今日导读:ADB.Miner安卓蠕虫的更多信息、Lizard Squad黑客组攻击详细分析、针对hacking team的DanderSpritz/PeddleCheap流量分析(第1部分)、Android存在KeyStore服务权限绕过漏洞、Joomla <= 3.8.3存在盲注权限提升漏洞、卡巴斯基安全邮件网关存在CSRF/代码执行漏洞、Firefox中存在整数溢出到远程代码执行漏洞、全补丁下再次利用CPU漏洞攻破KASLR、一个人的补丁是另一个人的宝藏:一个HPE失败的补丁的故事、微软反勒索服务绕过(微软不认)、某旺旺ActiveX控件imageMan.dll栈溢出漏洞研究、Java反序列化漏洞-玄铁重剑之CommonsCollection(上)、FakeApp实例探究、2017年Android“间谍软件”年度总结报告、2017年钓鱼网站分布趋势报告等。

1、ADB.Miner 安卓蠕虫的更多信息
http://blog.netlab.360.com/adb-miner-more-information/

2、Detailed analysis of Lizard Squad hacking group
https://www.zingbox.com/wp-content/uploads/2018/01/Lizard-Squad-White-Paper-v7.pdf

3、New Whitepaper - DanderSpritz/PeddleCheap Traffic Analysis (Part 1 Of 2)
https://www.forcepoint.com/sites/default/files/resources/files/datasheet_security_labs_dander_spritz_peddle_cheap_traffic_analysis_en.pdf

4、Android: Permission bypass in KeyStore service due to getpidcon
https://bugs.chromium.org/p/project-zero/issues/detail?id=1406

5、Privilege escalation in Joomla <= 3.8.3 via blind SQL injection (CVE-2018-6376)
https://blog.ripstech.com/2018/joomla-privilege-escalation-via-sql-injection/

6、Kaspersky Secure Mail Gateway 1.1.0.379 CSRF / Code Execution
https://packetstormsecurity.com/files/146268

7、Integer Underflow to RCE in Firefox
https://datarift.blogspot.com/2018/02/integer-underflow-in-firefox-quantum.html

8、全补丁下再次利用CPU漏洞攻破KASLR
http://www.iceswordlab.com/2018/02/06/meltdown/

9、one man's patch is another man's treasure: a tale of a failed hpe patch
https://www.zerodayinitiative.com/blog/2018/2/6/one-mans-patch-is-another-mans-treasure-a-tale-of-a-failed-hpe-patch

10、microsoft anti ransomware bypass (not a vulnerability for microsoft)
http://www.securitybydefault.com/2018/01/microsoft-anti-ransomware-bypass-not.html

11、Discuz!X 前台任意文件删除漏洞深入解析
https://xianzhi.aliyun.com/forum/topic/34

12、某旺旺ActiveX控件imageMan.dll栈溢出漏洞研究
http://www.freebuf.com/column/162346.html

13、Windows(x86与x64) Shellcode技术研究
https://www.anquanke.com/post/id/97601

14、Java反序列化漏洞-玄铁重剑之CommonsCollection(上)
https://xianzhi.aliyun.com/forum/topic/2028

15、deep dive into one of the most common (and complex) mobile packers/code obfuscators (native)
https://blog.zimperium.com/dissecting-mobile-native-code-packers-case-study/

16、Cloud Security Risks (P2): CSV Injection in AWS CloudTrail
https://rhinosecuritylabs.com/aws/cloud-security-csv-injection-aws-cloudtrail/

17、看完这篇你还敢自拍吗?(FakeApp实例探究)
https://xianzhi.aliyun.com/forum/topic/2032

18、a driver security checklist for driver developers to help reduce the risk of drivers being compromised.
https://docs.microsoft.com/en-us/windows-hardware/drivers/driversecurity/driver-security-checklist

19、Hacking 101 to mobile data
https://insinuator.net/2018/02/hacking-101-to-mobile-data/

20、Github泄露扫描系统开发教学
https://weibo.com/ttarticle/p/show?id=2309404204494916341366

21、Circumventing the defense in "Ensemble Adversarial Training: Attacks and Defenses"
https://github.com/andrewilyas/ens-adv-train-attack

22、PinMe: Tracking a Smartphone User around the World
https://arxiv.org/pdf/1802.01468.pdf

23、Collection of Privilege Escalation & Post-Exploitation
https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/Privilege%20Escalation%20%26%20Post-Exploitation.md

24、AppProtect:整理一些app常见的加固方法,包括java层、native层和资源文件加固等
https://github.com/guanchao/AppProtect

25、2017年Android“间谍软件”年度总结报告
http://www.freebuf.com/articles/terminal/161839.html

26、2017年钓鱼网站分布趋势报告
https://mp.weixin.qq.com/s/aDVIG7_QTaMCHAwgrqnHDA

27、Bug bounty left over (and rant) Part III (Google and Twitter)
http://blog.intothesymmetry.com/2018/02/bug-bounty-left-over-and-rant-part-iii.html

工具#各语言在线代码调试
http://rextester.com/

工具#ElasticIntel:Serverless, low cost, threat intel aggregation for enterprise or personal use, backed by ElasticSearch.
https://github.com/securityclippy/elasticintel

工具#Hardentools is a utility that disables a number of risky Windows features.
https://github.com/securitywithoutborders/hardentools

工具#IDAtropy is a plugin for Hex-Ray's IDA Pro designed to generate charts of entropy and histograms using the power of idapython and matplotlib.
https://github.com/danigargu/IDAtropy

工具#Reverset is a lightweight portable reverse engineering and binary analysis tool.
https://github.com/Mithreindeir/Reverset

工具#Kayak is a CAN bus analysis tool based on SocketCAN
https://github.com/dschanoeh/Kayak

点击收藏 | 0 关注 | 1
  • 动动手指,沙发就是你的了!
登录 后跟帖