Day019

今日文章更新:

1.《晚熟的人》读书笔记 完成

2. 论文解读

https://www.xiaojingliao.com/uploads/9/7/0/2/97024238/ccs_2020_advance.pdf 未完成

3.《穷爸爸富爸爸》 读书笔记 明天发布

4. 放大侦听: https://threatpost.com/zoom-snooping-passwords/161000/ 论文:https://arxiv.org/pdf/2010.12078.pdf

漏洞挖掘学习

1.白帽子采访

@ITSecurityguard Talks About Getting Into Bug Bounty, Recon, Automation, Triage, and more!

2.白帽子采访: HACKER SPOTLIGHT: INTERVIEW WITH PUTSI

https://www.hackerone.com/blog/hacker-spotlight-interview-putsi

3.怎么绕过账号注册的OTP

https://amitp200.medium.com/how-i-bypass-otp-verification-in-account-registration-process-ce698654a7af

4.网络侦查发现

https://medium.com/redteam-blueteam-series/perform-network-reconnaissance-discovery-31e8e7550a3c

5.暴力破解 Brute Force Password Cracking with Medusa

https://shehackske.medium.com/brute-force-password-cracking-with-medusa-b680b4f33d69

6.Simplifying Password Spraying

https://medium.com/greenwolf-security/simplifying-password-spraying-809a35a2ee5d

7.Password Cracking Is Easy: Here’s How to Do It

https://kennymuli.medium.com/password-cracking-is-easy-heres-how-to-do-it-875806a1e42a

漏洞挖掘报告

1.GitHub Actions platform vulnerable to code injection attacks – research

https://portswigger.net/daily-swig/github-actions-platform-vulnerable-to-code-injection-attacks-research

AI安全

1.怎么把GPT-3使用在安全领域

发表评论

Fill in your details below or click an icon to log in:

WordPress.com 徽标

您正在使用您的 WordPress.com 账号评论。 注销 /  更改 )

Google photo

您正在使用您的 Google 账号评论。 注销 /  更改 )

Twitter picture

您正在使用您的 Twitter 账号评论。 注销 /  更改 )

Facebook photo

您正在使用您的 Facebook 账号评论。 注销 /  更改 )

Connecting to %s