Twitter Archive for (31/03/2017) :
Black Hat Whitepapers/Slides (2017) :
1) What Malware Authors Don't Want You to Know - Evasive Hollow Process Injection :
Whitepaper : https://www.blackhat.com/docs/asia-17/materials/asia-17-KA-What-Malware-Authors-Don't-Want-You-To-Know-Evasive-Hollow-Process-Injection-wp.pdf
Slides : https://www.blackhat.com/docs/asia-17/materials/asia-17-KA-What-Malware-Authors-Don't-Want-You-To-Know-Evasive-Hollow-Process-Injection.pdf
(Author : https://twitter.com/monnappa22)
2) Linux Malware Analysis using Limon Sandbox : https://cysinfo.com/10th-meetup-linux-malware-analysis/ (Slides & Demo both)
(Author : https://twitter.com/monnappa22 )
3) Keyshuffling Attack for Persistent Early Code Execution in Nintendo 3DS Secure Bootchain : https://github.com/Plailect/keyshuffling
5)DROP THE ROP : Fine Grained Control-Flow Integrity for The Linux Kernel : https://www.blackhat.com/docs/asia-17/materials/asia-17-Moreira-Drop-The-Rop-Fine-Grained-Control-Flow-Integrity-For-The-Linux-Kernel.pdf (Slides)
6) Exploiting USB/IP in Linux : https://www.blackhat.com/docs/asia-17/materials/asia-17-Korchagin-Exploiting-USBIP-In-Linux.pdf (Slides)
7) Abusing Kerberos for arbitrary impersonations and RCE : https://www.blackhat.com/docs/asia-17/materials/asia-17-Hart-Delegate-To-The-Top-Abusing-Kerberos-For-Arbitrary-Impersonations-And-RCE-wp.pdf (Whitepaper)
8) Fried Apples : Jailbreak DIY : https://www.blackhat.com/docs/asia-17/materials/asia-17-Bazaliy-Fried-Apples-Jailbreak-DIY.pdf (Slides)
9)CJAG : CPU cache-based communication between two co-located virtual machines : https://github.com/IAIK/CJAG (Github) , https://www.blackhat.com/docs/asia-17/materials/asia-17-Schwarz-Hello-From-The-Other-Side-SSH-Over-Robust-Cache-Covert-Channels-In-The-Cloud.pdf (Slides)
Others :
10) ossec-hids : Open Source Host-based Intrusion Detection System that performs log analysis, file integrity checking, policy monitoring, rootkit detection, real-time alerting and active response : https://github.com/ossec/ossec-hids
11) Learn SQL from Scratch : http://www.oraappdata.com/2016/03/sql-introduction.html#.WN50z3WGNqO
12) Explain Shell : Write down a command-line to see the help text that matches each argument : http://explainshell.com/
13) iaito : A Qt and C++ GUI for radare2 reverse engineering framework : https://github.com/hteso/iaito
14) Learn Cryptography from scratch (Just for beginners / tutorial series*) : https://www.tutorialspoint.com/cryptography/index.htm
15) The Non-Technical Guide to Machine Learning & Artificial Intelligence : https://machinelearnings.co/a-humans-guide-to-machine-learning-e179f43b67a0
16) Hacker in the Wires : https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Phil-Polstra-Hacker-in-the-Wires.pdf (Slides)
Black Hat Whitepapers/Slides (2017) :
1) What Malware Authors Don't Want You to Know - Evasive Hollow Process Injection :
Whitepaper : https://www.blackhat.com/docs/asia-17/materials/asia-17-KA-What-Malware-Authors-Don't-Want-You-To-Know-Evasive-Hollow-Process-Injection-wp.pdf
Slides : https://www.blackhat.com/docs/asia-17/materials/asia-17-KA-What-Malware-Authors-Don't-Want-You-To-Know-Evasive-Hollow-Process-Injection.pdf
(Author : https://twitter.com/monnappa22)
2) Linux Malware Analysis using Limon Sandbox : https://cysinfo.com/10th-meetup-linux-malware-analysis/ (Slides & Demo both)
(Author : https://twitter.com/monnappa22 )
3) Keyshuffling Attack for Persistent Early Code Execution in Nintendo 3DS Secure Bootchain : https://github.com/Plailect/keyshuffling
4) Cross the Wall - Bypass All Modern Mitigation's Of Microsoft Edge : https://www.blackhat.com/docs/asia-17/materials/asia-17-Li-Cross-The-Wall-Bypass-All-Modern-Mitigations-Of-Microsoft-Edge.pdf (Slides)
5)DROP THE ROP : Fine Grained Control-Flow Integrity for The Linux Kernel : https://www.blackhat.com/docs/asia-17/materials/asia-17-Moreira-Drop-The-Rop-Fine-Grained-Control-Flow-Integrity-For-The-Linux-Kernel.pdf (Slides)
6) Exploiting USB/IP in Linux : https://www.blackhat.com/docs/asia-17/materials/asia-17-Korchagin-Exploiting-USBIP-In-Linux.pdf (Slides)
7) Abusing Kerberos for arbitrary impersonations and RCE : https://www.blackhat.com/docs/asia-17/materials/asia-17-Hart-Delegate-To-The-Top-Abusing-Kerberos-For-Arbitrary-Impersonations-And-RCE-wp.pdf (Whitepaper)
8) Fried Apples : Jailbreak DIY : https://www.blackhat.com/docs/asia-17/materials/asia-17-Bazaliy-Fried-Apples-Jailbreak-DIY.pdf (Slides)
9)CJAG : CPU cache-based communication between two co-located virtual machines : https://github.com/IAIK/CJAG (Github) , https://www.blackhat.com/docs/asia-17/materials/asia-17-Schwarz-Hello-From-The-Other-Side-SSH-Over-Robust-Cache-Covert-Channels-In-The-Cloud.pdf (Slides)
Others :
10) ossec-hids : Open Source Host-based Intrusion Detection System that performs log analysis, file integrity checking, policy monitoring, rootkit detection, real-time alerting and active response : https://github.com/ossec/ossec-hids
11) Learn SQL from Scratch : http://www.oraappdata.com/2016/03/sql-introduction.html#.WN50z3WGNqO
12) Explain Shell : Write down a command-line to see the help text that matches each argument : http://explainshell.com/
13) iaito : A Qt and C++ GUI for radare2 reverse engineering framework : https://github.com/hteso/iaito
14) Learn Cryptography from scratch (Just for beginners / tutorial series*) : https://www.tutorialspoint.com/cryptography/index.htm
15) The Non-Technical Guide to Machine Learning & Artificial Intelligence : https://machinelearnings.co/a-humans-guide-to-machine-learning-e179f43b67a0
16) Hacker in the Wires : https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Phil-Polstra-Hacker-in-the-Wires.pdf (Slides)
No comments:
Post a Comment