http://p8.qhimg.com/t0105eadd526b531a1d.png


热点概要:nginx解析漏洞允许缓存投毒攻击、修改方程组的exploit,使其适应ASA 9.2、分析MS16-098、瘦客户端渗透测试

国内热词:


以色列率先部署全自动军用机器人

Windows 10最新更新破坏了PowerShell功能

资讯类:


whatapp新的隐私策略会分享你的电话号码给facebook

http://www.telegraph.co.uk/technology/2016/08/25/whatsapps-new-privacy-policy-lets-it-share-your-phone-number-wit/

从美国国家安全局黑客工具包泄露背后的秘密:网络基础设施将成为下一个目标

http://www.darkreading.com/perimeter/the-secret-behind-the-nsa-breach-network-infrastructure-is-the-next-target/a/d-id/1326729

黑客军团第二季第6集中的黑客技术概览

https://nakedsecurity.sophos.com/2016/08/25/mr-robot-eps2-6succ3ss0r-p12-the-security-review/

技术类:


国家统计局(NSO)使用iPhone 0day 对付阿联酋人权捍卫者

https://citizenlab.org/2016/08/million-dollar-dissident-iphone-zero-day-nso-group-uae/

通过wifi信号实现按键识别

https://www.sigmobile.org/mobicom/2015/papers/p90-aliA.pdf

nginx解析漏洞允许缓存投毒攻击

http://blog.zorinaq.com/nginx-resolver-vulns/

observatory(https://observatory.mozilla.org/)一个自动化的网站安全测试工具

https://pokeinthe.io/2016/08/25/observatory-by-mozilla-a-new-tool/

修改方程组的exploit,使其适应ASA 9.2

https://blog.silentsignal.eu/2016/08/25/bake-your-own-extrabacon/

通过PAC代理文件对目标攻击的案例

https://isc.sans.edu/diary/Example+of+Targeted+Attack+Through+a+Proxy+PAC+File/21405

技术分析Pegasus间谍软件(lookout关于iPhone 0day漏洞的分析报告)

https://info.lookout.com/rs/051-ESQ-475/images/lookout-pegasus-technical-analysis.pdf

Bypassing user-mode the sneaky way

https://scorchsecurity.wordpress.com/2016/08/26/bypassing-user-mode-the-sneaky-way/

对植入式心脏器械的攻击演示[PDF]

http://d.muddywatersresearch.com/wp-content/uploads/2016/08/MW_STJ_08252016.pdf

建立你的android设备渗透测试环境

https://blog.bugcrowd.com/mobile-testing-setting-up-your-android-device-part-1

分析MS16-098 / ZDI-16-453

https://warroom.securestate.com/an-analysis-of-ms16-098/

基于Hidden Tear的新开源的恶意欺诈勒索软件针对商业用户

http://blog.trendmicro.com/trendlabs-security-intelligence/new-open-source-ransomwar-based-on-hidden-tear-and-eda2-may-target-businesses/

CrowdStrike机器学习和VirusTotal

https://www.crowdstrike.com/blog/crowdstrike-machine-learning-virustotal/

瘦客户端渗透测试第一部分

http://resources.infosecinstitute.com/practical-thick-client-application-penetration-testing-using-damn-vulnerable-thick-client-app-part-1/

文章原文链接:https://www.anquanke.com/post/id/84454