72 lines
3.5 KiB
JSON
72 lines
3.5 KiB
JSON
[
|
||
{
|
||
"guid": "https://forum.butian.net/share/3992",
|
||
"title": "一次窃取程序的恶意样本分析",
|
||
"description": "一次窃取程序的恶意样本分析",
|
||
"source": "subject",
|
||
"pubDate": "2025-01-03 10:00:00"
|
||
},
|
||
{
|
||
"guid": "https://forum.butian.net/share/3993",
|
||
"title": "Sodinokibi详细分析",
|
||
"description": "一、基本信息\r\nREvil,也被称为Sodinokibi或简称Sodin,它在2019年4月被首次发现。这种恶意软件会在感染了用户的电脑后加密文件,并删除任何留下的赎金提示信息。这些消息会告知受害者必须支付一...",
|
||
"source": "subject",
|
||
"pubDate": "2025-01-03 09:00:00"
|
||
},
|
||
{
|
||
"guid": "https://forum.butian.net/share/4006",
|
||
"title": "代码审计 - MCMS v5.4.1 0day挖掘",
|
||
"description": "记一次 MCMS v5.4.1 代码审计,编号为 CVE-2024-42990&CVE-2024-42991。本文由笔者首发于先知社区的技术文章板块:https://xz.aliyun.com/t/16630",
|
||
"source": "subject",
|
||
"pubDate": "2025-01-02 10:00:00"
|
||
},
|
||
{
|
||
"guid": "https://forum.butian.net/share/3991",
|
||
"title": "lighttpd溢出漏洞构造ROP链",
|
||
"description": "前几天打了下强网杯决赛,想着分享一下思路",
|
||
"source": "subject",
|
||
"pubDate": "2025-01-02 09:00:01"
|
||
},
|
||
{
|
||
"guid": "https://forum.butian.net/share/4017",
|
||
"title": "文件读取漏洞实战利用",
|
||
"description": "实战场景下的两个任意文件读取漏洞利用。",
|
||
"source": "subject",
|
||
"pubDate": "2024-12-31 10:00:02"
|
||
},
|
||
{
|
||
"guid": "https://forum.butian.net/share/3970",
|
||
"title": "挖矿病毒处置总结",
|
||
"description": "处理过的挖矿病毒隐藏自身的方式总结及处置方法总结",
|
||
"source": "subject",
|
||
"pubDate": "2024-12-31 09:00:00"
|
||
},
|
||
{
|
||
"guid": "https://forum.butian.net/share/3968",
|
||
"title": "一些vmpwn的详细总结",
|
||
"description": "总结一些常见vmpwn题的打法,数据越界泄露libc,通过偏移数据处理来得到危险函数地址等常见漏洞,会结合两道例题来进行讲解",
|
||
"source": "subject",
|
||
"pubDate": "2024-12-30 10:00:01"
|
||
},
|
||
{
|
||
"guid": "https://forum.butian.net/share/3955",
|
||
"title": "样本分析:formbook 恶意软件浅析",
|
||
"description": "样本\r\nIOC\r\nMD5:749dfc8bf52422ce77ed59a60c2f395e\r\nSHA1:d0593187a473a19564a67819050023c9144b30c2\r\nSHA256: 5c205cffc83f7be274773fb1c3aa356b29d97e4d62a83e79c5fd52eadc3ed695\r\n概述\r\n语言:C...",
|
||
"source": "subject",
|
||
"pubDate": "2024-12-30 09:00:01"
|
||
},
|
||
{
|
||
"guid": "https://forum.butian.net/share/4013",
|
||
"title": "Vulnserver.exe漏洞分析及利用",
|
||
"description": "本章为笔者在学习二进制安全过程中的学习记录,vulnserver为公开的二进制漏洞的练习程序,本章节的内容为vulnserver.exe的漏洞分析及复现,主要通过windbg和ida结合进行分析。因为vulnserver存在多种调试漏洞,本文主要使用trun参数进行漏洞分析及利用。",
|
||
"source": "subject",
|
||
"pubDate": "2024-12-27 10:00:01"
|
||
},
|
||
{
|
||
"guid": "https://forum.butian.net/share/3954",
|
||
"title": "ios下某浏览器小说去广告分析与Hook",
|
||
"description": "支持正版,从我做起,仅供学习!!",
|
||
"source": "subject",
|
||
"pubDate": "2024-12-27 09:00:02"
|
||
}
|
||
] |