OthersThe article was first published in:https://www.anquanke.com/post/id/163575 - source:tonghuaroo...
Enterprise Cyber security build of Windows lateral movement attacks detection
OthersThe article was first published in:https://www.4hou.com/technology/10430.html - source:tonghua...
Flask debug mode PIN code generation mechanism security research notes
OthersThe article was first published in:https://zhuanlan.zhihu.com/p/32336971 - source:tonghuaroot....
An example of network security problems in the IoT era
OthersThe article was first published in:https://www.anquanke.com/post/id/84774 - source:tonghuaroot...
Google 是如何落地静态代码分析的
原文发在了我的公众号上,链接为:https://mp.weixin.qq.com/s/9iJNZCQfHg0VbWSFRgwVJg - source:tonghuaroot.com
AWS Lambda Node.js 反弹shell
Nov 19, 20190x00 前言原本在测AWS Lambda,后来变成研究Node.js反弹shell了,hhh。 0x01 被攻击端直接套到lambda函数里就行了12345678910111...
一个信息安全从业人员的自我修养:我的安全技术栈
0x00 前言曾经很长一段时间一直被一件事情困扰着,就是学过的新技术被闲置一段时间之后,当再捡起来时有种无从下手的感觉。很多技术点都被遗忘了,虽然自己一直有整理笔记的习惯,但奈何越来越多琐碎的一坨坨知...