2015-12-23 10:22:51 来源:360安全播报 阅读:15次 点赞(0) 收藏
分享到:
http://randywestergren.com/reverse-engineering-the-yik-yak-android-app/
http://intothesymmetry.blogspot.it/2015/12/small-subgroup-attack-in-mozilla-nss.html
https://tersesystems.com/2015/12/22/an-easy-way-to-secure-java-applications/
https://blog.cloudflare.com/why-its-harder-to-forge-a-sha-1-certificate-than-it-is-to-find-a-sha-1-collision/
https://vimeo.com/album/3682874
https://github.com/dellis23/ispy
http://www.scmagazine.com/devastating-flaws-in-kerberos-authentication-protocol/article/459792/
http://resources.infosecinstitute.com/docker-and-enterprise-security-establishing-best-practices/
https://www.youtube.com/playlist?list=PLdIqs92nsIzQvvbTiWLLjZOVE7jPBDomw
http://itsjack.cc/blog/2015/12/jumping-the-fence-how-detecting-malicious-php-files-isnt-that-easy/
https://blog.skullsecurity.org/2015/sans-hackfest-writeup-hackers-of-gravity
https://packetstormsecurity.com/files/135028/CVE-2015-0057.zip
https://ge0n0sis.github.io/posts/2015/12/exploring-androids-selinux-kernel-policy/
https://jyx.jyu.fi/dspace/bitstream/handle/123456789/47956/978-951-39-6437-5_vaitos15122015.pdf?sequence=1
http://hackaday.com/2015/12/21/reverse-engineering-the-arm-alu/
http://www.itgovernance.co.uk/blog/list-of-flash-vulnerabilities-in-2015/?utm_source=social&utm_medium=reddit
本文由 360安全播报 原创发布,如需转载请注明来源及本文地址。本文地址:http://bobao.360.cn/news/detail/2529.html