資安檢測服務比較 最近在面試的時候有些題目會讓我們比較幾種資安檢測的方式有甚麼差異,因為我覺得我好像也不是了解得很清楚,所以決定做個筆記紀錄一下。 下面比較幾個容易混亂的服務: 源碼檢測、弱點掃描、滲透測試、紅隊演練 源碼檢測只有這種方式屬於白箱檢測,會使用自動化工具對程式碼進行靜態分析,找出目標系統的程式弱點。掃描的工具上,付費軟體常見的有Micro Focus Fortify以及IBM Security App 2022-10-16 Learning Note #CyberSecurity #SecurityTesting #interview
python3 ssh 傳檔案 本地這邊需要安裝 openssh-client伺服器那邊需要安裝 openssh-server 指令從本地傳到遠端$ scp 要傳的檔案 遠端的帳號@遠端的位置(可以是ip,也可以是網址):遠端要傳檔案的資料夾。 1 $ scp FileName "User"@server:server-location/ {enter} EX : 以limiu 2022-04-05 Environment stuff #python #ssh
Writeup-split file split 1234$ file splitsplit: ELF 64-bit LSB executable, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, for GNU/Linux 3.2.0, BuildID[sha1]=98755e64e1d0c1b 2022-01-12 Writeup #CyberSecurity #PWN #CTF
Writeup-pass use file <file> to take a look. It’s ELF file. 1234$ file passpass: ELF 64-bit LSB executable, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, BuildID[sh 2022-01-10 Writeup #CyberSecurity #PWN #CTF
Algo-Greedy Activity-Selection problempseudocode 123456789Greedy-Activity-Selectors(s,f) n = s.length A = {a[1]} k = 1 for m = 2 to n if s[m] >= f[k] A = A ∪ {a[m]} k = m return A py 2021-11-16 Learning Note #Algorithm #python
Algo-DP The rod-cutting problem (1-D)pseudocode 12345678910Bottom-up-cut-rod(p,n) let r[0..n] and s[0..n] be new arrays r[0] ← 0 for j ← 1 to n do //compute r[j] r[j] ← -∞ for i ← 1 to j do if r[j] < 2021-11-07 Learning Note #Algorithm #python
ROP 返回導向程式設計(Return-Oriented Programming)是電腦安全中的一種漏洞利用技術,該技術允許攻擊者在程式啟用了安全保護技術(如堆疊不可執行)的情況下控制程式執行流,執行惡意程式碼。 其核心思想是通過stack overflow等方式控制stack呼叫以劫持程式控制流並執行針對性的機器語言指令序列(稱為Gadgets)。 Gadgets :以 ret (machine cod 2021-11-03 Learning Note #CyberSecurity #PWN #CTF
Writeup-ret2sc file ret2sc to take a look. 1234$ file ret2scret2sc: ELF 64-bit LSB executable, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, for GNU/Linux 2.6.32, BuildID[sh 2021-11-01 Writeup #CyberSecurity #PWN #CTF
Writeup-ret2win file ret2win, gdb-peda checksec take a look. 1234$ file ret2winret2win: ELF 64-bit LSB executable, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, for GNU/Linu 2021-11-01 Writeup #CyberSecurity #PWN #CTF
Writeup-gohome use file <file> to take a look. It’s a ELF file, not stripped.1234$ file gohomegohome: ELF 64-bit LSB executable, x86-64, version 1 (SYSV), dynamically linked,interpreter /lib64/ld-linux-x86-64 2021-11-01 Writeup #CyberSecurity #PWN #CTF