SBK Blog


  • Categories

  • About

  • Archives

  • Tags

  • Sitemap

  • Search
Post Tree
  • Books Notes
    • 大眾文學
        • 13 Reasons Why(漢娜的遺言)
        • Ferryman(擺渡人)
        • 華麗なる一族(華麗一族)
        • 鹿の王(鹿王)
        • The Outcast(被放逐的孩子)
        • Billy Lynn's Long Halftime Walk(半場無戰事)
        • 一億円のさようなら(一億元的分手費)
        • 未來
        • Origin(起源)
        • 82년생 김지영(82年生的金智英)
        • The Kite Runner(追風箏的孩子)
        • Das Parfum – Die Geschichte eines Mörders(香水)
        • Het Achterhuis(安妮日記)
        • Tuesdays with Morrie(最後14堂星期二的課)
    • 工具書
        • 活色生香的希臘神話
        • The Reckoning: Financial Accountability and the Rise and Fall of Nations(大查帳:掌握帳簿就是掌握權力,會計制度與國家興衰的故事)
        • Prisoner’s Dilemma: John von Neumann, Game Theory, and the Puzzle of the Bomb(囚犯的兩難:賽局理論、數學天才馮紐曼,以及原子彈的謎題)
        • 日本神話:從創世神話到妖怪物語,奇巧、炫麗的神鬼世界
        • 北歐神話:神族、巨人、符文與世界之樹的冰火起源
        • 這才是真實的巴勒斯坦:以色列殖民、種族隔離下的抵抗與希望
        • 眭澔平地球長征之旅:有多遠走多遠
        • 烏克蘭的不可能戰爭:反抗,所以存在
        • 不為人知的都市傳說
        • 怖い絵(膽小別看畫)
        • 小說課之王:折磨讀者的祕密
        • 手繪圖解日本史:從上古到戰後,百則不可不知的日本歷史大事件一網打盡!
        • 無住之島:給臺灣青年世代居住正義的出路
        • Surveillance State: Inside China’s Quest to Launch a New Era of Social Control(監控國家:中國全力打造的數位烏托邦,一座不斷進化、從上到下集體共構的全景監獄)
    • 恐怖推理懸疑
        • 謎解きはディナーのあとで(推理要在晚餐後)
        • 砂の器(砂之器)
        • 怪談和尚の京都怪奇譚(京都怪奇談: 看遍怨靈、輪迴與冥界的愛恨嗔癡,日本高僧三木大雲親身遇見的「另一個世界」)
        • 日本恐怖實話:台日靈異交匯、鬼魅共襄盛舉;令人毛骨悚然的撞鬼怪談!
        • Hidden Pictures(詭畫連篇)
        • ゴメンナサイ(對不起)
        • ソロモンの偽証(所羅門的偽證-事件)
        • Choose Me(選擇)
        • The Puppet Show(歡迎觀賞殺人預告)
        • 変な家2 ~11の間取り図~(詭屋 2:11張平面圖)
    • 漫畫
        • Điện Biên Phủ(奠邊府戰歌)
        • cocoon コクーン(cocoon 繭:沖繩姬百合隊的血色青春)
    • 科幻
        • Vingt Mille Lieues sous les mers(海底兩萬里)
        • Do Androids Dream of Electric Sheep?(銀翼殺手)
        • Cat's Cradle(貓的搖籃)
        • タイム・リープ:あしたはきのう(時間跳躍的你來自昨日)
    • 純文學
        • 人間失格
        • L'Etranger(異鄉人)
        • Die Leiden des jungen Werthers(少年維特的煩惱)
        • 色彩を持たない多崎つくると、彼の巡礼の年(沒有色彩的多崎作和他的巡禮之年)
        • 傾城之戀【張愛玲百歲誕辰紀念版】:短篇小說集一 1943年
        • The Decameron (十日談)
        • Jane Eyre (簡愛)
        • ノルウェイの森(挪威的森林)
        • Pride and Prejudice(傲慢與偏見)
        • The Moon and Sixpence(月亮與六便士)
        • The Heart of The Matter(事物的核心)
  • Data Structure
      • Lecture 2
      • Lecture 4
      • Lecture 6
      • Lecture 8
      • Data Structure
      • Lecture 10
  • Job
    • Interview
        • TeamT5筆試題目筆記
        • Trapa Interview
  • Knowledge
      • AI Prompt
      • English Writing Vocabulary
      • 日本知名的漫畫相關獎項
      • 投資理財
      • 動漫出版社
  • LeetCode
    • Easy
        • LeetCode - Two Sum
        • LeetCode - Valid Parentheses
        • Merge Two Sorted Lists
  • Problem Solutions
      • sudo chmod 777 -R /usr Problem
      • fatal: Authentication failed for https://github.com/{username}/{repository}.git/
      • CreateProcessEntryCommon:586: Create process not expected to return
      • Unexpected fatal error while initializing python runtime
      • VirtualBox滑鼠無法跳出
      • WSL tty /dev/tty0
      • zshrc & Initial Library
      • 寫論文參考的工具或影片
      • UiAutomatorViewer 常見問題整理
      • WSL2 Cannot List Android Devices
      • Problems About Multiprocess
      • MITMProxy相關問題整理
      • How to adjust Endnote's Paragraph in Word
      • Endnote - Invalid Citation
      • Git Large File Error - Solution
      • React Native - Error resolving plugin [id: com.facebook.react.settings]
      • How to address docker compose not found
      • How to set up DNS to request risked website
      • How to address filtering unicode in search.xml
  • Security
    • Competition
        • EOF AIS3 Final
        • AIS3 Pre-Exam 2023
        • CSC 2023 決賽
        • CGGC 2023 初賽
        • DEADFACE CTF 2023
        • PicoCTF 2023
        • 神盾盃2023初賽
        • AIS3 EOF 2023 初賽
        • BalsnCTF 2023
        • AIS3 EOF 2024
        • TSCCTF 2024
        • AIS3 Pre-Exam 2025
    • Course
      • NTU CNS
        • NTU CNS Final Project Proposal
        • Cryptography and Network Security - Final Project
        • Cryptography and Network Security – HW0
        • Cryptography and Network Security – Homework 1
        • Cryptography and Network Security – Homework 2
        • Cryptography and Network Security – Homework 3
        • Cryptography and Network Security - Regular Critique 2
        • Cryptography and Network Security – Comparative Critique 1
        • Cryptography and Network Security – Comparative Critique 2
        • Cryptography and Network Security – Comparative Critique 3
        • Cryptography and Network Security – Regular Critique 3
        • Cryptography and Network Security – Regular Critique 4
      • NTU CS
        • Simple Crypto - 0x01(Modular Operation)
        • Simple Crypto - 0x03(Lab - LFSR)
        • NTU CS 2023 HW1 Write Up
        • Simple Crypto - 0x03(2023 Lab - COR)
        • Simple Crypto - 0x04(2023 Lab - POA)
        • Simple Crypto - 0x05(2023 Lab - LSB)
        • Simple Crypto - 0x06(2023 HW - LFSR)
        • Simple Crypto - 0x07(2023 HW - Oracle)
        • Simple Crypto - 0x08(2023 Lab - dlog)
        • Simple Crypto - 0x09(2023 Lab - signature)
        • Simple Crypto - 0x10(2023 Lab - coppersmith)
        • Simple Crypto 0x11(2023 HW - invalid_curve_attack)
        • Simple Crypto 0x12(2023 HW - signature_revenge)
        • Simple Crypto 0x13(2023 HW - Power Analysis)
        • Simple Crypto - 0x02(Random Number Generator - LCG)
        • Simple Buffer Overflow - 0x00
        • Simple Buffer Overflow - 0x02
        • Simple Buffer Overflow - 0x01
        • Simple Buffer Overflow - 0x05(Leak Canary)
        • Simple PWN - 0x07(ROP)
        • Simple PWN - 0x08(one_gadget with ROP)
        • Simple PWN - 0x14(Simple HEAP)
        • Simple PWN 0x17(UAF - leak information)
        • Simple PWN 0x19(Lab - `babyums` - flag 1)
        • Simple Buffer Overflow - 0x04
        • Simple PWN - 0x06(GOT hijacking/Lab - `got2win`)
        • Simple PWN - 0x09(stack pivoting)
        • Simple PWN - 0x10(`seccomp`/Lab - `rop2win`)
        • Simple PWN - 0x11(format string bug)
        • Simple PWN - 0x12(Lab - `rop++`)
        • Simple PWN - 0x13(Lab - `how2know`)
        • Simple PWN - 0x15(Lab - `heapmath`)
        • Simple PWN 0x16(simple_smallbin)
        • Simple PWN 0x18(Lab - `babynote`)
        • Simple PWN 0x20(Lab - `babyums` - flag 2)
        • Simple PWN 0x21(fopen, fread, fwrite, fclose)
        • Simple PWN 0x22(Lab - `AAR`)
        • Simple PWN 0x23(Lab - `AAW`)
        • NTU CS 2023 HW3 Write Up
        • Simple PWN 0x31(2023 HW - Notepad - Stage - 1)
        • Simple PWN 0x32(2023 HW - Notepad-Stage 2)
        • Simple PWN 0x33(2023 Lab - ROP_RW)
        • Simple PWN 0x34 (2023 Lab - ret2plt)
        • Simple PWN 0x35(2023 Lab - Stack Pivot)
        • Simple PWN 0x36(2023 HW - Notepad-Stage 3)
        • Simple PWN 0x37(2023 HW - HACHAMA)
        • Simple PWN 0x38(Lab - UAF)
        • Simple PWN 0x39(Lab - Double Free)
        • Simple PWN 0x40(2023 HW - UAF++)
        • NTU CS 2023 HW2 Write Up
        • Simple Reverse - 0x03(Lab - Why)
        • Simple Reverse 0x06(Lab - AMessageBox)
        • Simple Reverse 0x08(Lab - GetProcAddress)
        • Simple Reverse 0x11(Lab - Exception)
        • Simple Reverse 0x12(Lab - TLSCallback)
        • Simple Reverse 0x13(Lab - Meow)
        • Simple Reverse - 0x14(2023 Lab - AssemblyDev)
        • Simple Reverse - 0x15(2023 HW - crackme_vectorization)
        • Simple Reverse - 0x26(2023 HW - Banana Donut Verifier)
        • Simple Reverse - 0x27(2023 Lab - Scramble)
        • Simple Reverse - 0x28(2023 Lab - Super Angry)
        • Simple Reverse - 0x29(2023 Lab - Unpackme)
        • Simple Reverse - 0x30(2023 HW - Evil FlagChecker)
        • Simple Reverse - 0x01(Lab - Sacred Arts)
        • Simple Reverse - 0x16(2023 Lab - WinMalware - sub_140001C80)
        • Simple Reverse - 0x17(2023 Lab - WinMalware - sub_140001030)
        • Simple Reverse - 0x18(2023 Lab - WinMalware - sub_140001120)
        • Simple Reverse - 0x19(2023 Lab - WinMalware - Extract Next Stage Payload)
        • Simple Reverse - 0x20(2023 Lab - WinMalware - Extract Next Stage Payload - 2)
        • Simple Reverse - 0x21(2023 Lab - WinMalware - Extract Next Stage Payload - 3)
        • Simple Reverse - 0x22(2023 Lab - WinMalware - Collect)
        • Simple Reverse - 0x23(2023 Lab - WinMalware - Exfiltrate)
        • Simple Reverse - 0x24(2023 Lab - WinMalware - Dynamic API Resolution Background)
        • Simple Reverse - 0x25(2023 Lab - WinMalware - 作業)
        • Simple Reverse 0x30(2023 HW - Baby Ransom 1)
        • Simple Reverse 0x31(2023 HW - Baby Ransom 2)
        • Simple Web 0x01(Lab - Hello from Windows 98)
        • Simple Web 0x16(Lab - Pickle)
        • Simple Web 0x17(Lab - Baby Cat)
        • Simple Web 0x23(Lab - XXE)
        • Simple Web - 0x02(Lab - Whois Tool)
        • Simple Web - 0x03(Lab - Normal Login Panel (Flag 1))
        • Simple Web - 0x04(Lab - Normal Login Panel (Flag 2))
        • Simple Web - 0x08(Lab - `Particles.js`)
        • Simple Web - 0x09(Lab - Simple Note)
        • Simple Web 0x18(Lab - Magic Cat)
        • Simple Web 0x12(Lab - Web Preview Card)
        • NTU CS 2023 HW4 Write Up
        • Simple Web 0x42(2023 HW - Double Injection - FLAG2)
        • Simple Web 0x41(2023 HW - Double Injection - FLAG1)
        • Simple Welcome - 0x04(Lab - Script)
        • NTU CS HW0 Write Up
        • Simple Welcome 0x01(Lab - Let's meet at class)
        • Simple Welcome 0x02 & 0x05(Lab - Nine & Nine-Revenge)
      • NTU CT
        • NTU Compiler Technology Project 2
        • NTU Compiler Technology Project 3
        • NTU Compiler Technology Project 1
        • NTU Compiler Technology Previous Exam 2019 Spring
        • NTU Compiler Technology Previous Exam 2020 Spring
        • NTU Compiler Technology Project 4
      • NTU Crypto
        • Cryptography Lec 2(Historical Ciphers) - Notes
        • Cryptography Lec 1(Overview) - Notes
        • Cryptography Lec 3(Mathematical Background) - Notes
        • Cryptography Lec 4(Information Theory) - Notes
        • Cryptography Lec 5(Symmetric Key Cryptography) - Notes
        • Cryptography Lec 6(Key Agreement Protocol) - Notes
      • NTU ML
        • NTU Machine Learning Final Project Proposal Notes
        • NTU Machine Learning Final Project Proposal Notes
        • Machine Learning Hand-write Homework & Answer
        • NTU Machine Learning Homework 1
        • NTU Machine Learning Homework 2
      • NTU MR
        • NTU Malware Reverse Lab 2 write up
        • NTU Malware Reverse HW 1 write up
        • NTU Malware Reverse HW 2 write up
        • NTU Malware Reverse HW 3 write up
        • NTU Malware Reverse Lab 1 write up
        • NTU Malware Reverse Lab 3 write up
        • NTU Malware Reverse Final Project Notes
      • NTU OS
        • NTU Operating System Project 1
        • NTU Operating System Project 2
        • NTU Operating System Project 3
        • NTU Operating System Review Notes
      • NTU PADNS
        • A&D of Network Security - Lab 2
        • A&D of Network Security Note
        • A&D of Network Security - Lab 7
        • A&D of Network Security - Lab 12
        • A&D of Network Security - Lab 3
        • A&D of Network Security - Lab 13
        • A&D of Network Security - Lab 14
        • A&D of Network Security - Lab 4(ARP & DNS SPOOFING)
      • NTU ST
        • Unit Test Practice
        • NTU Software Testing Notes
        • NTU Software Testing Notes
      • NTUST ISC
        • NTUSTISC - AD Note - Lab(查詢本地使用者)
        • NTUSTISC - AD Note(Lab - 查詢網域使用者)
        • NTUSTISC - AD Note - Lab(Leak Password)
        • NTUSTISC - AD Note - Lab(偵測查詢的操作)
        • NTUSTISC - AD Note - Lab(查詢網域群組)
        • NTUSTISC - AD Note - Lab(當前網域控制站(DC))
        • NTUSTISC - AD Note - Lab(環境調查BloodHound)
        • NTUSTISC - AD Note - Lab(利用弱點)
        • NTUSTISC - AD Note - Lab(Hijack Token)
        • NTUSTISC - AD Note - Lab(偵測提權)
        • NTUSTISC - AD Note - Lab(錯誤配置)
        • NTUSTISC - AD Note - 環境建置 & Background
        • NTUSTISC - AD Note - 會後提及有用的工具
        • NTUSTISC - AD Note - Lab(Brute Force SAM)
        • NTUSTISC - AD Note - Lab(Password Spraying)
        • NTUSTISC - AD Note - Lab(偵測密碼揮灑)
        • NTUSTISC - AD Note - Lab(透過Mimikatz取得Local Admin的NTLM)
        • NTUSTISC - AD Note - Lab(偵測LSASS)
        • NTUSTISC - AD Note - Lab(其他方法得到lsass.dmp)
        • NTUSTISC - AD Note - Lab(顯示Mimikatz的明文)
        • NTUSTISC - AD Note - Lab(無法Reboot的時盜取Passwd)
        • NTUSTISC - AD Note - Lab(AS-REP Roasting)
        • NTUSTISC - AD Note - Lab(遠端執行(RDP))
        • NTUSTISC - AD Note - Lab(遠端執行(RDP)2)
        • NTUSTISC - AD Note - Lab(SMB遠端讀寫)
      • NTUST WS
        • Simple Web 0x24(Lab - how2http)
        • Simple Web 0x09(Lab - DNS Lookup Tool)
        • Simple Web 0x10(Lab - DNS Lookup Tool | WAF)
        • Simple Web 0x15.5(Pickle)
        • Simple Web 0x16(Lab - Pickle)
        • Simple Web 0x16.5(php unserialize)
        • Simple Web 0x17(Lab - Baby Cat)
        • Simple Web 0x23(Lab - XXE)
        • Simple Web 0x18(Lab - Magic Cat)
        • Simple Web 0x11(Lab - XSS Me)
        • Simple Web 0x01(Lab - `gitleak`)
        • Simple Web 0x02(Lab - `.DS_Store`)
        • Simple Web 0x07(Lab - `HakkaMD`)
        • Simple Web 0x08(Lab - My First Meow Website)
        • Simple Web 0x19(Lab - PHP Login)
        • Simple Web 0x03(Lab - Log me in + Revenge)
        • Simple Web 0x13(Lab - SSRFrog)
        • Simple Web 0x14(Lab - Debug)
        • Simple Web 0x12(Lab - Web Preview Card)
        • Simple Web 0x22(Lab - Pug)
        • Simple Web 0x15(Lab - `Jinja`)
        • Simple Web 0x04(Lab - Image Space 0x01)
        • Simple Web 0x05(Lab - Image Space 0x02)
        • Simple Web 0x06(Lab - Image Space 0x03)
      • Tai.HolyHigh
        • TaiwanHolyHigh - SoC基礎維運 - ArcSight教學
        • TaiwanHolyHigh - SoC基礎維運 - HW2
        • TaiwanHolyHigh - Windows Forensics - $MFT Background
        • TaiwanHolyHigh - Windows Forensics - $MFT Resident / Non-Resident File
        • TaiwanHolyHigh - Windows Forensics - $MFT 基本實作
        • TaiwanHolyHigh - Windows Forensics - Background
        • TaiwanHolyHigh - Windows Forensics - LNK Lab
        • TaiwanHolyHigh - Windows Forensics - Windows Artifacts
        • TaiwanHolyHigh - Windows Forensics - Windows檔案系統與還原
    • Practice
      • Adworld
        • Adworld - pure_color
        • Adworld - 心儀的公司
        • Adworld - 適合作為桌面
        • Adworld - 3-1
        • Adworld - Misc文件類型
        • Adworld - miao~
      • BTLO
        • BTLO - Meta
        • BTLO - Shiba Insider
        • BTLO - Bruteforce
        • BTLO - Follina
        • BTLO - Log Analysis -Compromised WordPress
        • BTLO - Paranoid
        • BTLO - Secrets
        • BTLO - Phishing Analysis
      • CrewCTF
        • CrewCTF - :-1: Questions
        • CrewCTF - Attaaaaack 1-13
        • CrewCTF - Encrypt10n(Part 1)
        • CrewCTF - Encrypt10n(Part 2)
        • CrewCTF - OhPHP
        • CrewCTF - ez rev
        • CrewCTF - sequence_gallery
      • CyberDefender
        • CyberDefender - KrakenKeylogger
        • CyberDefender - BlackEnergy
        • CyberDefender - RedLine
        • CyberDefender - Spotlight
        • CyberDefender - CorporateSecrets (Part 1)
        • CyberDefender - CorporateSecrets (Part 2)
        • CyberDefender - CorporateSecrets (Part 3)
        • CyberDefender - CorporateSecrets (Part 4)
        • CyberDefender - Hunter (Part 1)
        • CyberDefender - Hunter (Part 2)
        • CyberDefender - Hunter (Part 3)
        • CyberDefender - MrRobot - POS
        • NTUSTISC - CyberDefender - MrRobot - Target 1
        • CyberDefender - MrRobot - Target 2
        • CyberDefender - Szechuan Sauce (Part 1)
        • CyberDefender - Szechuan Sauce (Part 2)
        • CyberDefender - PoisonedCredentials
        • CyberDefender - PsExec Hunt
        • CyberDefender - Tomcat Takeover
        • CyberDefender - WebStrike
        • CyberDefender - GrabThePhisher
        • CyberDefender - Intel101
        • CyberDefender - L'espion
      • HackTheBox
        • HackTheBox
      • NISRA
        • NISRA - Hidden?
        • Background
        • NISRA 2023 Enlightened - Jack的flag
        • NISRA 2023 Enlightened - Magic Function
        • NISRA 2023 Enlightened - Pixel
        • NISRA - different places
        • NISRA - MD5_1
        • NISRA - MD5_2
      • PicoCTF
        • PicoCTF - Easy Peasy Or Bad Questions
        • PicoCTF - Compress and Attack
        • PicoCTF - Easy Peasy
        • PicoCTF - New Caesar
        • PicoCTF - Sequences
        • PicoCTF - XtraORdinary
        • PicoCTF - Double DES
        • PicoCTF - AES-ABC
        • PicoCTF - Mind your Ps and Qs
        • PicoCTF - Mini RSA
        • PicoCTF - No Padding, No Problem
        • PicoCTF - It's Not My Fault 1
        • PicoCTF - Dachshund Attacks
        • PicoCTF - SRA
        • PicoCTF - Scrambled: RSA
        • PicoCTF - Very Smooth
        • PicoCTF - corrupt-key-1
        • PicoCTF - NSA Backdoor
        • PicoCTF - john_pollard
        • PicoCTF - PowerAnalysis Part 1 / Part 2
        • PicoCTF - PW Crack 4
        • PicoCTF - Special & Specialer
        • PicoCTF - flag_shop
        • PicoCTF - mus1c
        • PicoCTF - information
        • PicoCTF - Surfing the Waves
        • PicoCTF - Sleuthkit Intro
        • PicoCTF - Disk, disk, sleuth! II
        • PicoCTF - Pitter, Patter, Platters
        • PicoCTF - Operation Oni
        • PicoCTF - Operation Orchid
        • PicoCTF - `Wireshark doo dooo do doo...`
        • PicoCTF - Trivial Flag Transfer Protocol
        • PicoCTF - Wireshark twoo twooo two twoo...
        • PicoCTF - shark on wire 1
        • PicoCTF - WPA-ing Out
        • PicoCTF - Eavesdrop
        • PicoCTF - Torrent Analyze
        • PicoCTF - WebNet0
        • PicoCTF - scrambled-bytes
        • PicoCTF - shark on wire 2
        • PicoCTF - Matryoshka doll
        • PicoCTF - MacroHard WeakEdge
        • PicoCTF - File types
        • PicoCTF - WhitePages
        • PicoCTF - like1000
        • PicoCTF - Investigative Reversing 0
        • PicoCTF - SideChannel
        • PicoCTF - `tunn3l v1s10n`
        • PicoCTF - advanced-potion-making
        • PicoCTF - m00nwalk
        • PicoCTF - c0rrupt
        • PicoCTF - m00nwalk2
        • PicoCTF - Guessing Game 1
        • PicoCTF - Guessing Game 2
        • PicoCTF - Kit Engine
        • PicoCTF - RPS
        • PicoCTF - SaaS
        • PicoCTF - Stonk Market
        • PicoCTF - Unsubscriptions Are Free
        • PicoCTF - VNE
        • PicoCTF - babygame01
        • PicoCTF - babygame02
        • PicoCTF - buffer overflow 2
        • PicoCTF - fermat-strings
        • PicoCTF - filtered-shellcode
        • PicoCTF - flag leak
        • PicoCTF - function overwrite
        • PicoCTF - hijacking
        • PicoCTF - ropfu
        • PicoCTF - seed-sPRiNG
        • PicoCTF - stack cache
        • PicoCTF - tic-tac
        • PicoCTF - two-sum
        • PicoCTF - x-sixty-what
        • PicoCTF - Transformation
        • PicoCTF - ARMssembly 0
        • PicoCTF - Easy as GDB
        • PicoCTF - Forky
        • PicoCTF - Let's get dynamic
        • PicoCTF - No way out
        • PicoCTF - OTP Implementation
        • PicoCTF - Picker III
        • PicoCTF - Powershelly
        • PicoCTF - Wizardlike
        • PicoCTF - asm4
        • PicoCTF - droids1
        • PicoCTF - droids3
        • PicoCTF - droids4
        • PicoCTF - gogo
        • PicoCTF - not crypto
        • PicoCTF - SQLiLite
        • PicoCTF - Insp3ct0r
        • PicoCTF - Scavenger Hunt
        • PicoCTF - Cookies
        • PicoCTF - dont-use-client-side
        • PicoCTF - It is my Birthday
        • PicoCTF - Some Assembly Required 1
        • PicoCTF - Who are you?
        • PicoCTF - Some Assembly Required 2
        • PicoCTF - Super Serial
        • PicoCTF - caas
        • PicoCTF - Secrets
        • PicoCTF - JAUTH
        • PicoCTF - JaWT Scratchpad
        • PicoCTF - Java Code Analysis!?!
        • PicoCTF - Java Script Kiddie
        • PicoCTF - More SQLi
        • PicoCTF - Some Assembly Required 3
        • PicoCTF - notepad
        • PicoCTF - Most Cookies
      • Portswigger Web Security Academy
        • CSRF - APPRENTICE
        • Lab: CSRF where token is tied to non-session cookie
        • Lab: CSRF where token is not tied to user session
        • Lab: CSRF where token validation depends on request method
        • Lab: CSRF where token validation depends on token being present
        • Deserialization - APPRENTICE
        • Lab: Arbitrary object injection in PHP
        • Lab: Modifying serialized data types
        • Lab: Exploiting Java deserialization with Apache Commons
        • Lab: Using application functionality to exploit insecure deserialization
        • Lab: SQL injection UNION attack, determining the number of columns returned by the query
        • Lab: SQL injection UNION attack, finding a column containing text
        • Lab: SQL injection UNION attack, retrieving data from other tables
        • Lab: SQL injection UNION attack, retrieving multiple values in a single column
        • Lab: SQL injection attack, listing the database contents on Oracle
        • Lab: SQL injection attack, listing the database contents on non-Oracle databases :four:
        • Lab: SQL injection attack, querying the database type and version on MySQL and Microsoft
        • Lab: SQL injection attack, querying the database type and version on Oracle
        • SQLi - APPRENTICE
        • Lab: DOM XSS in `document.write` sink using source `location.search` inside a select element
        • Lab: Stored DOM XSS
        • XSS - APPRENTICE
        • Lab: Exploiting XXE via image file upload
        • Lab: Exploiting `XInclude` to retrieve files
        • XXE - APPRENTICE
        • Lab: Blind XXE with out-of-band interaction via XML parameter entities
        • Lab: Blind XXE with out-of-band interaction
        • Lab: Exploiting blind XXE to exfiltrate data using a malicious external DTD
        • Lab: Exploiting blind XXE to retrieve data via error messages
  • Side Project
      • A Hybrid Facial Expression Recognition System Based on Facial Features and Pose Estimation
      • Special Topic of Tzu-Chi at TCIVS
      • side_project_lightbulb_control
      • side_project_weibo_hot
  • Survey Papers
    • Android + Security
        • A Mitmproxy-based Dynamic Vulnerability Detection System For Android Applications
        • Exploiting ML ALG for Efficient Detection and Prevention of JS-XSS Attacks in Android Based Hybrid Applications
        • Uncovering Intent based Leak of Sensitive Data in Android Framework
        • Understanding Real-world Threats to Deep Learning Models in Android Apps
        • WIGHT: Wired Ghost Touch Attack on Capacitive Touchscreens
        • Cross-site Scripting Attacks on Android Hybrid Applications
        • A MITM Based Penetration Test Efficiency Improvement Approach for Traffic-Encrypted Mobile Apps of Power Industry
        • VAPTAi: A Threat Model for Vulnerability Assessment and Pentesting of Android and iOS Mobile Banking Apps
        • Identifying vulnerabilities of SSL/TLS certificate verification in Android apps with static and dynamic analysis
      • GUI Testing
        • Fastbot: A Multi-Agent Model-Based Test Generation System
        • Fastbot2: Reusable Automated Model-based GUI Testing for Android Enhanced by Reinforcement Learning
      • Tool
        • Pentest Tools Survey
        • 有關Pentest但貢獻很爛的三篇論文
    • Crypto
        • How to Securely Collaborate on Data: Decentralized Threshold HE and Secure Key Update - Notes
    • Digital Currency
        • The State of Ethereum Smart Contracts Security: Vulnerabilities, Countermeasures, and Tool Support - Notes
    • Federated Learning
        • EIFFeL: Ensuring Integrity For Federated Learning - Notes
        • FedML-HE - An Efficient Homomorphic-Encryption-Based Privacy-Preserving Federated Learning System - Notes
        • Local Model Poisoning Attacks to Byzantine-Robust Federated Learning - Notes
    • ML-DL + Security
        • DEEPCASE Semi-Supervised Contextual Analysis of Security Events - Notes
        • DeepLog: Anomaly Detection and Diagnosis from System Logs through Deep Learning
  • Terminology
      • What is DevOps, MLOps, CI/CD?
      • What is IDS, IPS, EDR, MDR, NSM, SIEM?
      • Linux Related
      • Network Related
      • Node Related
      • Android Related
      • /wp-admin VS /wp-content VS /wp-include VS /wp-json
      • Reinforcement Learning
      • Math Related
      • Programming Related
  • Tools
    • CTF
        • Forensics Cheat Sheet
        • Misc Cheat Sheet
        • PWN Overview
        • Reverse Overview
        • 利用Metasploit Framework測試一些網站
        • Web Cheat Sheet
        • Crypto Cheat Sheet
        • All Pentest Tools
    • Others
        • $\LaTeX$ 語法筆記
        • Command Cheat Sheet
        • Useful Link
        • Real World Tools
        • Docker Cheat Sheet
        • 有問題的網站
      • Android App Crawler
        • App Crawler Overview
        • Fastbot Android
        • App Crawler 無法使用紀錄
        • AppCrawler
        • Maxim
        • Droidbot
      • Android Related
        • Drozer Cheat Sheet
        • Test DIVA - activity exported
        • Test DIVA - content provider exported - DB Based
        • Test Sieve - activities exported
        • Test Sieve - broadcast receivers exported
        • Test Sieve - content providers exported - DB Based
        • Test Sieve - content providers exported - File SystemBased
        • Test Sieve - is debuggable
        • Test Sieve - services exported
        • Drozer/MobSF Installation
        • Test Sieve by MobSF
      • Directory Fuzzing - Traversal Tools
        • Directory Fuzzing/Traversal Tools
        • WFuzz
  • Trip
      • 2025日本自由行
  • Tutorial
      • How to install LogonTracer
      • How to use VScode / Web Storm Debug JS
      • pwndbg installation problems
      • How to use ZAP/Burp Suite/mitmproxy as Proxy for Android
      • How to check if the paper is Top Conference or Q1 Journal
      • How to Root Android Phone and Install AlwaysTrustUserCert.zip Module
      • How to install aab file
      • How to use Mailgun/Resend as SMTP server
      • How to build apk file on React-Native Project
      • How to download blob videos
      • 如何使用Hugo+Github架設網站
      • 如何使用Jekyll架設Blog
      • Add Third-Party Service to Jekyll
      • Add Custom Sidebar to Left Side
  • 原始文章
      • Categories
      • Elements
      • Link Post
      • Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aliquam justo turpis, tincidunt ac convallis id.
      • Tags
      • 中文測試
      • 日本語テスト
      • Block
      • Excerpts
      • Images
      • MathJax with Jekyll
      • Gallery Post
      • Emoji Test
      • Highlight Test
      • Next Theme Tutorial

Drozer Cheat Sheet

Posted on 2024-06-04 | Post modified | In Tools/Others/Android Related/Drozer |

Drozer Cheat Sheet

Read more »

Pentest Tools Survey

Posted on 2024-06-03 | Post modified | In Survey Papers/Android + Security/Tool |

Mobile Application Security Penetration Testing Based on OWASP

Read more »

VAPTAi: A Threat Model for Vulnerability Assessment and Pentesting of Android and iOS Mobile Banking Apps

Posted on 2024-06-02 | Post modified | In Survey Papers/Android + Security |

VAPTAi: A Threat Model for Vulnerability Assessment and Penetration Testing of Android and iOS Mobile Banking Apps

Read more »

Command Cheat Sheet

Posted on 2024-05-22 | Post modified | In Tools/Others |

Command Cheat Sheet

Read more »

A MITM Based Penetration Test Efficiency Improvement Approach for Traffic-Encrypted Mobile Apps of Power Industry

Posted on 2024-05-16 | Post modified | In Survey Papers/Android + Security |

A MITM Based Penetration Test Efficiency Improvement Approach for Traffic-Encrypted Mobile Applications of Power Industry

Read more »

Cross-site Scripting Attacks on Android Hybrid Applications

Posted on 2024-05-15 | Post modified | In Survey Papers/Android + Security |

Cross-site Scripting Attacks on Android Hybrid Applications

Read more »

What is IDS, IPS, EDR, MDR, NSM, SIEM?

Posted on 2024-05-14 | Post modified | In Terminology |
  1. IDS(Intrusion Detection System, 入侵偵測系統) 簡答: 從名字就可以看的出來,他是針對流入流出的各種封包的偵測系統,也就是獨立於Firewall的旁之,如果他有檢測到封包內有什麼異常的Payload或是pattern,就會跳出告警,但就僅只於此,不會再做更多的操作 詳答: What is IDS(Intrusion Detection Systems)?

    入侵偵測系統(Intrusion Detection System,IDS)是用來偵測資訊系統或網路上潛在的惡意破壞活動

    • 網路型入侵偵測系統(NIDS):主要是由一個或多個偵測器,加上收集與分析資料的主控臺所組成,可以分析每個通過的網路封包,並與已知的攻擊特徵進行比對,如果符合某項攻擊特徵,系統就會啟動防護機制,例如發簡訊或命令防火牆中斷該連線。
    • 主機型入侵偵測系統(HIDS):是從主機系統稽核日誌檔演進而來,必須在主機上安裝代理程式﹙Agent﹚,負責監視主機內部的程序,並監控記錄檔與可疑活動,若有任何系統事件都會被記錄至日誌檔,並與攻擊特徵資料庫比對,判斷主機是否遭到攻擊
    • 誘捕型入侵偵測系統(Deception Systems):目的是偵測未經授權的活動,任何進出誘捕系統的封包都會被認定是可疑的。但它卻是受到爭議的產品,有些廠商認為誘捕型系統只適合學術研究,因為它誘導駭客上勾,因此收集的證據無法用來起訴駭客
  2. IPS(Intrusion Prevention System, 入侵防禦系統) IPS就是要改進上述的問題,他主打的就是偵測到快快的東西就會主動的防禦掉,但這樣還是有一個問題,現今的攻擊手法越來越多種,而且有時候是那種可以包裝成安全落地的形式,必須要在本地端監控才有辦法知道
  3. EDR(Endpoint Detection and Response, 端點偵測與應對) EDR就是在做這樣的事情,可是有可能會有一個疑問,每個人的主機內不是都有安裝那種傳統的Windows Defenders或是小紅傘那種東西,為什麼還需要有EDR,其實現今的攻擊手法已經有很大的變化,有可能單純看個人的裝置會看不出個所以然,必須要聯合其他的裝置一起做關聯性的比對才會知道目前是不是正在遭受攻擊,所以EDR強大的地方在於他做到各個裝置endpoint端點的串聯,讓資安事件的偵測和防禦可以更嚴謹,這也是中小型企業最需要的資安產品
  4. MDR(Managed Detection and Response, 受管式偵測與應對) 這東西其實就是一個EDR+SOC的服務衍生的產品,但ddaa說這個東西要做出市場區隔可能還沒有到太創新
  5. What is NSM(Network Security Monitors)?

    NSM主要目的是偵測、找出入侵者,提高能見度。它建立在「我們一定會被攻擊,而且最終防禦一定會被突破」的思惟上。假設意志堅決的駭客最終打穿我們辛苦建立的防禦,但只要能在入侵者進一步破壞、感染系統前偵測、做出回應,讓入侵者無法達到目的,便能阻擋這波攻擊 NSM不是等接收IDS/IPS等等資安設備觸發警示後才開始收集,而是平時便預先主動收集資料,提供NSM平台審視、分析,強化可見度,主動找出入侵軌跡

  6. What is SIEM(Security Information and Event Management)

    SIEM的功能和一般日誌管理工具類似,都會將來自不同伺服器和設備的日誌和事件紀錄集中在一個地方 (通常是Log server伺服器本身硬碟或特定的儲存池Storage pool),避免日誌和紀錄隨著機器故障遺失,符合稽核要求,可以進行關鍵字或日期查詢,所以也有人直接用日誌管理工具來進行分析 功能

    • 彙整、解讀多項系統設備日誌
    • 資料圖形化
    • SIEM具備強大的比對Correlation 功能 e.g.帳號登入失敗、創建新帳號、帳號權限提升等等可能是攻擊行為也可能是網管的正常登入,要看一連串的流量或封包資料才能判斷$\to$耗費人力
    • 整合其他資安工具或資安服務
Read more »

What is DevOps, MLOps, CI/CD?

Posted on 2024-05-14 | Post modified | In Terminology |

什麼是 DevOps?

:::spoiler

DevOps 簡而言之,就是 Development + Operations ,也就是開發與維運。但大部分的文章都會說是「開發」「測試」「維運」三者的結合。如同下面這張圖想表示的意義一樣,當三者有了交集,即是 DevOps

DevOps 想要達成的目標為何?

從 Patrick Debois 發現的問題與參考葉大一句話囊括 DevOps 的目標一文,可以了解,最大的目標即為速度。「天下武功,唯快不破」,從發現需求到產品上線的時間越短,能得到的回饋與市場也就越大;但快還不夠,還要好,也就是要有品質!如果只有快,而沒有品質,只是更快把 bug 上線,並破壞企業名聲而已。如何兼顧速度與品質,即為 DevOps 的主要目標。 DevOps 到底在做什麼?

為何會出現 DevOps ,相信已經有個感覺了。那它究竟在做些什麼事呢?

有文章會提到用 CALMS 的角度來說明 DevOps 的要領,這是下列五個英文單字的縮寫:

  • Culture
  • Automation
  • Lean
  • Measurement
  • Sharing

這是了解 DevOps 概念的好方向之一。

什麼是MLOps?-30 Days of MLOps

:::spoiler

用最短的一句話來解釋它的話,MLOps 就是 Machine Learning 的 DevOps 在 Machine Learning 團隊中,除了資料科學家、資料工程師、DevOps 工程師作為固定班底外,協作單位還有產品經理、後端工程師等等。我們要讓所有人可以彼此良好的協作,這需要依賴更好的維運架構。除了最直覺想到的 Model 部署外,常見的挑戰還有例如:訓練 Model、測試與分析 Model、資料的預處理等等。

  • CI/CD是什麼?一篇認識CI/CD工具及優勢,將日常瑣事自動化 :::spoiler

What is CI/CD

CI/CD工具也是為了此概念(DevOps)而產生的自動化工具,透過持續整合、持續部署的方式,在開發階段就自動協助開發人員偵測程式碼問題,並部署至伺服器


CI(Continuous Integration)持續整合

持續整合(Continuous Integration,CI)顧名思義,就是當開發人員完成一個階段性的程式碼後就經由自動化工具測試、驗證,協助偵測程式碼問題,並建置出即將部署的版本(Build)

CD(Continuous Deployment)持續部署

持續部署(Continuous Deployment)可以說是CI的下一階段,經過CI測試後所構建的程式碼可以透過CD工具部署至伺服器,減少人工部署的時間。


CI/CD工具1:GitHub

GitHub是眾所皆知的Git Server網站,其CI/CD服務稱為GitHub Action,提供了多項控制API,能夠幫助開發者編排、掌握工作流程,在提交程式碼後自動編譯、測試並部署至伺服器,讓每位開發者都能受惠於平台本身自有的CI/CD功能。

CI/CD工具2:GitLab

GitLab主要的服務是提供git版本控制系統,其CI/CD Pipeline功能簡單又實用,使用者只需要設定於專案根目錄下的「.gitlab-ci.yml」檔,便可以開始驅動各種Pipeline協助您完成自動化測試及部署。目前有提供GitLab CE(社群版)與 GitLab EE(企業版)兩種,使用者可以根據自己的需求選擇適合不同的方案。

CI/CD工具3:Anthos

由Google所推出的Anthos是一款能幫助企業迅速部署混合雲架構的跨雲管理平台。若是企業資源龐大且分佈於多雲環境,每一次的更新與維護都需要針對不同架構調整,將會大幅提升管理應用程式的負擔,而透過Anthos便可以將複雜的多雲環境以統一形式呈現,加速開發人員管理應用程式,一次完成多雲部署,建立更敏捷、高效的應用程式維運環境。

CI/CD VS DevOps

From ChatGPT: 簡單來說,DevOps 和 CI/CD 是有關聯但範圍不一樣的概念:

  • DevOps(Development + Operations)是一個文化、理念、做事方法,目標是促進開發(Dev)和運維(Ops)團隊合作,加速產品從開發到部署的流程,讓軟體能更快、更穩定地交付。
    • 內容可以很廣,包括:自動化部署、基礎設施即程式(IaC)、監控、回報機制、團隊溝通等等。
  • CI/CD(Continuous Integration / Continuous Delivery or Deployment)則是實現DevOps目標的一組具體技術流程。
    • CI(Continuous Integration):持續整合,指的是開發人員經常(一天多次)將程式碼推送到版本庫,並透過自動化建置、測試,確保每次提交都是穩定的。
    • CD(Continuous Delivery / Deployment):
      • Delivery:持續交付,指的是程式碼通過測試後可以隨時部署到生產環境,只是可能還要人手下指令。
      • Deployment:持續部署,則是程式碼一通過測試就自動部署到生產環境,不需人工干預。 簡單一句話總結:
  • DevOps 是一個大範圍的文化跟目標,CI/CD 是實現這個目標的方法和工具之一。
Read more »

DeepLog: Anomaly Detection and Diagnosis from System Logs through Deep Learning

Posted on 2024-05-14 | Post modified | In Survey Papers/ML-DL + Security |

DeepLog: Anomaly Detection and Diagnosis from System Logs through Deep Learning

Read more »

DEEPCASE Semi-Supervised Contextual Analysis of Security Events - Notes

Posted on 2024-05-14 | Post modified | In Survey Papers/ML-DL + Security |

DEEPCASE Semi-Supervised Contextual Analysis of Security Events - Notes

Read more »
1 … 10 11 12 … 60
SBK6401

SBK6401

595 posts
111 categories
73 tags
RSS
GitHub
© 2022 - 2025 SBK6401
Powered by Jekyll
Theme - NexT.Mist