🔥 Декомпиляция средствами NMT
Автоматическое создание декомпилятора на основе обучение по коду, построенному компилятором.
https://arxiv.org/pdf/1905.08325.pdf
https://github.com/omerktz/trafix
Автоматическое создание декомпилятора на основе обучение по коду, построенному компилятором.
https://arxiv.org/pdf/1905.08325.pdf
https://github.com/omerktz/trafix
GitHub
omerktz/TraFix
Implementation of TraFix (automatic trainable decompiler based on NMT) as published in ArXiv - omerktz/TraFix
Видео докладов с OPCODE 2019
https://www.youtube.com/playlist?list=PLDRL0OXbBArFutTX4o_tO9WX5vaRFaXkN
https://www.youtube.com/playlist?list=PLDRL0OXbBArFutTX4o_tO9WX5vaRFaXkN
YouTube
OPCDE 2019 - YouTube
Building a real-world web honeypot for CVE-2019–6340 (RCE in Drupal core)
https://medium.com/@SecurityBender/building-a-real-world-web-honeypot-for-cve-2019-6340-rce-in-drupal-core-f4240f989c3f
https://medium.com/@SecurityBender/building-a-real-world-web-honeypot-for-cve-2019-6340-rce-in-drupal-core-f4240f989c3f
Medium
Building a real-world web honeypot for CVE-2019–6340 (RCE in Drupal core)
A while ago I started a project for managing real-word web honeypots. I initially built it to manage some WordPress honeypots but after…
Analysis of a 1day (CVE-2019-0547) and discovery of a forgotten condition in the patch (CVE-2019-0726) – Part 1 of 2
https://sensepost.com/blog/2019/analysis-of-a-1day-cve-2019-0547-and-discovery-of-a-forgotten-condition-in-the-patch-cve-2019-0726-part-1-of-2/
https://sensepost.com/blog/2019/analysis-of-a-1day-cve-2019-0547-and-discovery-of-a-forgotten-condition-in-the-patch-cve-2019-0726-part-1-of-2/
Sensepost
SensePost | Analysis of a 1day (cve-2019-0547) and discovery of a forgotten condition in the patch (cve-2019-0726) – part 1 of…
Leaders in Information Security
Forwarded from Noise Security Bit
1-клик Remote Code Execution (RCE) в Skype Web Plugin и QT
https://0x41.cf/infosec/2019/05/28/skype-web-plugin-ez-rce.html
https://0x41.cf/infosec/2019/05/28/skype-web-plugin-ez-rce.html
DOCKER BUG ALLOWS ROOT ACCESS TO HOST FILE SYSTEM
https://duo.com/decipher/docker-bug-allows-root-access-to-host-file-system
https://duo.com/decipher/docker-bug-allows-root-access-to-host-file-system
Decipher
Docker Bug Allows Root Access to Host File System
A vulnerability in all versions of the Docker platform can give an attacker full read and write access to the host file system.
Обзор расширенных механизмов безопасности в Windows
https://raw.githubusercontent.com/dwizzzle/Presentations/master/Bluehat%20Shanghai%20-%20Advancing%20Windows%20Security.pdf
https://raw.githubusercontent.com/dwizzzle/Presentations/master/Bluehat%20Shanghai%20-%20Advancing%20Windows%20Security.pdf
Forwarded from Noise Security Bit
Видео докладов c конференции HITBSecConf2019 – Amsterdam. В честь юбилея организаторы отобрали довольно много интересных докладов по темам эксплуатации и реверса.
https://www.youtube.com/watch?v=L9NhN9DMZno&list=PLmv8T5-GONwSuU8vMeZ6ECvr4NqJJxm34
https://www.youtube.com/watch?v=L9NhN9DMZno&list=PLmv8T5-GONwSuU8vMeZ6ECvr4NqJJxm34
YouTube
#HITB2019AMS PRECONF PREVIEW - The End Is The Beginning Is The End: Ten Years In The NL Box
Dhillon 'L33tdawg' Kannabhiran
Founder/Chief Executive Officer, Hack In The Box
=======
Time flies when you’re having fun! It flies even faster when you’re having fun with friends!
From the back alleys of Kuala Lumpur, to the sand dunes of the UAE – from…
Founder/Chief Executive Officer, Hack In The Box
=======
Time flies when you’re having fun! It flies even faster when you’re having fun with friends!
From the back alleys of Kuala Lumpur, to the sand dunes of the UAE – from…
Разбор уязвимости command injection в Nvidia GeForce Experience
https://rhinosecuritylabs.com/application-security/nvidia-rce-cve-2019-5678/
https://rhinosecuritylabs.com/application-security/nvidia-rce-cve-2019-5678/
Rhino Security Labs
NVIDIA GFE OS Command Injection: CVE-2019-5678
This post walks through the discovery process of the NVIDIA GeForce Experience OS command injection vulnerability, assigned to CVE-2019-5678.
macOS 0-Day Flaw Lets Hackers Bypass Security Features With Synthetic Clicks
https://thehackernews.com/2019/06/macOS-synthetic-click.html
https://thehackernews.com/2019/06/macOS-synthetic-click.html
Анализ недавнего 0day в Windows
Another Task Scheduler 0day, Another Task Scheduler Micropatch (The SandboxEscaper Saga)
https://blog.0patch.com/2019/06/another-task-scheduler-0day-another.html
Another Task Scheduler 0day, Another Task Scheduler Micropatch (The SandboxEscaper Saga)
https://blog.0patch.com/2019/06/another-task-scheduler-0day-another.html
0Patch
Another Task Scheduler 0day, Another Task Scheduler Micropatch (The SandboxEscaper Saga)
Backward Compatibility is Hard, and so is Stacked Impersonation by Simon Raner and Mitja Kolsek, the 0patch Team [Update 6/12/201...