview-alive-investigating-network-base...
https://www.alienvault.com/resource-center#content_webcast ...
http://inteltechniques.com/stripe.html