Link on Github --> https://github.com/Nieuport/news-and-links/blob/gh-pages/docs/2021.12.29.md
Exploitation of CVE-2021-21220 – From Incorrect JIT Behavior to RCE - https://www.zerodayinitiative.com/blog/2021/12/15/exploitation-of-cve-2021-21220-from-incorrect-jit-behavior-to-rce
Introduction to Malware Analysis and Reverse Engineering - https://class.malware.re/
SSD Advisory – Rocket.Chat Client-side Remote Code Execution - https://ssd-disclosure.com/ssd-advisory-rocket-chat-client-side-remote-code-execution/
Hacking the dlink DIR-615 for fun and no profit Part 5: Multiple RCE’s - https://noob3xploiter.medium.com/hacking-the-dlink-dir-615-for-fun-and-no-profit-part-5-multiple-rces-d508f58e2471
Mark-of-the-Web from a red team’s perspective - https://outflank.nl/blog/2020/03/30/mark-of-the-web-from-a-red-teams-perspective
Exploitation of CVE-2021-21220 – From Incorrect JIT Behavior to RCE - https://www.zerodayinitiative.com/blog/2021/12/15/exploitation-of-cve-2021-21220-from-incorrect-jit-behavior-to-rce
Introduction to Malware Analysis and Reverse Engineering - https://class.malware.re/
SSD Advisory – Rocket.Chat Client-side Remote Code Execution - https://ssd-disclosure.com/ssd-advisory-rocket-chat-client-side-remote-code-execution/
Hacking the dlink DIR-615 for fun and no profit Part 5: Multiple RCE’s - https://noob3xploiter.medium.com/hacking-the-dlink-dir-615-for-fun-and-no-profit-part-5-multiple-rces-d508f58e2471
Mark-of-the-Web from a red team’s perspective - https://outflank.nl/blog/2020/03/30/mark-of-the-web-from-a-red-teams-perspective
Zaloguj się aby komentować