以下に記載する本やサイトを参考にして色々遊ぶとアンチウイルス企業のマルウェア解析とかの仕事を任せられるようになります。
順番はめちゃくちゃです(思い出した順に書いています)
なんか気になるのがあったら適当に手にとる感じでどうぞ。
-
Hacking:美しき策謀 第2版 ――脆弱性攻撃の理論と実際
-
リバースエンジニアリング ――Pythonによるバイナリ解析技法
| using System; | |
| using System.IO; | |
| using System.Runtime.InteropServices; | |
| //Resource: https[:]//vx-underground.org/papers.html -> Windows VX -> INJECTION -> Win32 Callback Injection (Author(s): Dreamer && Clover) | |
| namespace Callback_Inject | |
| { | |
| class Program | |
| { |
| <# | |
| ================ | |
| PATCHEXTRACT.PS1 | |
| ================= | |
| Version 1.25 Microsoft MSU Patch Extraction and Patch Organization Utility by Greg Linares (@Laughing_Mantis) | |
| This Powershell script will extract a Microsoft MSU update file and then organize the output of extracted files and folders. | |
| Organization of the output files is based on the patch's files and will organize them based on their archicture (x86, x64, or wow64) | |
| as well as their content-type, ie: resource and catalog files will be moved to a JUNK subfolder and patch binaries and index files will |
以下に記載する本やサイトを参考にして色々遊ぶとアンチウイルス企業のマルウェア解析とかの仕事を任せられるようになります。
順番はめちゃくちゃです(思い出した順に書いています)
なんか気になるのがあったら適当に手にとる感じでどうぞ。
Hacking:美しき策謀 第2版 ――脆弱性攻撃の理論と実際
リバースエンジニアリング ――Pythonによるバイナリ解析技法
| import twint | |
| def get_followers(username): | |
| c = twint.Config() | |
| c.Username = username | |
| c.Profile_full = True | |
| c.Store_csv = True | |
| c.Output = "followers.csv" | |
| twint.run.Followers(c) |
| build: main.go | |
| GOOS=linux GOARCH=amd64 go build -o hello | |
| zip: build | |
| zip handler.zip ./hello |
| *.37nhmdszo2ltkkfo.onion | |
| *.56m4joozvkzlx6ln.onion | |
| *.analytics.qklykfiomrwjhdz4.onion | |
| *.api.37nhmdszo2ltkkfo.onion | |
| *.api.dev.nytimes3xbfgragh.onion | |
| *.api.nytimes3xbfgragh.onion | |
| *.api.s5rhoqqosmcispfb.onion | |
| *.api.stg.nytimes3xbfgragh.onion | |
| *.blogs.nytimes3xbfgragh.onion | |
| *.blogs.stg.nytimes3xbfgragh.onion |
| PATH=$(cd $(dirname $1);pwd) | |
| echo $PATH | |
| /bin/mkdir -p ${PATH}imges | |
| /usr/local/bin/wrestool -x 1 -o ${PATH}images | |
| /bin/mkdir -p output | |
| /usr/local/bin/icotool -x -o output ${PATH}images/* |
| 0-100.com | |
| 0-6.com | |
| 0-gold.net | |
| 00.net | |
| 000219.com | |
| 00042.com | |
| 0005pz.com | |
| 0006266.com | |
| 0007.net | |
| 000dn.com |
| from pwn import * | |
| context(os='linux', arch='i386') | |
| HOST = 'chall.pwnable.tw' | |
| PORT = 10102 | |
| PRINT_NOTE_FN = 0x804862b | |
| LIBC_READ_OFFSET = 0xd41c0 | |
| LIBC_SYSTEM_OFFSET = 0x3a940 |