Monthly Archive: May 2017
+
GetRespones is a paid service, but now when you sign up for an account you get a free 30-day trial. After, you can continue to use …
+
The fundermetals of RESTful API RESTful is an architectural style called REST (Representational State Transfer) advocates that web applications should use HTTP as it was originally …
By Win Stark
May 30, 2017
+
The ShadowBrokers group leaked NSA hacking tools timeline August 2016: A group called “ShadowBrokers” asking for 1 Million Bitcoins (around $568 Million) in an auction to …
+
The /.well-known directory access forbidden by rule Sometimes you may see in your error log file and noticed some requests to ./well-known diectory: 11830#11830: *1947 …
By Win Stark
May 28, 2017
+
Introduction EsteemAudit is an RCE (Remote Code Execution) vulnerability in RDP service (port 3389) on Microsoft Windows Server 2003 / Windows XP machines, that is an …
+
Being notoriously strict about censorship, China makes it difficult for companies to launch their products there. It’s a major stumbling block for businesses that want to …
+
Machine learing in cyber security We are all moving from mobie first to AI first.And apply machine learning and deep learning in cyber security is so …
By Win Stark
May 21, 2017
+
Introduction EternalBlue (CVE-2017-0144) is an exploit a vulnerability in Microsoft’s Server Message Block (SMB) protocol, it’s believed to have been developed by the U.S. National Security …