博客
关于我
强烈建议你试试无所不能的chatGPT,快点击我
Security Ressources Sites
阅读量:2436 次
发布时间:2019-05-10

本文共 5724 字,大约阅读时间需要 19 分钟。

Security Ressources Sites

Operating systems architecture

PitBull Foundation OS-Level Security

PitBull Foundation Secure Application Environment
Writing ia32 alphanumeric shellcodes
Intrusion Detection Systems

NIDS Placement in the Real World

Polymorphic Shellcodes vs. Application IDSs
Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection
Evasion, Traffic Normalization, and End-to-End Protocol Semantics
Cisco routers

Improving Security on Cisco Routers

Defining Strategies to Protect Against UDP Diagnostic Port Denial of Service Attacks
Configuring Context-Based Access Control (PDF)
Configuring Context-Based Access Control (HTML)
Cisco Router Guides
Cisco Password Recovery
Cisco 2500 series help
Password Recovery Procedure for the Cisco 2600 Series Routers
Denial of Service attacks

Trends os Denial of Service Attack Technology

Firewalls

Guide to Firewall: Selection and Policy Recommandations:

FTP and Firewalls
Real Stateful TCP Packet Filtering in IP Filter
A Stateful Inspection of FireWall-1
PhoneBoy's FireWall-1 FAQ
NIST's SP 800-41 Guidelines on Firewalls and Firewall Policy
Information Warfare

IWAR Range: A Laboratory for Undergraduate Information Assurance Education

Oracle security

Specialists in Security and Oracle

Programming

Programming Languages - C - C99

Cheating the ELF - Subversive Dynamic Linking to Libraries
Tool Interface Standard (TIS) Executable and Linking Format (ELF) Specification Version 1.2
Intel Architecture Software Developer's Manual Volume 1: Basic Architecture
Intel Architecture Software Developer's Manual Volume 2: Instruction Set Reference Manual
Intel Architecture Software Developer's Manual Volume 3: System Programming Guide
SPARC Assembly Language Reference Manual
Syscall Proxying - Simulating Remote Execution
FreeBSD Developers' Handbook: x86 Assembly Language Programming
Secure Programming for Linux and Unix HOWTO (PDF)
Secure Programming for Linux and Unix HOWTO (HTML)
Secure UNIX Programming FAQ
The Secure Pprogramming Standards Methodology Manual
Setuid Demystified
The Peon's Guide To Secure System Development
15 Tips for Secure Win32 Programming
Buffer overflow vulnerabilities exploitation technics

Smashing The Stack For Fun And Profit

The Frame Pointer Overwrite (Off-by-one exploits)
Once Upon a free()
En Francais, tres complet, aborde tous les types de vulnerabilitees exploitables
SPARC Buffer Overflows (DEFCON 8, July 28, 2000, Las Vegas, NV.)
Writing buffer overflow exploits - a tutorial for beginners
Syscall Proxying - Simulating Remote Execution
Exploiting Buffer Overflows under Windows environment

Exploiting Windows NT 4 Buffer Overruns
Non-Stack Overflows on Windows
Exploitation of UNICODE Buffer Overflows
Format string vulnerabilities exploitation technics

Howto remotely and automatically exploit a format bug

Format string vulnerability
Exploiting format string vulnerabilities
Format Bugs: What are they, Where did they come from, ... How to exploit them
Analysis of Format Strings Bugs
Howto exploit OpenBSD 2.7 ftpd format string
Other vulnerability types exploitation

Deliver signals for fun and profit

Basic Integer Overflows - by blexim
Secure programming and protection mecanisms

Insecure Programming by example

Many resources on exploiting
UNIX Assembly Codes Development for Vulnerabilities Illustration Purposes (HTML)
UNIX Assembly Codes Development for Vulnerabilities Illustration Purposes (PDF)
Win32 Assembly Components
Using Environment for returning into Lib C
Secure Programming
A Buffer Overflow Study, Attacks & Defenses
Buffer Overflows: Attacks and Defenses for the Vulnerability of the Decade
Bypassing StackGuard and StackShield
Multiple vulnerabilities in stack smashing protection technologies
A practical approach for defeating Nmap OS-Fingerprinting
Security policy related papers

Internet Security Policy: A Technical Guide

Introduction to Security Policies, Part One: An Overview of Policies
Information Security involves a set of engineering processes
OCTAVE Threat Profiles
Common Criteria for IT Security Evaluation
Wireless LAN related papers

Wireless Access Points and ARP Poisoning:

All you want to know about WLAN
Practical Exploitation of RC4 Weaknesses in WEP Environments
Fingerprinting

Passive OS Fingerprinting: Details and Techniques

Microsoft security

SecurityFocus Links

Windows 2000 Guides
Cryptanalysis of Microsoft's PPTP Authentication Extensions (MS-CHAPv2) (HTML)
Cryptanalysis of Microsoft's PPTP Authentication Extensions (MS-CHAPv2) (PDF)
Building a Windows NT Bastion Host in Practice
Layer 2 protocols

Detection of Promiscuous Nodes Using ARP Packets

Certifications

CISSP Open Study Guides

Spoofing

Spoofing with different protocols

Network protocols

ICMP Usage In Scanning Research

The Hping2 Idle Host Scan
Security Problems in the TCP/IP Protocol Suite
Operating systems

Secure Deletion of Data from Magnetic and Solid-State Memory

Cross-site scripting vulnerabilites

Malicious HTML Tags Embedded in Client Web Requests

Full explanation, with useful links
Cross-Site Scripting Web Vulnerability
Web-based attacks

Exploiting Common Vulnerabilities in PHP Applications

SQL Injection Are Your Web Applications Vulnerable
Advanced SQL Injection In SQL Server Applications
Hackproofing Oracle Application Server, David Litchfield
Assessing IIS Configuration Remotely
Fingerprinting Port80 Attacks
SQL insertion
Brute-Force Exploitation of Web Application Session IDs
Web security

z/OS WebSphere and J2EE Security Handbook

Reverse Engineering

Many links on the subject, bookmarks from Dave Dittrich

Encryption

The end of SSL and SSH ?

Sniffing

Sniffing (network wiretap, sniffer) FAQ

Misc.

Password recovery tools

The Unix Auditor's Practical Handbook

转载地址:http://fxqmb.baihongyu.com/

你可能感兴趣的文章
移动通信概要(转)
查看>>
CMD命令全集(转)
查看>>
实例解析:高效率网吧组网解决方案(转)
查看>>
深度探索C++对象模型 ( 第四部分 )(转)
查看>>
MySQL中的SQL特征(转)
查看>>
使用JBuilder和WTK2.2搭建MIDP1.0和MIDP2.0开发环境(转)
查看>>
Symbian命名规则(翻译)(转)
查看>>
windows server 2003的设置使用(转)
查看>>
优化Win2000的NTFS系统(转)
查看>>
IE漏洞可使黑客轻易获取私人信息(转)
查看>>
脱机备份与恢复实战(转)
查看>>
WLINUX下的DNS服务器设置(转)
查看>>
游戏引擎剖析(二)(转)
查看>>
sms发mms C语言源码(转)
查看>>
窝CDMA网络中移动IP接入Internet(转)
查看>>
实现MMS增值业务的关键技术(转)
查看>>
Vista被破解 一个小程序可成功激活(转)
查看>>
SEO作弊常见方法和形式(转)
查看>>
蓝芽技术的原理和应用(2)(转)
查看>>
ACCESS默认保存路径的修改方法(转)
查看>>