- 博客(29)
- 资源 (2)
- 收藏
- 关注
原创 Cisco Energywise
http://www.cisco.com/web/CN/products/products_netsol/switches/products/energywise/energywise_white_paper01.htmlhttp://www.cisco.com/web/CN/products/products_netsol/switches/products/energywise/energ
2014-08-31 20:50:24 705
原创 powershell exploit post-framework
https://github.com/mattifestation/PowerSploit
2014-08-31 17:11:04 739
原创 blackhat 2013 usa all 93 video
http://www.youtube.com/watch?v=rbeTi7CQF94&list=PLiq_fDYFoqMocM7ADQCTfGAdI9CXA-kUs&index=93
2014-08-31 16:22:12 1045
原创 凯文经典书籍
http://product.china-pub.com/3770468#mlhttp://product.china-pub.com/3770467
2014-08-31 13:08:41 729
原创 Blackhat EU 2013 - HACKING APPLIANCES: IRONIC EXPLOITATION OF SECURITY PRODUCTS
http://www.youtube.com/watch?v=rrjSEkSwwOQ
2014-08-31 10:14:06 999
原创 owasp testing guide v4
https://www.owasp.org/index.php/OWASP_Testing_Guide_v4_Table_of_Contents
2014-08-30 22:18:02 1368
原创 owasp conference video and ppt
https://www.owasp.org/index.php/Category:OWASP_Video
2014-08-30 22:15:05 562
转载 malicious-domain-profiling
https://code.google.com/p/malicious-domain-profiling/https://www.blackhat.com/docs/us-14/materials/us-14-Li-APT-Attribution-And-DNS-Profiling-WP.pdf
2014-08-30 18:15:27 746
转载 Mark Graham - Cloud-based Detection Techniques for Botnets and Other Malware
http://www.youtube.com/watch?v=fV5kED7nryw&list=PLpr-xdpM8wG_KHsxepT9o6trkqDELhr3_&index=12
2014-08-30 12:03:22 618
转载 ttyrpld
http://suchalin.blog.163.com/blog/static/55304677201010221235907/
2014-08-25 13:27:36 1000
转载 使用logstash+elasticsearch+kibana快速搭建日志平台
日志的分析和监控在系统开发中占非常重要的地位,系统越复杂,日志的分析和监控就越重要,常见的需求有:根据关键字查询日志详情监控系统的运行状况统计分析,比如接口的调用次数、执行时间、成功率等异常数据自动触发消息通知基于日志的数据挖掘很多团队在日志方面可能遇到的一些问题有:开发人员不能登录线上服务器查看详细日志,经过运维周转费时费力日志数据分散在多个系统,难以查找日志数据量大,查
2014-08-22 22:05:15 61223
转载 ATTACKING WEBSERVERS VIA .HTACCESS
A while back I was testing a CMS that had a curious feature, all uploaded files were placed in their own directory. This was not a security enhancement as the application allowed php files to be upl
2014-08-21 14:03:25 633
转载 attack mongodb
http://2012.zeronights.org/includes/docs/Firstov%20-%20Attacking%20MongoDB.pdf
2014-08-21 13:48:19 540
转载 Upload a web.config File for Fun & Profit
The web.config file plays an important role in storing IIS7 (and higher) settings. It is very similar to a .htaccess file in Apache web server. Uploading a .htaccess file to bypass protections around
2014-08-21 13:17:06 913
转载 Pass-the-Hash is Dead: Long Live Pass-the-Hash
You may have heard the word recently about how a recent Microsoft patch has put all of us pentesters out of a job. Pass-the-hash is dead, attackers can no longer spread laterally, and Microsoft has fi
2014-08-21 13:10:31 1692
转载 IBM Sametime Meet Server 8.5 Password Disclosure
# Exploit Title: IBM Sametime Meet Server 8.5 Password Disclosure# Google Dork: intitle:"Meeting Center - IBM Lotus Sametime"# Date: 11/08/2014# CVSS Score: http://nvd.nist.gov/cvss.c
2014-08-20 17:20:36 1071
空空如也
TA创建的收藏夹 TA关注的收藏夹
TA关注的人