服务粉丝

我们一直在努力
当前位置:首页 > 财经 >

每日安全动态推送(2-15)

日期: 来源:腾讯玄武实验室收集编辑:
Tencent Security Xuanwu Lab Daily News

• Exploiting a remote heap overflow with a custom TCP stack:
https://www.synacktiv.com/publications/exploiting-a-remote-heap-overflow-with-a-custom-tcp-stack.html

   ・ 通过修改TCP协议栈来帮助远程利用, 利用一个堆溢出漏洞在pwn2own中攻破Western Digital MyCloudHome NAS – xmzyshypnc


• AI-powered Bing Chat spills its secrets via prompt injection attack:
https://arstechnica.com/information-technology/2023/02/ai-powered-bing-chat-spills-its-secrets-via-prompt-injection-attack/

   ・ 对Bing Chat进行提示词泄漏攻击 – keenan


• How I hacked into a Telecom Network — Part 1 (Getting the RCE):
https://link.medium.com/LDhm3bGroxb

   ・ 介绍渗透攻击电信网络的过程 – WireFish


• Learning Semgrep:
https://goingbeyondgrep.com/posts/learning-semgrep/

   ・ 学习 Semgrep教程 – lanying37


• [Tools] All about LeakSanitizer:
https://maskray.me/blog/2023-02-12-all-about-leak-sanitizer

   ・ 安全研究员 MaskRay(宋教授)对 LeakSanitizer 的原理介绍 – WireFish


• 有趣的Hack-A-Sat黑掉卫星挑战赛——被破坏的阿波罗计算机(解法一) - FreeBuf网络安全行业门户:
https://www.freebuf.com/articles/357367.html

   ・ Hack-A-Sat 比赛 writeup – WireFish


* 查看或搜索历史推送内容请访问:
https://sec.today

* 新浪微博账号:腾讯玄武实验室
https://weibo.com/xuanwulab


相关阅读

  • 每日安全动态推送(2-16)

  • Tencent Security Xuanwu Lab Daily News• [Tools] Reversing The EVM: Raw Calldata:https://degatchi.com/articles/reading-raw-evm-calldata ・ EVM中calldata编码与
  • 每日安全动态推送(2-20)

  • Tencent Security Xuanwu Lab Daily News• I'm Building a Self-Destructing USB Drive:https://interruptlabs.ca/2022/07/29/I-m-Building-a-Self-Destructing-USB-Drive
  • 每日安全动态推送(2-21)

  • Tencent Security Xuanwu Lab Daily News• [Tools] r/netsec - mast1c0re: Part 3 – Escaping the PS5 emulator:https://www.reddit.com/r/netsec/comments/115u6xc/mast
  • 每日安全动态推送(2-22)

  • Tencent Security Xuanwu Lab Daily News• Open source solution replicates ChatGPT training process! Ready to go with only 1.6GB GPU memory and gives you 7.73 tim
  • 每日安全动态推送(2-24)

  • Tencent Security Xuanwu Lab Daily News• [macOS] Built-in macOS Security Tools:https://www.huntress.com/blog/built-in-macos-security-tools ・ 一篇介绍macos自
  • 每日安全动态推送(2-27)

  • Tencent Security Xuanwu Lab Daily News• [Android] The code that wasn’t there: Reading memory on an Android device by accident:https://github.blog/2023-02-23-t
  • 想换工作?看这里

  • 有意向者可点击文末【阅读原文】投递简历~本周职位更新南宁星林科技有限公司1 安全研发工程师12-20k 安全研究员面议长按识别关于岗位详情及投递简历安洵信息技术有限公司

热门文章

  • “复活”半年后 京东拍拍二手杀入公益事业

  • 京东拍拍二手“复活”半年后,杀入公益事业,试图让企业捐的赠品、家庭闲置品变成实实在在的“爱心”。 把“闲置品”变爱心 6月12日,“益心一益·守护梦想每一步”2018年四

最新文章

  • 每日安全动态推送(2-15)

  • Tencent Security Xuanwu Lab Daily News• Exploiting a remote heap overflow with a custom TCP stack:https://www.synacktiv.com/publications/exploiting-a-remote-he
  • 每日安全动态推送(2-16)

  • Tencent Security Xuanwu Lab Daily News• [Tools] Reversing The EVM: Raw Calldata:https://degatchi.com/articles/reading-raw-evm-calldata ・ EVM中calldata编码与
  • 每日安全动态推送(2-17)

  • Tencent Security Xuanwu Lab Daily News• Linux内核常用保护和绕过技术:http://blog.topsec.com.cn/linux%e5%86%85%e6%a0%b8%e5%b8%b8%e7%94%a8%e4%bf%9d%e6%8a%a4%e5%92
  • 每日安全动态推送(2-20)

  • Tencent Security Xuanwu Lab Daily News• I'm Building a Self-Destructing USB Drive:https://interruptlabs.ca/2022/07/29/I-m-Building-a-Self-Destructing-USB-Drive
  • 每日安全动态推送(2-21)

  • Tencent Security Xuanwu Lab Daily News• [Tools] r/netsec - mast1c0re: Part 3 – Escaping the PS5 emulator:https://www.reddit.com/r/netsec/comments/115u6xc/mast
  • 每日安全动态推送(2-22)

  • Tencent Security Xuanwu Lab Daily News• Open source solution replicates ChatGPT training process! Ready to go with only 1.6GB GPU memory and gives you 7.73 tim