01工具介绍审Java代码的时候,经常会遇到接口因鉴权问题被组合拳getshell,例如泛微和海康安防这些系统。为了平时审代码与绕鉴权时节省点时间,花了点时间分析总结了下网上所有与Java鉴权有关的问...
学术报告|Securing Low-level Software Gradually
浙江大学计算机科学与技术学院浙江大学区块链与数据安全全国重点实验室浙江大学网络空间安全学院学术报告Jie ZhouAssistant ProfessorGeorge Washington Univer...
TA558黑客利用图像进行大规模恶意软件攻击
The threat actor tracked as TA558 has been observed leveraging steganography as an obfuscation techn...
gnutls.h: No such file or directory 的解决方案
In file included from src/docstrings.c:4:0: src/pycurl.h:148:30: fatal error: gnutls/gnutls.h: No su...
【AI速读】暗网监控如何应用于开源情报和调查
1、How to conduct osint investigations on the dark Web To conduct OSINT investigations on the dark we...
NSE 2023 CFP
Cyberspace technology has already penetrated various areas such as science, economy, politics as wel...
AntCTF x D³CTF 2023 d3op复盘笔记
题目类型为PWN,描述如下:d3opIt might take a long time to start up, please connect about 2 minutes after the ga...
理解和应用安全概念-2.完整性
Integrity is the concept of protecting the reliability and correctness of data. Integrity protection...