http://p8.qhimg.com/t0105eadd526b531a1d.png


热点概要:绕过云代理WAF、卡巴斯基分析方程组的RC6是错误的、分析drupal的coder模块的RCE漏洞、JEB 2.2.5.201606152142 破解版放出、CVE-2016-5696 Shellphish团队(参加CGC比赛的团队)的github 


国内热词:


Shadow Brokers的黑客组织窃取并公布部分NSA开发的入侵工具的代码质量遭到教授的嘲笑

男子跟踪快递车趁人去送货撬盗

PS4 Slim超薄机型曝光:9月8日首发

疑似锤子T3真机曝光:圆形Home键 16宫格

资讯类:


新的linux木马将主机变成僵尸网络的一部分

https://www.hackread.com/trojan-turns-linux-devices-into-botnet/

技术类:


CVE-2016-5696 分析和POC

https://github.com/violentshell/rover

Troopers2016的ppt:Exploit Free Whitelisting Evasion Tactics

https://www.troopers.de/media/filer_public/82/de/82de5e58-0bd1-447a-b4f9-8a908ad2ef70/mind_the_gap_-_final.pdf

通过代码审计后,对方程组的最初印象

https://www.cs.uic.edu/~s/musings/equation-group/

绕过云代理WAF (Sucuri 或 Cloudflare)

https://mukarramkhalid.com/bypass-sucuri-cloudflare-firewall/

卡巴斯基分析方程组的RC6是错误的

https://www.cs.uic.edu/~s/musings/equation-group-rc6/

网站列举:我们的个人信息是如何泄露的

https://www.troyhunt.com/website-enumeration-insanity-how-our-personal-data-is-leaked/

Fuzzing Perl: A Tale of Two American Fuzzy Lops

http://www.geeknik.net/71nvhf1fp

Shellphish团队(参加CGC比赛的团队)的github 

https://github.com/shellphish

mimikatz 2.1 alpha 20160822 (oe.eo) 发行

https://github.com/gentilkiwi/mimikatz/releases

分析drupal的coder模块的RCE漏洞

http://blog.nickbloor.co.uk/2016/08/drupal-coder-module-unauthenticated.html

JEB 2.2.5.201606152142 破解版放出,包括 smali debugger

http://bbs.pediy.com/showthread.php?t=212332

链接:http://pan.baidu.com/s/1bJdWse 密码:ncr3 


跟进CVE-2016-1409 – IPv6 NDP DOS漏洞

https://www.insinuator.net/2016/08/follow-up-on-cve-2016-1409-ipv6-ndp-dos-vulnerability/

BsidesMCR 2016 会议PPT

http://www.bsidesmcr.org.uk/#!slides/sajdc

理解dalvik Static Fields

http://calebfenton.github.io/2016/08/21/understanding_dalvik_static_fields_2_of_2/

文章原文链接:https://www.anquanke.com/post/id/84427