今日导读:针对中东和非洲的Slingshot APT攻击及对应的YARA和Sigma检测规则、APT15卷土重来并且更加强大、对Hacking Team新间谍软件的追踪、对Gooligan(Oauth认证窃取僵尸网络)的回顾性分析、VK Messenger URI处理存在命令执行漏洞、源码级剖析PHP 7.2.x GD拒绝服务漏洞、然之协同系统漏洞利用汇总、对WordPress最受欢迎的10大插件进行分析、Android免Root权限通过Hook系统函数修改程序运行时内存指令逻辑、在内网获得域管理员的五大方法(2018年版)、使用CoGetInterceptor进行COM拦截 - 第2部分、使用LUA脚本绕过Applocker的测试分析、Web日志安全分析系统实践等,还有requests-HTML: 为人服务的HTML解析器等工具推荐,不要错过。

【病毒区】
1、Slingshot APT targeting Middle East and Africa through a Mikrotik vulnerability to infect the Windows administrator machines
https://s3-eu-west-1.amazonaws.com/khub-media/wp-content/uploads/sites/43/2018/03/09133534/The-Slingshot-APT_report_ENG_final.pdf

2、The Slingshot APT FAQ
https://securelist.com/apt-slingshot/84312/

工具#Slingshot APT YARA rules

https://github.com/Neo23x0/signature-base/blob/master/yara/apt_slingshot.yar

工具#Slingshot APT Sigma rules

https://github.com/Neo23x0/signature-base/blob/master/yara/apt_slingshot.yar

5、APT15 is alive and strong: An analysis of RoyalCli and RoyalDNS
https://www.nccgroup.trust/uk/about-us/newsroom-and-events/blogs/2018/march/apt15-is-alive-and-strong-an-analysis-of-royalcli-and-royaldns/

6、New traces of Hacking Team in the wild
https://www.welivesecurity.com/2018/03/09/new-traces-hacking-team-wild/

7、Hunting down Gooligan - Retrospective analysis
https://www.elie.net/static/files/hunting-down-gooligan-a-retrospective-analysis/hunting-down-gooligan-a-retrospective-analysis-slides.pdf

【漏洞分析区】
8、VK Messenger (VKontakte) vk:// URI Handler Commands Execution
https://blogs.securiteam.com/index.php/archives/3674

9、源码级剖析PHP 7.2.x GD拒绝服务漏洞
http://www.freebuf.com/vuls/163949.html

10、然之协同系统漏洞利用汇总
https://xianzhi.aliyun.com/forum/topic/2135

11、EasySNS_V1.6远程图片本地化导致Getshell
https://mp.weixin.qq.com/s?__biz=MzA3NzE2MjgwMg==&mid=2448903594&idx=1&sn=5e4395fca668f5ce466353317e5f44f7&chksm=8b55ddf7bc2254e1c0c125e0f2190990b4b0b271c36d7b2af80d6cac75da8bb09473b1fb3cbe&mpshare=1&scene=23&srcid=0311nNZoJktliQhkFAL2s307

12、One of the Ten Most Popular WordPress Plugins Isn’t Needed and Introduces a Vulnerability on Some Websites Using It
https://www.pluginvulnerabilities.com/2018/03/09/one-of-the-ten-most-popular-wordpress-plugins-isnt-needed-and-introduces-a-vulnerability-on-some-websites-using-it/

13、Defeating WordPress Security Plugins
https://x-c3ll.github.io/posts/bypass-wordpress-plugins/

14、Privilege Escalation via lxd(Ubuntu’s container manager utilising linux containers)(2017)
https://reboare.github.io/lxd/lxd-escape.html

【技术分享区】
15、Android免Root权限通过Hook系统函数修改程序运行时内存指令逻辑
http://www.wjdiankong.cn/archives/1115

16、Top Five Ways I Got Domain Admin on Your Internal Network before Lunch (2018 Edition)
https://medium.com/@adam.toscher/top-five-ways-i-got-domain-admin-on-your-internal-network-before-lunch-2018-edition-82259ab73aaa

17、Leveraging INF-SCT Fetch & Execute Techniques For Bypass, Evasion, & Persistence (Part 2)
https://bohops.com/2018/03/10/leveraging-inf-sct-fetch-execute-techniques-for-bypass-evasion-persistence-part-2/

18、COM Interception with CoGetInterceptor-Part 2
https://github.com/zodiacon/Blog

19、使用LUA脚本绕过Applocker的测试分析
https://xianzhi.aliyun.com/forum/topic/2110

20、Java-Web-Security
https://github.com/dschadow/Java-Web-Security

21、Web日志安全分析系统实践
https://xianzhi.aliyun.com/forum/topic/2136

22、Learning Radare In Practice
http://www.radare.org/get/THC2018.pdf

23、Awesome use case of LIEF and LibFuzzer
https://blahcat.github.io/2018/03/11/fuzzing-arbitrary-functions-in-elf-binaries/

24、Scrapy爬虫去重效率优化之Bloom Filter的算法的对接
https://mp.weixin.qq.com/s?__biz=MzIzNzA4NDk3Nw==&mid=2457735578&idx=1&sn=cddfb599b65d153fa424aacf2e03cded&from=106C295010&wm=20005_0002&weiboauthoruid=2830678474

【赏金漏洞区】
25、Getting any Facebook user's friend list and partial payment card details
https://www.josipfranjkovic.com/blog/facebook-friendlist-paymentcard-leak

【工具区】
工具#memcachedump is a tool for dumping the cache contents of exposed memcached servers into local text files.
https://github.com/jlospinoso/memcachedump

工具#echidna:Ethereum fuzz testing framework
https://github.com/trailofbits/echidna

工具#Arjun is a python script for finding hidden GET & POST parameters.
https://github.com/UltimateHackers/Arjun/blob/master/params.txt

工具#DeepSound is a steganography tool and audio converter that hides secret data into audio files.
http://jpinsoft.net/deepsound/

工具#requests-HTML: 为人服务的HTML解析器
https://github.com/kennethreitz/requests-html

工具#rop-tool : A tool to help you write binary exploits
https://github.com/t00sh/rop-tool/

点击收藏 | 0 关注 | 1
  • 动动手指,沙发就是你的了!
登录 后跟帖