unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Search
Rss
黑夜模式
Immutable Strings in Java – Are Your Secrets Still Safe?
How Java’s Immutability Exposes Sensitive Data in Android Apps and BeyondIntroductionAt...
2025-11-11 19:2:38 | 阅读: 17 |
收藏
|
Include Security Research Blog - blog.includesecurity.com
memory
immutable
collector
security
attacker
Production Security, Not That Kind
本文分析了Allen & Heath SQ-6音频混音器的安全性,探讨了其网络控制、移动应用及物理访问等攻击面,并发现移动应用存在认证绕过漏洞及MIDI服务无认证访问等问题。...
2025-10-3 19:33:51 | 阅读: 8 |
收藏
|
Include Security Research Blog - blog.includesecurity.com
network
mixer
allen
heath
midi
LLMs in Applications – Understanding and Scoping Attack Surface
文章探讨了大型语言模型(LLMs)在应用中的安全性问题,分析了其对攻击面的影响及潜在风险,并提出了通过限制模型访问权限和加强外部安全控制来减少漏洞的方法。...
2025-7-17 19:1:53 | 阅读: 72 |
收藏
|
Include Security Research Blog - blog.includesecurity.com
llm
security
chatbot
scoping
malicious
Misinterpreted: What Penetration Test Reports Actually Mean
文章探讨了渗透测试报告的常见误解,指出漏洞不代表失败、"干净"报告未必可靠、并非所有发现都需要修复,并强调安全是持续过程而非完美结果。...
2025-5-27 16:27:16 | 阅读: 2 |
收藏
|
Include Security Research Blog - blog.includesecurity.com
security
client
development
testers
Cross-Site WebSocket Hijacking Exploitation in 2025
本文探讨了跨站WebSocket劫持(CSWSH)漏洞及其在现代浏览器中的缓解情况。CSWSH利用WebSocket协议缺乏同源策略保护的特点,允许恶意网站通过用户浏览器发起攻击。文章分析了浏览器安全改进(如SameSite=Lax默认设置、Firefox的Total Cookie Protection和Chrome的Private Network Access)对CSWSH的影响,并通过案例研究展示了这些改进如何限制了CSWSH的可利用性。作者建议开发者在服务器端验证WebSocket握手请求来源以防御此类攻击。...
2025-4-17 18:59:37 | 阅读: 18 |
收藏
|
Include Security Research Blog - blog.includesecurity.com
cswsh
samesite
chrome
network
lax
Memory Corruption in Delphi
文章探讨了Delphi/Object Pascal语言的内存安全问题,尽管被归类为“内存安全”语言,但通过构造栈溢出和堆使用后释放等示例代码,展示了潜在的内存腐败漏洞,并提供了开发建议以避免相关风险。...
2025-3-13 18:55:16 | 阅读: 42 |
收藏
|
Include Security Research Blog - blog.includesecurity.com
memory
delphi
obj2
obj1
corruption
Replacing a Space Heater Firmware Over WiFi
本文探讨了Govee智能电热器的固件更新漏洞。研究人员通过中间人攻击劫持固件更新过程,成功植入恶意固件并完全控制设备。该漏洞源于未验证的HTTP固件更新机制。尽管厂商计划修复漏洞并召回产品,但未提供明确时间表。...
2025-2-4 20:0:59 | 阅读: 28 |
收藏
|
Include Security Research Blog - blog.includesecurity.com
firmware
ota
govee
uart
heater
Spelunking in Comments and Documentation for Security Footguns
When we perform security assessments at Include Security, we like to have a holistic view of th...
2024-11-21 03:0:43 | 阅读: 23 |
收藏
|
Include Security Research Blog - blog.includesecurity.com
security
library
hop
redirecturl
footguns
Vulnerabilities in Open Source C2 Frameworks
Application and source code security assessments are the primary focus of our work at Include S...
2024-9-19 03:23:24 | 阅读: 53 |
收藏
|
Include Security Research Blog - blog.includesecurity.com
teamserver
c2
sliver
havoc
agents
Coverage Guided Fuzzing – Extending Instrumentation to Hunt Down Bugs Faster!
We at IncludeSec sometimes have the need to develop fuzzing harnesses for our clients as part o...
2024-4-26 02:30:28 | 阅读: 16 |
收藏
|
Include Security Research Blog - blog.includesecurity.com
jerryscript
jerry
ecma
buildid
Discovering Deserialization Gadget Chains in Rubyland
At Include Security we spend a good amount of time extending public techniques and creating new...
2024-3-14 02:32:24 | 阅读: 36 |
收藏
|
Include Security Research Blog - blog.includesecurity.com
marshal
dry
rails
payload
privatecall
Improving LLM Security Against Prompt Injection: AppSec Guidance For Pentesters and Developers – Part 2
Summary of Key PointsThis is part two of the series of blog posts on prompt injection....
2024-2-9 03:42:3 | 阅读: 39 |
收藏
|
Include Security Research Blog - blog.includesecurity.com
embedding
injection
embeddings
poem
llm
Improving LLM Security Against Prompt Injection: AppSec Guidance For Pentesters and Developers
By Abraham Kang, Managing Consultant, Include SecuritySummaryPrompt Injection is the Ac...
2024-1-24 04:36:10 | 阅读: 34 |
收藏
|
Include Security Research Blog - blog.includesecurity.com
llm
injection
gpt
robots
denied
Think that having your lawyer engage your penetration testing consultancy will help you? Think again.
Guest Post: Neil Jacobs (deals with cyber law stuff)Many companies engage their pen tes...
2023-10-27 00:0:0 | 阅读: 41 |
收藏
|
Include Security Research Blog - blog.includesecurity.com
client
attorney
advice
consultant
capital
Impersonating Other Players with UDP Spoofing in Mirror
Mirror is an open-source multiplayer game framework for Unity. The history of Mirror is pretty...
2023-4-19 00:0:0 | 阅读: 20 |
收藏
|
Include Security Research Blog - blog.includesecurity.com
mirror
sn
client
attacker
kcp
Mitigating SSRF in 2023
Server-Side Request Forgery (SSRF) is a vulnerability that allows an attacker to trick a server...
2023-3-21 00:6:37 | 阅读: 26 |
收藏
|
Include Security Research Blog - blog.includesecurity.com
ssrf
library
flask
network
attacker
Hacking Unity Games with Malicious GameObjects, Part 2
Hello again!In the last post I talked about a way I found to execute arbitrary code in Unit...
2022-9-14 00:0:0 | 阅读: 33 |
收藏
|
Include Security Research Blog - blog.includesecurity.com
unity
prefab
unityengine
gameobject
animation
Reverse Engineering Windows Printer Drivers (Part 2)
In our blog last post (Part 1), we discussed how you can find and extract drivers from executab...
2022-8-31 00:0:0 | 阅读: 34 |
收藏
|
Include Security Research Blog - blog.includesecurity.com
dot4
driverentry
ghidra
ctl
windows
Reverse Engineering Windows Printer Drivers (Part 1)
Note: This is Part 1 in a series of posts discussing security analysis of printer drivers extra...
2022-8-6 00:0:0 | 阅读: 38 |
收藏
|
Include Security Research Blog - blog.includesecurity.com
printer
wework
windows
kext
analysis
Hunting For Mass Assignment Vulnerabilities Using GitHub CodeSearch and grep.app
This post discusses the process of searching top GitHub projects for mass assignment vulnerabil...
2022-7-27 02:0:55 | 阅读: 24 |
收藏
|
Include Security Research Blog - blog.includesecurity.com
github
mass
assignment
stars
Previous
-1
0
1
2
3
4
5
6
Next