72 lines
4.4 KiB
JSON
72 lines
4.4 KiB
JSON
[
|
||
{
|
||
"guid": "https://forum.butian.net/share/3902",
|
||
"title": "样本分析:Trinity 勒索软件",
|
||
"description": "前言\nTrinity 勒索软件是一个相对较新的威胁行为者,以采用双重勒索策略而闻名。这种方法包括在加密文件之前窃取敏感数据,从而增加受害者支付赎金的压力。这种勒索软件使用 ChaCha20 加密算法...",
|
||
"source": "subject",
|
||
"pubDate": "2024-12-10 10:00:02"
|
||
},
|
||
{
|
||
"guid": "https://forum.butian.net/share/3974",
|
||
"title": "强网杯S8决赛Pyramid框架下内存马的分析构造及RS加密签名伪造",
|
||
"description": "这两天去线下参加了强网杯S8的决赛,WEB一共两题这个题目代码并不多但是考察点很创新,并且涉及了从没出现过的Pyramid框架下内存马,线下时间紧张最后20分钟才调试出来,特此记录本篇文章详细解析Pyramid框架下内存马的分析构造及RS加密签名伪造便于师傅们交流学习。",
|
||
"source": "subject",
|
||
"pubDate": "2024-12-10 09:36:25"
|
||
},
|
||
{
|
||
"guid": "https://forum.butian.net/share/3936",
|
||
"title": "解读 2024 年高通 GPU 漏洞细节及利用技术",
|
||
"description": "本文主要分析 2024 年高通 GPU 上的一些漏洞细节\nCVE-2024-23380\n与 Mali 类似高通的 GPU 驱动使用 kgsl_mem_entry 和 kgsl_memdesc 结构体来管理物理页\n\nkgsl_mem_entry 对象分配的逻辑位于 kg...",
|
||
"source": "subject",
|
||
"pubDate": "2024-12-09 10:00:02"
|
||
},
|
||
{
|
||
"guid": "https://forum.butian.net/share/3919",
|
||
"title": "glibc堆all-in-one",
|
||
"description": "本篇文章篇幅很长,记录了笔者学习glibc堆的全部心得,从入门的堆分配的学习,一些经典打法的总结,以及个人的技巧,保护机制的变动。再到io basic knowledge,glibc的IO-FILE攻击部分,常见的house系列总结,最后到magic_gadgets,以及打libc got,stdout,stderr这些比较边角的内容,希望对入门学堆的你有所帮助,也希望帮助更多学习glibc堆的师傅建立知识体系,也欢迎更多大佬进行补充指点",
|
||
"source": "subject",
|
||
"pubDate": "2024-12-09 09:00:00"
|
||
},
|
||
{
|
||
"guid": "https://forum.butian.net/share/3924",
|
||
"title": "GPU 驱动漏洞:窥探驱动漏洞利用的技术奥秘",
|
||
"description": "本文尝试以 GPU 漏洞为引介绍围绕 GPU 驱动这一攻击面,安全研究人员对内核漏洞利用技术做的一些探索。\n背景介绍\n目前移动 SOC 平台上由多个硬件模块组成,常见的硬件模块有:CPU、GPU、Modem基...",
|
||
"source": "subject",
|
||
"pubDate": "2024-12-06 09:00:00"
|
||
},
|
||
{
|
||
"guid": "https://forum.butian.net/share/3913",
|
||
"title": "qemu逃逸入门及例题复现",
|
||
"description": "本文章详细记录了笔者对qemu逃逸的理解,同时复现了两个经典的CTF中的qemu逃逸的题目,详细记录了复现的过程,希望对你学习qemu逃逸有所帮助",
|
||
"source": "subject",
|
||
"pubDate": "2024-12-05 09:36:56"
|
||
},
|
||
{
|
||
"guid": "https://forum.butian.net/share/3912",
|
||
"title": "基于ptrace的沙箱绕过",
|
||
"description": "本文记录复现羊城杯hard-sandbox这道题的过程,并在途中学习了基于ptrace的沙箱绕过",
|
||
"source": "subject",
|
||
"pubDate": "2024-12-04 10:00:01"
|
||
},
|
||
{
|
||
"guid": "https://forum.butian.net/share/3952",
|
||
"title": "多轮对话越狱大模型",
|
||
"description": "最近奇安信办的datacon有个AI安全赛道,其中的挑战之一就是与越狱相关的,不同的地方在于它关注的是多轮越狱",
|
||
"source": "subject",
|
||
"pubDate": "2024-12-04 09:00:02"
|
||
},
|
||
{
|
||
"guid": "https://forum.butian.net/share/3911",
|
||
"title": "Web Pwn常见利用方式总结",
|
||
"description": "本篇文章总结了web pwn常见的利用方式",
|
||
"source": "subject",
|
||
"pubDate": "2024-12-03 09:31:45"
|
||
},
|
||
{
|
||
"guid": "https://forum.butian.net/share/3916",
|
||
"title": "HKCERT24 Rev bashed 和 MBTI Radar WP",
|
||
"description": "周末的时候,打了hkcert24的比赛,里面很多题目设置很有趣,这里挑选其中rev方向的的bashed和MBTI Radar 记录一下wp",
|
||
"source": "subject",
|
||
"pubDate": "2024-12-02 10:05:50"
|
||
}
|
||
] |