unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Search
Rss
黑夜模式
When AI Understands Code: Prompt Injection to RCE
嗯,用户让我总结一篇文章,控制在一百个字以内,而且不需要特定的开头。首先,我需要仔细阅读文章内容,理解其主要观点。 文章主要讨论了AI,特别是大型语言模型(LLMs)在网络安全中的应用及其潜在风险。LLMs被嵌入到开发工具中,帮助审查代码和扫描漏洞。但这也带来了新的威胁,比如提示注入攻击,可能导致远程代码执行。 接下来,我需要提取关键点:LLMs的作用、提示注入的定义、攻击链、防御策略等。然后,用简洁的语言把这些要点浓缩到100字以内。 要注意避免使用“这篇文章”或“内容总结”这样的开头,直接描述文章内容。同时,保持语言流畅自然。 最后,检查字数是否符合要求,并确保信息准确传达。 </think> 文章探讨了大型语言模型(LLMs)在网络安全中的应用及其潜在风险。LLMs嵌入开发工具中帮助审查代码和扫描漏洞,但其处理代码的方式可能导致提示注入攻击和远程代码执行。文章分析了LLMs的工作原理、注入攻击机制及防御策略,并强调需将AI输出视为不可信输入以减少风险。...
2026-4-8 10:14:53 | 阅读: 8 |
收藏
|
Security Café - securitycafe.ro
injection
security
llms
llm
attacker
Mobile Pentesting 101 – The Death of ADB Backup: Modern Data Extraction in 2026
嗯,用户让我总结这篇文章的内容,控制在一百个字以内,而且不需要特定的开头。首先,我需要通读整篇文章,抓住主要观点。 文章主要讲的是ADB备份命令在Android 12之后的变化,以及如何绕过这些限制。提到了四种方法:root提取、run-as命令、修补和重新签名攻击,还有旧的备份结合UI自动化。最后还提到了MMSF框架把这些方法集成在一起。 所以,我需要把这些要点浓缩到100字以内。可能的结构是先说明ADB的变化,然后提到四种方法,最后提到MMSF的自动化工具。 确保语言简洁明了,不使用复杂的术语。可能的句子结构是:“文章探讨了Android 12后ADB备份功能的变化及限制绕过方法,介绍了四种现代技术,并展示了如何通过MMSF框架实现自动化数据提取。” 这样既涵盖了变化、方法和工具,又在字数限制内。 </think> 文章探讨了Android 12后ADB备份功能的变化及限制绕过方法,介绍了四种现代技术,并展示了如何通过MMSF框架实现自动化数据提取。...
2026-2-2 10:18:20 | 阅读: 6 |
收藏
|
Security Café - securitycafe.ro
backup
debuggable
apk
mmsf
rooted
Mobile Pentesting 101: How to Pull APKs from Work Profile – A Real-World Intune Challenge
文章描述了从微软Intune enrolled设备中提取企业应用APK的挑战。传统方法因Intune的安全策略和用户资料隔离而失败。通过将应用转移至个人资料并结合MMSF工具实现自动化提取,成功解决了问题。...
2025-7-16 07:2:36 | 阅读: 5 |
收藏
|
Security Café - securitycafe.ro
apk
mmsf
security
intune
workprofile
Azure CloudQuarry: Searching for secrets in Public VM Images
After the initial investigation entitled “AWS CloudQuarry: Digging for secrets in Public AMIs”...
2024-11-19 18:12:13 | 阅读: 2 |
收藏
|
Security Café - securitycafe.ro
ais
marketplace
disks
costs
Chained Vulnerabilities in Web Applications
IntroductionVulnerability chaining, also known as exploit chaining, is the process of combi...
2024-10-25 17:39:14 | 阅读: 5 |
收藏
|
Security Café - securitycafe.ro
attacker
malicious
security
victim
injection
Mobile Pentesting 101: How to Install Split APKs
Understanding Split APKsIn modern mobile app development, split APKs are b...
2024-10-7 19:9:44 | 阅读: 16 |
收藏
|
Security Café - securitycafe.ro
apks
mmsf
splitapk
apk
decompile
Red Team Finds A Way – (IN)Secure By Design
In our previous post, Red Team Finds A Way – Exploiting The Human Factor, we explored how the...
2024-9-11 20:3:36 | 阅读: 9 |
收藏
|
Security Café - securitycafe.ro
security
teaming
attacker
network
AWS vs Azure: A “Secure by default” comparison
Whether you are in charge of deciding what Cloud solution to choose for your organization or yo...
2024-9-3 17:22:10 | 阅读: 14 |
收藏
|
Security Café - securitycafe.ro
cloud
security
ssrf
ec2
mistakes
An ex psychologist’s journey into Cyber Security
How it all startedWhat if I told you that the machines with 99 percentage fail chance would...
2024-7-29 19:28:2 | 阅读: 13 |
收藏
|
Security Café - securitycafe.ro
oscp
feeling
felt
luck
knew
Red Team Finds A Way – Exploiting The Human Factor
Red Teaming is a comprehensive approach that involves the use of various tactics, technique...
2024-7-2 16:5:10 | 阅读: 9 |
收藏
|
Security Café - securitycafe.ro
phishing
teaming
identify
username
security
AWS CloudQuarry: Digging for Secrets in Public AMIs
Money, secrets and mass exploitation: This research unveils a quarry of sensitive data stored i...
2024-5-8 14:30:0 | 阅读: 15 |
收藏
|
Security Café - securitycafe.ro
amis
ami
cloud
sem
CVE-2024-28344 & CVE-2024-28345 in Sipwise C5
CVE-2024-28344 – Open RedirectAn Open Redirect vulnerability was found in...
2024-3-21 18:22:31 | 阅读: 17 |
收藏
|
Security Café - securitycafe.ro
journal
28345
28344
malicious
1443
How to Install .ipa Files on iPhone Without Jailbreak
Diving into the realm of iOS beyond the confines of the App Store requires a grasp of the impor...
2024-3-12 15:30:0 | 阅读: 24 |
收藏
|
Security Café - securitycafe.ro
ipa
resorting
sit
WinRAR RCE Vulnerability Spotlight: APT29’s Zero-Day Tactics
IntroductionThe AttackSocio-Political ImplicationsExploiting CVE-2023-38831Make sure you are us...
2024-2-19 17:16:31 | 阅读: 33 |
收藏
|
Security Café - securitycafe.ro
winrar
m4
bmw
38831
payload
Can Someone Really Hack Traffic Lights?
We’ve all seen the scenes in movies or games where attackers hack traffic lights to set the col...
2024-2-7 15:55:10 | 阅读: 18 |
收藏
|
Security Café - securitycafe.ro
lights
tlc
sensors
vehicles
Passing Your OSCP In 2023 (or 2024)
I am aware that the internet is full of videos, blog and forum posts, GitHub pages (and the lis...
2023-10-30 16:27:32 | 阅读: 27 |
收藏
|
Security Café - securitycafe.ro
oscp
moreover
mindset
stress
Trench Tales: The College Account Takeover That Never Happened
DisclaimerIntroductionThe VulnerabilityMethodologyShodanLdapsearchBashPythonEthical DilemmasCas...
2023-10-16 13:53:31 | 阅读: 27 |
收藏
|
Security Café - securitycafe.ro
ldapsearch
anonymous
security
python
Secure Your Mobile World: A Guide for Cyber Security Awareness Month
October marks Cyber Security Awareness Month, a time when individuals and organizations around...
2023-10-5 15:35:31 | 阅读: 17 |
收藏
|
Security Café - securitycafe.ro
security
software
passwords
tips
phishing
Mobile Pentesting 101 – Introducing to MMSF (Massive Mobile Security Framework)
Sometimes it can be harder to choose one tool over another when it comes to mobile pentesting....
2023-9-18 14:0:0 | 阅读: 32 |
收藏
|
Security Café - securitycafe.ro
mmsf
usemodule
bypass
python3
Remote Code Execution – Basics
In this blog post you will learn how to identify basic Remote Code Execution vulnerabilities an...
2023-9-13 20:30:14 | 阅读: 57 |
收藏
|
Security Café - securitycafe.ro
php
cmdshell
remote
popen
attacker
Previous
0
1
2
3
4
5
6
7
Next