文档介绍了Capture The Flag (CTF)比赛的基本概念、题目类型和赛制,包括常见的攻击与防御方式,以及如何参与和学习CTF。文中详细描述了不同题目如逆向工程、网络安全、密码学和取证分析的特点与要求,同时列出了知名CTF比赛和学习资源。CTF比赛类别包括Jeopardy、Attack & Defense和King of the Hill等,并包含了入门及进阶的赛事推荐。
Anonymity is the price to pay for privacy 2017 06-03Jun LI
?
In this talk Ivan go through some examples to show how your privacy can be leaked ,how your privacy got abuse by the ad companies, or adversaries, he also shows us some practical measures we can use to protect our privacy ,at least mitigate the leakage of our precious privacy ;)
Application of threat intelligence in security operation 2017-06-03Jun LI
?
This document discusses applying threat intelligence in security operations. It describes collecting data from various logs and security sensors to analyze attack events and restore attack scenes. Threat intelligence is used to trace attacks back to attackers by analyzing their behaviors, tools, and infrastructure using attributes extracted from security logs. Examples show how log analysis and threat intelligence can be used to identify vulnerabilities exploited by attackers, map out attack processes, and profile past behaviors to characterize attackers and inform defensive strategies.
Android bug hunting from finding bugs to getting bounty 2017-06-03Jun LI
?
The document presents an overview of vulnerabilities in the Android operating system, detailing the focus of the c0re team on discovering zero-day vulnerabilities and suggesting methods for reporting them. It categorizes common vulnerability types, highlights specific cases with severity ratings, and discusses reward structures for bug reporting. The document also emphasizes the importance of security in Android and the need for high-quality vulnerability submissions to Google’s vulnerability reward program.
Anonymity is the price to pay for privacy 2017 06-03Jun LI
?
In this talk Ivan go through some examples to show how your privacy can be leaked ,how your privacy got abuse by the ad companies, or adversaries, he also shows us some practical measures we can use to protect our privacy ,at least mitigate the leakage of our precious privacy ;)
Application of threat intelligence in security operation 2017-06-03Jun LI
?
This document discusses applying threat intelligence in security operations. It describes collecting data from various logs and security sensors to analyze attack events and restore attack scenes. Threat intelligence is used to trace attacks back to attackers by analyzing their behaviors, tools, and infrastructure using attributes extracted from security logs. Examples show how log analysis and threat intelligence can be used to identify vulnerabilities exploited by attackers, map out attack processes, and profile past behaviors to characterize attackers and inform defensive strategies.
Android bug hunting from finding bugs to getting bounty 2017-06-03Jun LI
?
The document presents an overview of vulnerabilities in the Android operating system, detailing the focus of the c0re team on discovering zero-day vulnerabilities and suggesting methods for reporting them. It categorizes common vulnerability types, highlights specific cases with severity ratings, and discusses reward structures for bug reporting. The document also emphasizes the importance of security in Android and the need for high-quality vulnerability submissions to Google’s vulnerability reward program.