通知:最近一直在出差,更新会比较晚,在晚上10点后(一般第二天的内容就已经在里面,参考时差),导读就不弄了,大家凑合着看吧

1、Sure, I’ll take that! New ComboJack Malware Alters Clipboards to Steal Cryptocurrency
https://researchcenter.paloaltonetworks.com/2018/03/unit42-sure-ill-take-new-combojack-malware-alters-clipboards-steal-cryptocurrency/

2、JPCERT/CC:Malware “TSCookie”
http://blog.jpcert.or.jp/2018/03/malware-tscooki-7aa0.html

3、Analysis of Hangul file attack(koren)
http://www.ahnlab.com/kr/site/securityinfo/secunews/secuNewsView.do?seq=27234

4、North Korea's foreign currency earning & financial hacking activity on the cyber area
https://drive.google.com/file/d/0B_tRQHq1vrtxbzdrWnJoWjR1VGc/view

5、LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE
http://wp.internetsociety.org/ndss/wp-content/uploads/sites/25/2018/02/ndss2018_02A-3_Hussain_paper.pdf

6、NoSQL injection leading to administrator account takeover in Rocket.Chat (0.57.3, 0.58.3 and below)
http://blog.sbarbeau.fr/2018/03/nosql-injection-leading-to.html

7、VMAttack: Deobfuscating Virtualization-Based Packed Binaries
https://www1.cs.fau.de/filepool/publications/unpacking-dynamic-static.pdf

8、PostgreSQL 远程代码执行漏洞分析及利用—【CVE-2018-1058】
https://xianzhi.aliyun.com/forum/topic/2109

9、Security research using QL: finding a remote code execution vulnerability in Spring Data REST (CVE-2017-8046)
https://lgtm.com/blog/spring_data_rest_CVE-2017-8046_ql

10、区块链安全-DAO攻击事件解析
http://blog.csdn.net/u011721501/article/details/79450122

11、通过“震网三代”和Siemens PLC 0day漏洞,实现对工控系统的入侵实验
http://www.freebuf.com/vuls/163950.html

12、How Hackers Bypassed an Adobe Flash Protection Mechanism
https://securingtomorrow.mcafee.com/mcafee-labs/hackers-bypassed-adobe-flash-protection-mechanism/

13、Turning your web traffic into a Super Computer
http://ben.akrin.com/?p=5997

14、敏信审计系列之dorado5开发框架
https://mp.weixin.qq.com/s/y1TOfw063Zh6DHhgLQPpzQ

15、从零开始瞎玩llvm:利用llvm保护程序免受内存修改器的攻击
http://iosre.com/t/llvm-llvm/11132

16、From Assemply to JS and back
https://github.com/rh0dev/slides/blob/master/OffensiveCon2018_From_Assembly_to_JavaScript_and_back.pdf

17、Following the trace of WMI Backdoors & other nastiness
https://www.eideon.com/2018-03-02-THL03-WMIBackdoors/

18、javascript injection with selenium, puppeteer, and marionette in chrome and firefox(2017)
https://intoli.com/blog/javascript-injection/

19、Hacking around HTA files
http://blog.sevagas.com/?Hacking-around-HTA-files

20、Azure AD and ADFS best practices: Defending against password spray attacks
https://cloudblogs.microsoft.com/enterprisemobility/2018/03/05/azure-ad-and-adfs-best-practices-defending-against-password-spray-attacks/

21、从无到有通过ISO27001认证-建设篇
https://xianzhi.aliyun.com/forum/topic/106

22、从无到有通过ISO27001认证-审核篇
https://xianzhi.aliyun.com/forum/topic/104

23、Node.js 调试指南
https://github.com/nswbmw/node-in-debugging

24、SecWiki周刊(2018/02/26-2018/03/04)
https://www.sec-wiki.com/weekly/209

25、Wire Security Review – Phase 2 – iOS Client for Wire Swiss GmbH(Final Report)
https://www.x41-dsec.de/reports/X41-Kudelski-Wire-Security-Review-iOS.pdf

26、Wire Security Review – Phase 2 – Android Client for Wire Swiss GmbH(Final Report)
https://www.x41-dsec.de/reports/X41-Kudelski-Wire-Security-Review-Android.pdf

27、Wire Security Review – Phase 2 – Web, Calling for Wire Swiss GmbH(Final Report)
https://www.x41-dsec.de/reports/X41-Kudelski-Wire-Security-Review-Web-Calling.pdf

工具#安卓证书锁定解除的工具
https://github.com/WooyunDota/DroidSSLUnpinning

工具#Unstripped iOS Kernels with All Symbols
https://github.com/Proteas/unstripped-ios-kernels

工具#UnjailMe:A sandbox escape based on the proof-of-concept (CVE-2018-4087)
https://github.com/MTJailed/UnjailMe

工具#winnti-detector:Network detector for Winnti malware
https://github.com/TKCERT/winnti-detector

工具#winnti-suricata-lua:Suricata rules to detect Winnti communication
https://github.com/TKCERT/winnti-suricata-lua

工具#winnti-nmap-script:Nmap Script to scan for Winnti infections
https://github.com/TKCERT/winnti-nmap-script

工具#SysmonTools:Utilities for Sysmon
https://github.com/nshalabi/SysmonTools

工具#Droid-Application-Fuzz-Framework:Android application fuzzing framework with fuzzers and crash monitor.
https://github.com/ajinabraham/Droid-Application-Fuzz-Framework

工具#S3Scanner:Scan for open S3 buckets and dump
https://github.com/sa7mon/S3Scanner

工具#DNS-Monitor:记录和展示我自己电脑上所有的DNS请求行为
https://github.com/coffeehb/DNS-Monitor

点击收藏 | 0 关注 | 1
  • 动动手指,沙发就是你的了!
登录 后跟帖