blackhat defcon

Want to know blackhat defcon? we have a huge selection of blackhat defcon information on alibabacloud.com

veil-bypass anti-virus software payload generator-China cold dragon

located (for example: c:python27)Execute a batch script to convert Pythonpayload into an executable program4. Put the payload on the target machineFuture direction:Research new ways to encrypt or confuse payloadStudy the ability to directly invoke the language conversion of the Windows API payloadDo you want to use veil? Anytime you can. Download, copy, and do whatever you want to do for it. you can download Veil: Https://github.com/ChrisTruncer/Veil here.I hope it will help others as well as h

Use systemloadandcallimage to load Rootkit

pedemo-software ANTI-ROOTKIT (full name Integrity Protection driver ). On blackhat briefings this year, many smart people are talking about how many methods are there to load code into the kernel mode-obviously being influenced by "ANTI-ROOTKIT. Many rootkit authors have also joined the list. So we are going to change this Windows rootkit. Till now, this Windows rootkit has been designed as a driver. But there is no reason that a rookit must be desig

Nc.exe Advanced Tips Application Summary _ Security Tutorial

http://www.atstake.com/research/tools/network_utilities/ Tool:netcat 1.10 for Unix version:03.20.96 Platforms: *nix Tool:netcat 1.1 for Win 95/98/nt/2000 version:02.08.98 Platforms:runs on Win 95/98/nt/2000 5.2 http://www.xfocus.net/download.php?id=320 Name: Cryptcat_nt.zip Update Time: 2002-04-05 Category: Network Tools Platform: win9x/nt/2000 size: 115.8K Submit: Maxilaw Introduction: The NC for encrypted transmissions. 5.3 http://content.443.ch/pub/security/

Using Google as a hacker attack principle _ security related

Technology world: Googlehacking is using Google's search engine to quickly find vulnerable hosts and information that contains sensitive data, a recent attack that was manually operated by hackers can be done automatically through a new worm. In order to arouse the attention and attention of the googlehacking, we have made this article in the hope that we can better protect our information security by understanding the attacking means of hack. This article focuses on the googlehacking attack mea

Fingerprint identification is safe.

Trustzone was once called the last line of defense for mobile security. At the MOSEC Mobile Security Technology Summit held in June this year, 360 security researcher Shendi first completed the kernel of the mobile phone's normal OS, and disabled the latest version seforandroid, and then exploited the security zone to circumvent many security features and obtain sensitive information such as fingerprints. The brutal truth tells us that this last line of defense will also become shaky. But ever

Rootkit attack and defense under Windows Vista system

surprise, "a digitally signed driver can be loaded by Vista" is not a great defense against the Rootkit class. At last year's Blackhat meeting, a researcher had demonstrated that the VISTAX64BETA2 version of the disk was modified to load an unsigned driver, although the vulnerability was later replaced by Microsoft, However, it has been stated that it is not impossible to break through Vista driver-loading management by technical means. But a better

Black Hat seo provoke Mao Google's fate: Into the hell never be reborn

People in the Web circle know the importance of SEO (search Engine optimization/SEO), which is the only way to win a large number of visitors for free before the community media. Today, even websites such as Facebook have gradually replaced Google's source of traffic, but this only means that as a site owner, you have more traffic lines. The number of visitors from SEO is still growing, so its importance has not been reduced. SEO is a very deep knowledge, a short article is simply impossible to

Pingback Exploit Technology

pingback loophole, the nature and the non-echo ssrf difference is not big, so the use is more difficult. Relative to the direct excavation of the ssrf, at least can also be based on the delay or error information to determine whether the port is open, thus opening the attack surface, but pingback in many cases can not do this. So the issue authors here suggest that you can "attack clients remotely". What do you mean. This means that some backend Pingback function programs are likely to use some

Total Pages: 4 1 2 3 4 Go to: Go

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.