Reference Library
26.5K subscribers
1K photos
122 videos
343K files
10.3K links
کتابخانه مرجع
مرجع تخصصی کتاب

لینک چنل آرشیو کتب:
@BOOKzMA
Download Telegram
evil_plc_attack.pdf
610.9 KB
#SCADA_Security
"Evil PLC Attack: Using a Controller as Predator Rather than Prey", 2022.
]-> https://claroty.com/team82/research/evil-plc-attack-using-a-controller-as-predator-rather-than-prey
📰
📚
Practical_Symbolic_Engine.pdf
10.4 MB
#Malware_analysis
BlackHat USA 2022:
"Using a Practical Symbolic Engine to Detect Evasive Forms of Malware/Ransomware"
📰
📚
Invisible_Finger.pdf
2.3 MB
#Research
"Invisible Finger: Practical Electromagnetic Interference Attack on Touchscreen-based Electronic Devices", 2022.
📰
📚
Breaking_Firmware_Trust_From_Pre-EFI.pdf
9.4 MB
#Hardware_Security
"Breaking Firmware Trust From Pre-EFI: Exploiting Early Boot Phases"

]-> Community FwHunt Scanner:
https://github.com/binarly-io/fwhunt-scan
]-> FwHunt detection rules:
https://github.com/binarly-io/FwHunt/tree/main/rules
📰
📚
race_against_sandbox.pdf
1.9 MB
#Whitepaper
"Race against the Sandbox", 2022.

// Root cause analysis of a Tianfu Cup bug to escape the Google Chrome sandbox (CVE-2022-21881).
📰
📚
asa_trojans.pdf
6.4 MB
#Hardware_Security
BlackHat USA 2022:
"Do Not Trust the ASA, Trojans!"

]-> Cisco ASA Software and ASDM Security Research:
https://github.com/jbaines-r7/cisco_asa_research

📰
📚
Backdooring_hijacking_AzureAD_accounts.pdf
2.2 MB
#Cloud_Security
#Offensive_security
BlackHat USA 2022:
"Backdooring and Hijacking Azure AD Accounts by Abusing External Identities"
📰
📚
Pulling_Psw_out_of_Configuration_Mng.pdf
8.5 MB
#tools
#Offensive_security
"Pulling Passwords out of Configuration Manager: Practical Attacks against Microsoft's Endpoint Management Software", 2022.

]-> PXEThief - set of tooling that can extract passwords from the OS Deployment functionality in MS Endpoint Conf. Manager:
https://github.com/MWR-CyberSec/PXEThief
📰
📚
SSH_Analysis.pdf
506.6 KB
#Research
"Oh SSH-it, what's my fingerprint? A Large-Scale Analysis of SSH Host Key Fingerprint Verification Records in the DNS", 2022.
📰
📚
comrace.pdf
923.3 KB
#Research
"COMRACE: Detecting Data Race Vulnerabilities in COM Objects", 2022.

]-> Slides (.pdf): https://www.usenix.org/system/files/sec22_slides-gu-fangming.pdf

📰
📚
JSSLoader.pdf
3.4 MB
#Malware_analysis
"JSSLoader: the shellcode edition", 2022.

📰
📚
Detect_kernel_exploits.pdf
1 MB
#Offensive_security
BlackHat USA 2022:
"Return to sender - Detecting kernel exploits with eBPF"

]-> Tool: https://github.com/Gui774ume/krie
📰
📚
Attack_Bluetooth_Mesh.pdf
7.7 MB
#WLAN_Security
BlackHat USA 2022:
"New Attack Surfaces of Bluetooth Mesh"
📰
📚
DB_Security.pdf
14.7 MB
#Tech_book
"Database Security: Problems and Solutions", 2022.
📰
📚
Save_the_Environment.pdf
3.1 MB
#Research
"Save The Environment (Variable):
Hijacking Legitimate Applications With a Minimal Footprint", DEF CON 30.
]-> https://www.wietzebeukema.nl/blog/save-the-environment-variables
📰
📚