- 博客(5)
- 收藏
- 关注
翻译 Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2
ABSTRACT摘要We introduce the key reinstallation attack. This attack abuses design or implementation flaws in cryptographic protocols to reinstall an already-in-use key. This resets the key’s associa...
2018-05-08 13:48:22 3698
原创 Advanced Programming in UNIX Environment Episode 30
exit FunctionAs we described in Section 7.3, a process can terminate normally in five ways:1.Executing a return from the main function. 2.Calling the exit function. 3.Calling the _exit or _Exit ...
2018-05-01 10:03:53 144
原创 Advanced Programming in UNIX Environment Episode 29
getrlimit and setrlimit FunctionsEvery process has a set of resource limits, some of which can be queried and changed by the getrlimit and setrlimit functions.#include <sys/resource.h>in...
2018-05-01 10:03:29 132
原创 Metasploit各平台安装
Windows 32bit: http://windows.metasploit.com/metasploitframework-latest.msiMac OS X 64 bit: http://osx.metasploit.com/metasploitframework-latest.pkgLinux下载方法适合deb和rpm,需要先安装curl:apt-get insta...
2018-05-01 10:03:11 1499
原创 Advanced Programming in UNIX Environment Episode 28
Command-Line ArgumentsWhen a program is executed, the process that does the exec can pass command-line arguments to the new program. This is part of the normal operation of the UNIX system shells....
2018-05-01 10:02:48 174
空空如也
空空如也
TA创建的收藏夹 TA关注的收藏夹
TA关注的人