Industrial Control System Information Security

Industrial Control System Information Security

Quoted from: “Intelligent Manufacturing Information Security Technology” (Authors: Qin Zhiguang, Nie Xuyun, Qin Zhen) This book has been published, for details please see the end~ 「 1. Overview of Industrial Control Systems」 Industrial control systems (ICS) refer to a general term for various types of control systems, including monitoring and data acquisition systems and distributed … Read more

Practical Exploitation of CoAP Protocol Vulnerabilities

Practical Exploitation of CoAP Protocol Vulnerabilities

This article is an excellent piece from the Kanxue Forum. Kanxue Forum Author ID: Feng Yi Ying Han It seems that there is very little content related to the CoAP protocol on domestic security forums like Kanxue, and the CVEs mainly involve vulnerabilities in the CoAP protocol library. Therefore, I will organize and record my … Read more

CVE-2020-16898: Windows TCP/IP Remote Code Execution Vulnerability

CVE-2020-16898: Windows TCP/IP Remote Code Execution Vulnerability

This article is a highlight from the Kanxue Forum. Author from Kanxue ForumID: Toxic Table of Contents 1. Vulnerability Information 1.1 Brief Description 1.2 Component Overview 1.3 Exploitation 1.4 Impact 1.5 Solutions 2. Vulnerability Reproduction 2.1 Environment Setup 2.2 Reproduction Process 3. Vulnerability Analysis 3.1 Basic Information 3.2 Background Knowledge 3.2.1 Basic Knowledge 3.2.2 Terminology … Read more

House of Cat: New GLIBC IO Exploitation Techniques

House of Cat: New GLIBC IO Exploitation Techniques

This article is a highlight from the Kanxue Forum Author ID on Kanxue Forum: CatF1y House of Cat A new method of exploiting IO in GLIBC discovered in May, applicable to any version (including glibc2.35), named House of Cat and presented in the 2022 Strong Network Cup. Introduction House of Emma is one of the … Read more

Sharing Ideas on Strong Network Cup S8 Rust Pwn Chat-With-Me Problem

Sharing Ideas on Strong Network Cup S8 Rust Pwn Chat-With-Me Problem

1 Problem-Solving Ideas The final number of solutions for this problem is 42, as the difficulty level is not high and generally meets expectations. The problem is coded in Rust, and it was decided to remove symbols without providing the source code the night before the competition. This not only made it very difficult for … Read more

Time To Abandon 32-Bit Linux For 64-Bit

Time To Abandon 32-Bit Linux For 64-Bit

Introduction:If you want a secure experience, you might not want to continue using the 32-bit Linux kernel.                  This article has 1234 words, reading time is about: 2 minutes We have many Linux distributions tailored for 32-bit systems🔗 itsfoss.com. So, why do I want to discourage the use … Read more

IoT Device Firmware Security Monitoring Report

IoT Device Firmware Security Monitoring Report

1. Overview In recent years, the Internet of Things (IoT) has been deeply integrated with technologies such as 5G, artificial intelligence, blockchain, big data, and IPv6, leading to a continuous emergence of new technologies, products, and models. With the acceleration of digital transformation and intelligent upgrading of the economy and society, IoT has been widely … Read more

Research on Security Vulnerability Detection of External SDKs in Android Systems

Research on Security Vulnerability Detection of External SDKs in Android Systems

SDK(Software Development Kit, SDK) is a set of tools for Android application developers, including basic information about hardware platforms, software protocol frameworks, operating systems, etc. Its purpose is to improve the development efficiency of Android applications. Most Android apps developed by many software vendors are generally based on existing SDKs, and products are developed based … Read more

Design of a Firmware Bluetooth Protocol Vulnerability Mining Framework Based on Virtualization

Design of a Firmware Bluetooth Protocol Vulnerability Mining Framework Based on Virtualization

Abstract:In recent years, the application of Bluetooth devices has become increasingly widespread. If there are vulnerabilities in Bluetooth devices, it may lead to information leakage, economic losses, and other consequences. However, the firmware updates for Bluetooth devices are often delayed, and some cannot even perform hot updates. Currently, there is a relative lack of tools … Read more

Injection Issues with PDO

Injection Issues with PDO

Disclaimer Any direct or indirect consequences and losses caused by the dissemination and use of the information provided in this article shall be borne by the user. Thunder God Testing and the author of the article shall not bear any responsibility for this. Thunder God Testing reserves the right to modify and explain this article. … Read more