Pwndbg: A GDB Plugin Designed for Vulnerability Analysis

Pwndbg: A GDB Plugin Designed for Vulnerability Analysis

About Pwndbg Pwndbg is a GDB plugin specifically designed for security vulnerability analysis. This tool greatly simplifies the difficulty researchers face when using GDB for vulnerability analysis and debugging. It primarily focuses on the functionalities required by software developers, hardware hackers, reverse engineers, and vulnerability analysts. The original GDB is not suitable for reverse engineering … Read more

Pwndbg: A GDB Plugin Designed for Security Vulnerability Analysis

Pwndbg: A GDB Plugin Designed for Security Vulnerability Analysis

About Pwndbg Pwndbg is a GDB plugin specifically designed for security vulnerability analysis. This tool significantly simplifies the difficulty researchers face when using GDB for vulnerability analysis and debugging. It mainly focuses on the features required by software developers, hardware hackers, reverse engineers, and vulnerability analysts. The original GDB is not suitable for reverse engineering … Read more

Analysis of Windows TCP/IP Remote Code Execution Vulnerability (CVE-2020-16898)

Analysis of Windows TCP/IP Remote Code Execution Vulnerability (CVE-2020-16898)

CVE Number CVE-2020-16898 Vendor Microsoft/Windows Vulnerability Description Windows 10 version 1709 and above are affected by this vulnerability The vulnerability is caused by improper structure settings during the processing of the ICMPv6 protocol, leading to a stack overflow Vulnerability Impact Attackers can exploit this vulnerability to gain the highest system privileges R3(System) and kernel privileges … Read more

Research on Medium Risk Vulnerability in Self-Designed RISC-V Processor

Research on Medium Risk Vulnerability in Self-Designed RISC-V Processor

CNCERT National Engineering Research Center Author | Hu Wei, Professor at Northwestern Polytechnical University Zhang Jiaqi, National Engineering Research Center for Cybersecurity Emergency Technology Abstract:Processor security has become a hot research direction in recent years. In 2021, the first national key research and development project in the field of processor hardware security in China—the research … Read more

Vulnerability Analysis of Industrial Distributed Control Systems

Vulnerability Analysis of Industrial Distributed Control Systems

As one of the types of industrial control systems, Distributed Control Systems (DCS) are widely used to control critical infrastructure, distributed in the oil, chemical, metallurgy, cement, and water systems, serving as the “brain” for process operators. Their importance is self-evident. In the mid-1970s, decentralized control systems based on microprocessors emerged. After more than 30 … Read more

Testing and Analysis Report of Whitelist Products for Industrial Control Systems

Testing and Analysis Report of Whitelist Products for Industrial Control Systems

Author | National Internet Emergency Center, Du Peng 1. Background and Current Situation As the degree of digitization and intelligence of industrial control systems continues to improve, the traditional closed and isolated industrial environment is being broken, and the network security risks it faces are becoming increasingly severe. On one hand, viruses in the traditional … Read more

2023 Global Engineering Frontiers | Cyber-Physical Security of Industrial Control Systems

2023 Global Engineering Frontiers | Cyber-Physical Security of Industrial Control Systems

Industrial Control Systems (ICS) are systems composed of various automation acquisition, monitoring, and control components used for the automated operation and supervision of industrial infrastructure. ICS are mainly divided into data acquisition and monitoring systems, distributed control systems, and programmable logic controllers. Currently, ICS has become the neural hub and operational center of critical national … Read more