🔥 Декомпиляция средствами NMT
Автоматическое создание декомпилятора на основе обучение по коду, построенному компилятором.
https://arxiv.org/pdf/1905.08325.pdf
https://github.com/omerktz/trafix
Автоматическое создание декомпилятора на основе обучение по коду, построенному компилятором.
https://arxiv.org/pdf/1905.08325.pdf
https://github.com/omerktz/trafix
GitHub
omerktz/TraFix
Implementation of TraFix (automatic trainable decompiler based on NMT) as published in ArXiv - omerktz/TraFix
Видео докладов с OPCODE 2019
https://www.youtube.com/playlist?list=PLDRL0OXbBArFutTX4o_tO9WX5vaRFaXkN
https://www.youtube.com/playlist?list=PLDRL0OXbBArFutTX4o_tO9WX5vaRFaXkN
YouTube
OPCDE 2019 - YouTube
Building a real-world web honeypot for CVE-2019–6340 (RCE in Drupal core)
https://medium.com/@SecurityBender/building-a-real-world-web-honeypot-for-cve-2019-6340-rce-in-drupal-core-f4240f989c3f
https://medium.com/@SecurityBender/building-a-real-world-web-honeypot-for-cve-2019-6340-rce-in-drupal-core-f4240f989c3f
Medium
Building a real-world web honeypot for CVE-2019–6340 (RCE in Drupal core)
A while ago I started a project for managing real-word web honeypots. I initially built it to manage some WordPress honeypots but after…
Analysis of a 1day (CVE-2019-0547) and discovery of a forgotten condition in the patch (CVE-2019-0726) – Part 1 of 2
https://sensepost.com/blog/2019/analysis-of-a-1day-cve-2019-0547-and-discovery-of-a-forgotten-condition-in-the-patch-cve-2019-0726-part-1-of-2/
https://sensepost.com/blog/2019/analysis-of-a-1day-cve-2019-0547-and-discovery-of-a-forgotten-condition-in-the-patch-cve-2019-0726-part-1-of-2/
Sensepost
SensePost | Analysis of a 1day (cve-2019-0547) and discovery of a forgotten condition in the patch (cve-2019-0726) – part 1 of…
Leaders in Information Security
Forwarded from Noise Security Bit
1-клик Remote Code Execution (RCE) в Skype Web Plugin и QT
https://0x41.cf/infosec/2019/05/28/skype-web-plugin-ez-rce.html
https://0x41.cf/infosec/2019/05/28/skype-web-plugin-ez-rce.html
DOCKER BUG ALLOWS ROOT ACCESS TO HOST FILE SYSTEM
https://duo.com/decipher/docker-bug-allows-root-access-to-host-file-system
https://duo.com/decipher/docker-bug-allows-root-access-to-host-file-system
Decipher
Docker Bug Allows Root Access to Host File System
A vulnerability in all versions of the Docker platform can give an attacker full read and write access to the host file system.
Обзор расширенных механизмов безопасности в Windows
https://raw.githubusercontent.com/dwizzzle/Presentations/master/Bluehat%20Shanghai%20-%20Advancing%20Windows%20Security.pdf
https://raw.githubusercontent.com/dwizzzle/Presentations/master/Bluehat%20Shanghai%20-%20Advancing%20Windows%20Security.pdf
Forwarded from Noise Security Bit
Видео докладов c конференции HITBSecConf2019 – Amsterdam. В честь юбилея организаторы отобрали довольно много интересных докладов по темам эксплуатации и реверса.
https://www.youtube.com/watch?v=L9NhN9DMZno&list=PLmv8T5-GONwSuU8vMeZ6ECvr4NqJJxm34
https://www.youtube.com/watch?v=L9NhN9DMZno&list=PLmv8T5-GONwSuU8vMeZ6ECvr4NqJJxm34
YouTube
#HITB2019AMS PRECONF PREVIEW - The End Is The Beginning Is The End: Ten Years In The NL Box
Dhillon 'L33tdawg' Kannabhiran
Founder/Chief Executive Officer, Hack In The Box
=======
Time flies when you’re having fun! It flies even faster when you’re having fun with friends!
From the back alleys of Kuala Lumpur, to the sand dunes of the UAE – from…
Founder/Chief Executive Officer, Hack In The Box
=======
Time flies when you’re having fun! It flies even faster when you’re having fun with friends!
From the back alleys of Kuala Lumpur, to the sand dunes of the UAE – from…
Разбор уязвимости command injection в Nvidia GeForce Experience
https://rhinosecuritylabs.com/application-security/nvidia-rce-cve-2019-5678/
https://rhinosecuritylabs.com/application-security/nvidia-rce-cve-2019-5678/
Rhino Security Labs
NVIDIA GFE OS Command Injection: CVE-2019-5678
This post walks through the discovery process of the NVIDIA GeForce Experience OS command injection vulnerability, assigned to CVE-2019-5678.
macOS 0-Day Flaw Lets Hackers Bypass Security Features With Synthetic Clicks
https://thehackernews.com/2019/06/macOS-synthetic-click.html
https://thehackernews.com/2019/06/macOS-synthetic-click.html