http://p8.qhimg.com/t0105eadd526b531a1d.png


热点概要:绕过WINDOWS的ASRL,实现一个反弹的SHELL、通过 Win10PE SE ISO 或 WIM实现持久化后门、Subversion 1.6.6 / 1.6.12 代码执行漏洞、CVE-2016-3298、CVE (2016-0167)

国内热词:


NSA能在加密密钥中植入“陷阱门素数”

三星测试人员被禁止使用电子邮件联络

Facebook、Instagram和Twitter被指让监视公司访问数据

Signal 支持消息阅后即焚

资讯类:


黑客攻击联合国核电站,企图窃取原料用于脏炸弹。

http://www.zdnet.com/article/cyberattackers-hack-un-nuclear-power-plant/

技术类:


TLS nonce-nse

https://blog.cloudflare.com/tls-nonce-nse/

绕过WINDOWS的ASRL,实现一个反弹的SHELL

https://woumn.wordpress.com/2016/10/12/bypassing-aslr-on-windows-into-a-reverse-shell/

通过 Win10PE SE ISO 或 WIM实现持久化后门

http://cyberwarapt.blogspot.com/2016/10/persistent-backdooring-win10pe-se-iso.html

从老漏洞到新漏洞 — iMessage 0day(CVE-2016-1843) 挖掘实录

http://paper.seebug.org/65/

BBQSQL:一个开源的SQL注入利用工具

https://github.com/Neohapsis/bbqsql

二进制利用深入学习指南

https://github.com/bert88sta/how2exploit_binary

TypeSan: 类型冲突检测

https://nebelwelt.net/publications/files/16CCS2.pdf

Subversion 1.6.6 / 1.6.12 代码执行漏洞

https://dl.packetstormsecurity.net/1610-exploits/subversion-exec.txt

对NMOS集成芯片的逆向工程

https://www.wdj-consulting.com/blog/nmos-sample.html

MOSEC2016会议PPT:CVE-2015-1805 exploit & Samsung Knox(S6 ver.) bypass

https://speakerdeck.com/retme7/talk-is-cheap-show-me-the-code

openssl-x509-vulnerabilities poc

https://github.com/guidovranken/openssl-x509-vulnerabilities

价值1000美金的Prezi网站漏洞

https://hackernoon.com/prezi-1031-variables-40703c54f586#.pmw9ewaly

Responder 2.3.3.0发行,增加MultiRelay,交互式shell,远程hashdump,regdump等功能

https://github.com/lgandx/Responder

CVE (2016-0167)

https://www.fireeye.com/blog/threat-research/2016/05/windows-zero-day-payment-cards.html

Reverse engineering a wireless car key fob

http://phasenoise.livejournal.com/3822.html

微软修补CVE-2016-3298漏洞

https://www.proofpoint.com/us/threat-insight/post/microsoft-patches-CVE-2016-3298-second-information-disclosure-zero-day

Android系统新权限模型剖析与预警

http://blogs.360.cn/360mobile/2016/10/11/android_new_permission_model/

黑客从数据存储提供商窃取了5800万用户记录

http://news.softpedia.com/news/hacker-steals-58-million-user-records-from-data-storage-provider-509190.shtml

几个exploitKits开始派发cerber勒索软件

http://blog.trendmicro.com/trendlabs-security-intelligence/several-exploit-kits-now-deliver-cerber-4-0/

Windows 10的提权漏洞:Object Manager Pathological Lookup EoP

https://bugs.chromium.org/p/project-zero/issues/detail?id=924

OWASP London会议视频

https://www.youtube.com/owasplondon

对OwnCloud服务器的利用和后渗透攻击

https://rhinosecuritylabs.com/2016/10/operation-ownedcloud-exploitation-post-exploitation-persistence/

文章原文链接:https://www.anquanke.com/post/id/84719