http://p1.qhimg.com/t01ee0ded1a480b06ce.jpg

1、使用derusbi来绕过windows 驱动签名

http://www.sekoia.fr/blog/windows-driver-signing-bypass-by-derusbi/

2、PoS恶意软件的闪耀之处

https://www.trustwave.com/Resources/SpiderLabs-Blog/Shining-the-Spotlight-on-Cherry-Picker-PoS-Malware/?page=1&year=0&month=0


3、独立平台的PIC加载DLL和执行命令的汇编代码

https://odzhan.wordpress.com/2015/11/17/asmcodes-pic/

4、介绍Chuckle和SMB签名的重要性

https://www.nccgroup.trust/uk/about-us/newsroom-and-events/blogs/2015/november/introducing-chuckle-and-the-importance-of-smb-signing/


5、dnscat2发布:现在支持通信加密了

https://blog.skullsecurity.org/2015/dnscat2-now-with-crypto

6、应用密码学课程

http://crypto.stanford.edu/~dabo/cryptobook/draft_0_2.pdf


7、BSIDES Charleston 2015 – IAVA 2015-A-0127 Walkthrough and POC Exploit

https://www.securifera.com/blog/2015/11/17/bsides-charleston-2015-iava-2015-a-0127-walkthrough-and-poc-exploit/

8、预览Sony Ps4上的取证技术

http://www.sciencedirect.com/science/article/pii/S1742287615000146


9、VolatilityBot:自动化恶意代码dumper

http://blog.fightingmalware.com/blog/?p=221

10、分析ddos木马

http://resources.infosecinstitute.com/analyzing-a-ddos-trojan/


11、说一说dridex中的下载者功能

http://www.cert.pl/news/10832

12、网络共享磁盘被恶意欺诈软件加密后,如何追查受感染的PC

http://researchcenter.paloaltonetworks.com/2015/11/network-shared-drive-encrypted-by-cryptowall-how-to-track-down-the-infected-pc/


13、卡巴斯基报告:对2016网络安全的趋势预测

https://securelist.com/analysis/kaspersky-security-bulletin/72771/kaspersky-security-bulletin-2016-predictions/

14、rext:路由器利用框架

https://github.com/j91321/rext


15、Flush+Flush: 一个隐秘的最后一级缓存攻击

http://arxiv.org/abs/1511.04594

文章原文链接:https://www.anquanke.com/post/id/82943