今日文章进度:
1.《晚熟的人》读书笔记 明天发布
2. 最新Bin2Code框架CodeCMR解读 已完成
3. 论文解读
https://www.xiaojingliao.com/uploads/9/7/0/2/97024238/ccs_2020_advance.pdf 未完成
漏洞挖掘资料学习
1.怎么处理漏洞报告
https://medium.com/@eldeebxboy/error-4o4-triage-team-not-found-5a88d3eb3f3e
2.使用图片入侵
https://medium.com/@chiragsukhala/hacking-web-using-images-chira-attack-vector-63e15a1f7dac
3.得到本地的Instagram照片
https://medium.com/@abraham.yeransian/mitm-gaining-access-to-instagram-photos-66e12844d4be
4.新的漏洞挖掘学习网站
https://www.bugbountyhunter.com/
5.制造你的假身份
6.渗透测试资料
https://github.com/blaCCkHatHacEEkr/PENTESTING-BIBLE
7.研究人员如何从一张照片中找到您的位置
https://medium.com/osint/how-an-investigator-can-find-your-location-from-one-photograph-8ece82c4380f
8.在JS代码中寻找敏感信息
https://duckoverflow.medium.com/public-and-secret-api-key-leaked-in-javascript-source-fbe45b6bc617
漏洞报告学习
1.SMTP interaction theft via MITM
https://hackerone.com/reports/953219
2.Access to multiple production Grafana dashboards
https://hackerone.com/reports/663628
3.GitLab-Runner on Windows `DOCKER_AUTH_CONFIG` container host Command Injection
https://hackerone.com/reports/955016
4.From a 500 error to Django admin takeover
https://blog.shashank.co/2020/11/from-500-error-to-django-admin-takeover.html