Т.к. соседний борд помер, а тема достаточно нужная и интересная то перенесу пожлуй все сюда. (или не все).
Добавляйте свою литературу желательно интересные и редкие. Язык не важен.
Так же можете сюда постить просьбы если не можете найти ту или иную книгу. Попробую сделать это за вас...
Blockchain Programming in C# (ENG)
Authored by Nicolas Dorier
Contributor for NBitcoin,
The .NET Bitcoin Framework
Co-authored With Bill Strait
Founder of Billd Labs
У вас должно быть более 1 сообщений для просмотра скрытого контента.
Облако Mail.Ru - это ваше персональное надежное хранилище в интернете. Все нужные файлы всегда под рукой, доступны в любой точке мира с компьютера или смартфона.
Abusing Windows ManagementInstrumentation (WMI) to Build a Persistent,Asyncronous, and Fileless Backdoor.
Использование WMI в вирусах и бекдорах.
IntroductionAs technology is introduced and subsequently deprecated over time in the Windows operating system,one powerful technology that has remained consistent since Windows NT 4.01and Windows 952isWindows Management Instrumentation (WMI). Present on all Windows operating systems, WMI iscomprised of a powerful set of tools used to manage Windows systems both locally and remotely.While it has been well known and utilized heavily by system administrators since its inception, WMI waslikely introduced to the mainstream security community when it was discovered that it was usedmaliciously as one component in the suite of exploits and implants used by Stuxnet3. Since then, WMIhas been gaining popularity amongst attackers for its ability to perform system reconnaissance, AV andVM detection, code execution, lateral movement, persistence, and data theft.As attackers increasingly utilize WMI, it is important for defenders, incident responders, and forensicanalysts to have knowledge of WMI and to know how they can wield it to their advantage. Thiswhitepaper will introduce the reader to WMI, actual and proof-of-concept attacks using WMI, how WMIcan be used as a rudimentary intrusion detection system (IDS), and how to perform forensics on theWMI repository file format.