暂无搜索历史
许多iOS应用都包含一些越狱检测机制,有些会被攻击者绕过,有些却非常困难。之前我也在公众号上放了一篇iOS有反检测能力的越狱工具shadow的分析和检测,但没有...
在分析越狱工具shadow之前,所有越狱工具都是对进程进行注入挂钩来实现。注入从作用范围来看,分为两类:
HIDS的功能主要是依靠agent的数据收集功能, 所以HIDS的功能对比,实际上是agent的功能对比。
Wazuh:一款免费、开源的企业级安全监控解决方案,用于威胁检测、完整性监控、事件响应和合规性。
我非常不相信,因为该对象ID生成有随机因素,而且它的校验也有hash判断,只要校验不通过,立马会拒绝。
The Waterfall methodology uses a linear-sequential life-cycle approach,Each phas...
There have been several software development life cycle (SDLC) models developed ...
Quality can be defined as fitness for purpose.
四年前,我当时跟着“风辰”(刘文志)在商汤做自动驾驶。在那里呆了半年多,经过一些考虑,我还是决定做回信息安全,从而离开了商汤。
The recovery time objective (RTO) is the maximum time period within which a busi...
When a potential computer crime takes place, it is critical that the investigati...
There are many incident management models, but all share some basic characterist...
开源HIDS osquery的主机监控功能和实现原理。 osquery代码链接:osquery osquery表结构:表结构 本文是在安装它之后,从osq...
The steps of this generalized process are described here:
As any other defensive technique, physical security should be implemented by usi...
Administrative management is a very important piece of operational security. One...
An audit is a systematic assessment of the security controls of an information s...
A management review is a formal meeting of senior organizational leaders to dete...
Only after analyzing the results can you provide insights and recommendations th...
A preferred technique of attackers is to become “normal” privileged users of the...
暂未填写个人网址