mirror of
https://github.com/h3xduck/TripleCross.git
synced 2025-12-25 02:43:07 +08:00
Finished analysis of offensive capailities (techniques from defcon finally not included, at least for now)
This commit is contained in:
@@ -496,8 +496,44 @@ AMD64 Architecture Processor Supplement},
|
||||
pages={19-22},
|
||||
date={2018-01-28},
|
||||
url={https://raw.githubusercontent.com/wiki/hjl-tools/x86-psABI/x86-64-psABI-1.0.pdf}
|
||||
}
|
||||
|
||||
},
|
||||
|
||||
@online{network_layers,
|
||||
title={The Network Layers Explained [with examples]},
|
||||
author={Alienor},
|
||||
date={2018-11-28},
|
||||
url={https://www.plixer.com/blog/network-layers-explained/}
|
||||
},
|
||||
|
||||
@online{tcp_reliable,
|
||||
title={Transmission Control Protocol},
|
||||
date={2022-04-19},
|
||||
organization={IBM},
|
||||
url={https://www.ibm.com/docs/en/aix/7.2?topic=protocols-transmission-control-protocol}
|
||||
},
|
||||
|
||||
@online{tcp_handshake,
|
||||
title={Three-Way Handshake},
|
||||
url={https://www.sciencedirect.com/topics/computer-science/three-way-handshake}
|
||||
},
|
||||
|
||||
@proceedings{evil_ebpf_p6974,
|
||||
institution = {NCC Group},
|
||||
author = {Jeff Dileo},
|
||||
organization= {DEFCON 27},
|
||||
eventtitle = {Evil eBPF Practical Abuses of an In-Kernel Bytecode Runtime},
|
||||
url = {https://raw.githubusercontent.com/nccgroup/ebpf/master/talks/Evil_eBPF-DC27-v2.pdf},
|
||||
pages={69-74}
|
||||
},
|
||||
|
||||
@proceedings{ebpf_friends_p37,
|
||||
institution = {Datadog},
|
||||
author = {Guillaume Fournier, Sylvain Afchainthe},
|
||||
organization= {DEFCON 29},
|
||||
eventtitle = {Cyber Threats 2021: A year in Retrospect},
|
||||
url = {https://media.defcon.org/DEF%20CON%2029/DEF%20CON%2029%20presentations/Guillaume%20Fournier%20Sylvain%20Afchain%20Sylvain%20Baubeau%20-%20eBPF%2C%20I%20thought%20we%20were%20friends.pdf},
|
||||
pages={37}
|
||||
},
|
||||
|
||||
|
||||
|
||||
|
||||
Reference in New Issue
Block a user