Showing posts with label
Security
.
Show all posts
Showing posts with label
Security
.
Show all posts
Monday, July 25, 2016
ETHICAL HACKING 101 How to conduct professional pentestings in 21 days or less!
›
Understanding the hacker´s mind, making reconnaissance, scanning and enumeration, exploiting vulnerabilities, writing a professional repo...
BREAKING HTTPS WITH BGP HIJACKING
›
BREAKING HTTPS WITH BGP HIJACKING By Artyom Gavrichenkov Qrator Labs (ag@qrator.net)
Understanding and Managing Entropy Usage
›
INTERNET PLUMBING FOR SECURITY PROFESSIONALS: THE STATE OF BGP SECURITY
›
INTERNET PLUMBING FOR SECURITY PROFESSIONALS: THE STATE OF BGP SECURITY By Wim Remes – Rapid7
Exploiting the DRAM rowhammer bug to gain kernel privileges
›
Exploiting the DRAM rowhammer bug to gain kernel privileges Mark Seaborn, sandbox builder and breaker with contributions by Thomas Dull...
Exploiting Trustzone on Android
›
Exploiting Trustzone on Android By Di Shen(@returnsme) retme7@gmail.com
Attacking ECMAScript Engines with Redefinition
›
Attacking ECMAScript Engines with Redefinition By Natalie Silvanovich, Google
XXE defence(les)s in JDK XML parsers
›
XXE defence(les)s in JDK XML parsers By Sergey Gorbaty sergey.gorbaty@salesforce.com Xiaoran Wang xiaoran.wang@salesforce.com Horma...
The Applications of Deep Learning on Traffic Identification
›
The Applications of Deep Learning on Traffic Identification By Zhanyi Wang (wangzhanyi@360.cn)
BYPASS CONTROL FLOW GUARD COMPREHENSIVELY
›
BYPASS CONTROL FLOW GUARD COMPREHENSIVELY by Zhang Yunhai
›
Home
View web version