http://p8.qhimg.com/t0105eadd526b531a1d.png


国内热词:


 

Indus OS 超过iOS成为印度第二大移动操作系统
黑客公开拍卖NSA开发的网络武器
Windows 10 无缘中国政府采购

资讯类:


黑客曝光 Chrome, Firefox 地址栏欺骗漏洞赢得5000美金奖励
http://www.zdnet.com/article/hacker-wins-5000-for-chrome-firefox-address-bar-spoofing-flaw/

2016年7月国外泄露的数据库统计
https://www.checkmarx.com/2016/08/16/hacks-breaches-july-2016-infographic/

 

技术类:


 

使用EVENTVWR.EXE和注册表劫持实现"无文件" UAC绕过
https://enigma0x3.net/2016/08/15/fileless-uac-bypass-using-eventvwr-exe-and-registry-hijacking/

JetBrains IDE 远程代码执行和本地文件泄露
http://blog.saynotolinux.com/blog/2016/08/15/jetbrains-ide-remote-code-execution-and-local-file-disclosure-vulnerability-analysis/

通过黑盒测试指纹识别杀毒软件模拟器
https://www.usenix.org/system/files/conference/woot16/woot16-paper-blackthorne_update.pdf

FalseCONNECT:突破IOS的加密信任
http://falseconnect.com/

针对亚马逊Kindle E Ink Reader的越狱
https://github.com/sgayou/kindle-5.6.5-jailbreak/blob/master/doc/README.md

挑战:绕过PHP空字节注入保护
https://www.securusglobal.com/community/

使用WinDbg/CDB的Shellcode runner绕过应用程序白名单保护
http://www.exploit-monday.com/2016/08/windbg-cdb-shellcode-runner.html

不要太信任你的插件
https://blog.securitycompass.com/dont-trust-your-plugins-be5994ec6337?gi=bd8fa5126c49#.lj9rjicb2

Red Hat企业linux网络性能调优辅导
https://access.redhat.com/sites/default/files/attachments/20150325_network_performance_tuning.pdf

CISCO.com官网的xss
http://tbmnull.com/cisco-xss/

PWN The PwnLab
http://resources.infosecinstitute.com/pwn-the-pwnlab/

针对powershell版本和注册表的快速取证
http://www.4n6k.com/2016/08/forensics-quickie-powershell-versions.html

ThinkPwn发布了,更稳定,现在工作在 EFI 2.x 固件以及新版本的SMM相关协议
https://github.com/Cr4sh/ThinkPwn/commit/d496e7d9a4bbb1e2903a94802760d52c1e46c037

活动目录的 LAPS 配置调查
https://adsecurity.org/?p=3164

 PAN #Labyrenth CTF Random 4,5关卡的writeup
https://github.com/uafio/git/blob/master/scripts/labyREnth-2016/labyrenth-2016-random-4.php
https://github.com/uafio/git/blob/master/scripts/labyREnth-2016/labyrenth-2016-random-5.1.py
https://github.com/uafio/git/blob/master/scripts/labyREnth-2016/labyrenth-2016-random-5.2.py

通过活动目录对象属性实现CC隧道控制
http://www.harmj0y.net/blog/powershell/command-and-control-using-active-directory/

Lexmark Perceptive的文档过滤器的多个远程代码执行漏洞
http://blog.talosintel.com/2016/08/vulnerability-spotlight-multiple-remote.html


文章原文链接:https://www.anquanke.com/post/id/84402