Crypto_Crime_Report_2022.pdf
4.4 MB
#Analytics
"The 2022 Crypto Crime Report"
Original data and research into cryptocurrency-based crime, 2022.
t.iss.one/Library_Sec
"The 2022 Crypto Crime Report"
Original data and research into cryptocurrency-based crime, 2022.
t.iss.one/Library_Sec
EmissaryPanda.pdf
1.7 MB
#Analytics
#Blue_Team
"The APT fallout of vulnerabilities such as ProxyLogon in Exchange (Hafnium), OGNL injection, and log4shell", 2022.
]-> https://www.hvs-consulting.de/en/threat-intelligence-report-emissary-panda-apt27
t.iss.one/Library_Sec
#Blue_Team
"The APT fallout of vulnerabilities such as ProxyLogon in Exchange (Hafnium), OGNL injection, and log4shell", 2022.
]-> https://www.hvs-consulting.de/en/threat-intelligence-report-emissary-panda-apt27
t.iss.one/Library_Sec
SNPSFuzzer.pdf
1.3 MB
#Research
"SNPSFuzzer:
A Fast Greybox Fuzzer for Stateful Network Protocols using Snapshots", 2022.
t.iss.one/Library_Sec
"SNPSFuzzer:
A Fast Greybox Fuzzer for Stateful Network Protocols using Snapshots", 2022.
t.iss.one/Library_Sec
ICS_asset_discovery_tools.pdf
646.8 KB
#Research
#SCADA_Security
"A Taxonomy for Contrasting Industrial Control Systems Asset Discovery Tools", 2022.
t.iss.one/Library_Sec
#SCADA_Security
"A Taxonomy for Contrasting Industrial Control Systems Asset Discovery Tools", 2022.
t.iss.one/Library_Sec
Web_Sleeper_Agents.pdf
804.3 KB
#Research
"Awakening the Web’s Sleeper Agents:
Misusing Service Workers for Privacy Leakage", NDSS 2021.
t.iss.one/Library_Sec
"Awakening the Web’s Sleeper Agents:
Misusing Service Workers for Privacy Leakage", NDSS 2021.
t.iss.one/Library_Sec
Low_Entropy_RSA_Keys.pdf
440.4 KB
#crypto
"The mechanics of compromising low entropy RSA keys", 2021.
]-> Reference Implementation of Distributable RSA Factorization:
https://github.com/austinallshouse/defcon29-key-factorization-reference
t.iss.one/Library_Sec
"The mechanics of compromising low entropy RSA keys", 2021.
]-> Reference Implementation of Distributable RSA Factorization:
https://github.com/austinallshouse/defcon29-key-factorization-reference
t.iss.one/Library_Sec
New_Thinking_About_Information_Technology_Security_1644631430.pdf
55.3 KB
New Thinking About Information Technology Security
t.iss.one/Library_Sec
t.iss.one/Library_Sec