今日导读:HenBox是一款冒充第三方应用商店合法应用的Android恶意软件、多年来恶意软件通过Download.com盗取比特币、OceanLotus-旧技术,新后门报告、伊朗黑客组织更新了钓鱼攻击战术、AMD Ryzen和EPYC产品线存在多个安全漏洞、Samba存在非特权用户可以更改任何用户(和管理员)密码漏洞、MS-RDP存在身份验证漏洞、Jenkins XStream存在远程代码执行漏洞、对Vault 7 CIA泄漏的Mikrotik漏洞利用进行逆向(含poc)、使用FRIDA绕过Android 7+网络安全配置功能等,还有几个赏金漏洞分享。

【病毒区】
1、HenBox, an Android Malware family masquerading as legitimate apps on third-party app stores
https://researchcenter.paloaltonetworks.com/2018/03/unit42-henbox-chickens-come-home-roost/

2、Dangerous malware stealing bitcoin hosted on Download.com for years
https://www.welivesecurity.com/2018/03/14/stealing-bitcoin-download-com/

3、OceanLotus-Old techniques,new backdoor
https://www.welivesecurity.com/wp-content/uploads/2018/03/ESET_OceanLotus.pdf

4、Poisoned peer-to-peer app kicked off Dofoil coin miner outbreak
https://cloudblogs.microsoft.com/microsoftsecure/2018/03/13/poisoned-peer-to-peer-app-kicked-off-dofoil-coin-miner-outbreak/

5、Iranian Threat Group Updates Tactics, Techniques and Procedures in Spear Phishing Campaign
https://www.fireeye.com/blog/threat-research/2018/03/iranian-threat-group-updates-ttps-in-spear-phishing-campaign.html

6、RedisWannaMine Unveiled: New Cryptojacking Attack Powered by Redis and NSA Exploits
https://www.imperva.com/blog/2018/03/rediswannamine-new-redis-nsa-powered-cryptojacking-attack/

【漏洞分析区】
7、13 Critical Security Vulnerabilities and Manufacturer Backdoors discovered throughout AMD Ryzen & EPYC product lines.
https://amdflaws.com/

8、CVE-2018-1057: Unprivileged user can change any user (and admin) password (Samba AD DC)
https://wiki.samba.org/index.php/CVE-2018-1057

9、From Public Key to Exploitation: How We Exploited the Authentication in MS-RDP(CVE-2018-0886)
https://blog.preempt.com/how-we-exploited-the-authentication-in-ms-rdp

10、Exploiting Adobe ColdFusion before CVE-2017-3066
https://codewhitesec.blogspot.hk/2018/03/exploiting-adobe-coldfusion.html

11、Jenkins XStream remote code execution vulnerability(CVE-2017-2608)
https://docs.google.com/presentation/d/1wTtmmst-d3DVJ0glogM46ohE094nQJp74xggQmXl52Q/edit#slide=id.g335fb21db4_1_121

12、Getting to the Bottom of CVE-2018-0825 Heap Overflow Buffer
https://www.ixiacom.com/company/blog/getting-bottom-cve-2018-0825-heap-overflow-buffer

13、There is a proxy in your Atlassian Product! (CVE-2017-9506)
http://dontpanic.42.nl/2017/12/there-is-proxy-in-your-atlassian.html

14、The Java Soothsayer: A practical application for insecure randomness. (Includes free 0day)
https://medium.com/@alex91ar/the-java-soothsayer-a-practical-application-for-insecure-randomness-c67b0cd148cd

15、Reverse engineering of Mikrotik exploit from Vault 7 CIA Leaks (Working PoC (Full Sources) and PDF Article)
https://github.com/BigNerd95/Chimay-Red

【技术分享区】
16、SAP Note Assistant Insecure Handling of SAP Notes Signature Vulnerability(2017)
https://www.coresecurity.com/advisories/sap-note-assistant-insecure-handling-sap-notes-signature-vulnerability

17、Deep-dive into SAP archive file formats(2016)
https://www.coresecurity.com/corelabs-research/publications/deep-dive-sap-archive-file-formats

18、Analysis of a Kubernetes hack — Backdooring through kubelet
https://medium.com/handy-tech/analysis-of-a-kubernetes-hack-backdooring-through-kubelet-823be5c3d67c

19、Bypassing Payments Using Webhooks
https://lightningsecurity.io/blog/bypassing-payments-using-webhooks/

20、Using FRIDA to bypass the Android 7+ Network Security Configuration feature
https://sensepost.com/blog/2018/tip-toeing-past-android-7s-network-security-configuration/

21、JavaScript Zero: real JavaScript, and zero side-channel attacks
https://blog.acolyer.org/2018/03/13/javascript-zero-real-javascript-and-zero-side-channel-attacks/

22、Rootkit analysis-Use case on HideDRV(2016)
http://www.sekoia.fr/blog/wp-content/uploads/2016/10/Rootkit-analysis-Use-case-on-HIDEDRV-v1.6.pdf

23、如何不写一行javascript代码就可以把深度学习模型自动编译生产WebGL并且跑在浏览其中
http://www.tvmlang.org/2018/03/12/webgl.html

24、Invisible resource thieves: The increasing threat of cryptocurrency miners
https://cloudblogs.microsoft.com/microsoftsecure/2018/03/13/invisible-resource-thieves-the-increasing-threat-of-cryptocurrency-miners/

25、CNCERT 2017年我国联网智能设备安全情况报告
http://www.freebuf.com/articles/terminal/164866.html

【赏金漏洞区】
26、Mail.Ru:style Stored XSS when you read eamils($1,000)
https://hackerone.com/reports/274844

27、SEMrush:XXE in Site Audit function exposing file and directory contents($2,000)
https://hackerone.com/reports/312543

28、Regaxor: Fuzzing Regexes for Fun and Not‐So‐Much Profit
https://github.com/0xSobky/HackVault/wiki/Regaxor:-Fuzzing-Regexes-for-Fun-and-Not%E2%80%90So%E2%80%90Much-Profit

【工具区】
工具#Metta: Uber's Open Source Tool for Adversarial Simulation
https://github.com/uber-common/metta

点击收藏 | 0 关注 | 1
  • 动动手指,沙发就是你的了!
登录 后跟帖