mirror of
https://github.com/pe3zx/my-infosec-awesome.git
synced 2024-12-12 09:34:26 -05:00
Add new section in exploitation techniques called "Trusted Execution"
"Trusted execution" basically an execution of malicious binary via signed/trusted program, bypassing various security protection.
This commit is contained in:
parent
55396a2713
commit
cff3f29598
@ -249,6 +249,13 @@ My curated list of awesome links, resources and tools
|
|||||||
- [X86 EXPLOITATION 101: “HOUSE OF SPIRIT” – FRIENDLY STACK OVERFLOW](https://gbmaster.wordpress.com/2015/07/21/x86-exploitation-101-house-of-spirit-friendly-stack-overflow/)
|
- [X86 EXPLOITATION 101: “HOUSE OF SPIRIT” – FRIENDLY STACK OVERFLOW](https://gbmaster.wordpress.com/2015/07/21/x86-exploitation-101-house-of-spirit-friendly-stack-overflow/)
|
||||||
- [Your First Buffer Overflow](https://medium.com/@mackwage/your-first-buffer-overflow-89141a9a2941)
|
- [Your First Buffer Overflow](https://medium.com/@mackwage/your-first-buffer-overflow-89141a9a2941)
|
||||||
|
|
||||||
|
|
||||||
|
#### Trusted Execution
|
||||||
|
|
||||||
|
**Various techniques to execute malicious binary with trusted, bypassing security protection**
|
||||||
|
|
||||||
|
- [Execute unsigned binary via signed Tracker.exe (required Tracker.exe and TrackerUI.dll)](https://twitter.com/sudhanshu_c/status/943011972261412864?ref_src=twcamp%5Eshare%7Ctwsrc%5Eios%7Ctwgr%5Eother)
|
||||||
|
|
||||||
##### Use-After-Free
|
##### Use-After-Free
|
||||||
|
|
||||||
**Use-After-Free related arcitles**
|
**Use-After-Free related arcitles**
|
||||||
|
Loading…
Reference in New Issue
Block a user