热点概要:绕过WINDOWS的ASRL,实现一个反弹的SHELL、通过 Win10PE SE ISO 或 WIM实现持久化后门、Subversion 1.6.6 / 1.6.12 代码执行漏洞、CVE-2016-3298、CVE (2016-0167)
国内热词:
NSA能在加密密钥中植入“陷阱门素数”
三星测试人员被禁止使用电子邮件联络
Facebook、Instagram和Twitter被指让监视公司访问数据
Signal 支持消息阅后即焚
资讯类:
黑客攻击联合国核电站,企图窃取原料用于脏炸弹。
http://www.zdnet.com/article/cyberattackers-hack-un-nuclear-power-plant/
技术类:
TLS nonce-nse
https://blog.cloudflare.com/tls-nonce-nse/
绕过WINDOWS的ASRL,实现一个反弹的SHELL
https://woumn.wordpress.com/2016/10/12/bypassing-aslr-on-windows-into-a-reverse-shell/
通过 Win10PE SE ISO 或 WIM实现持久化后门
http://cyberwarapt.blogspot.com/2016/10/persistent-backdooring-win10pe-se-iso.html
从老漏洞到新漏洞 — iMessage 0day(CVE-2016-1843) 挖掘实录
BBQSQL:一个开源的SQL注入利用工具
https://github.com/Neohapsis/bbqsql
二进制利用深入学习指南
https://github.com/bert88sta/how2exploit_binary
TypeSan: 类型冲突检测
https://nebelwelt.net/publications/files/16CCS2.pdf
Subversion 1.6.6 / 1.6.12 代码执行漏洞
https://dl.packetstormsecurity.net/1610-exploits/subversion-exec.txt
对NMOS集成芯片的逆向工程
https://www.wdj-consulting.com/blog/nmos-sample.html
MOSEC2016会议PPT:CVE-2015-1805 exploit & Samsung Knox(S6 ver.) bypass
https://speakerdeck.com/retme7/talk-is-cheap-show-me-the-code
openssl-x509-vulnerabilities poc
https://github.com/guidovranken/openssl-x509-vulnerabilities
价值1000美金的Prezi网站漏洞
https://hackernoon.com/prezi-1031-variables-40703c54f586#.pmw9ewaly
Responder 2.3.3.0发行,增加MultiRelay,交互式shell,远程hashdump,regdump等功能
https://github.com/lgandx/Responder
CVE (2016-0167)
https://www.fireeye.com/blog/threat-research/2016/05/windows-zero-day-payment-cards.html
Reverse engineering a wireless car key fob
http://phasenoise.livejournal.com/3822.html
微软修补CVE-2016-3298漏洞
Android系统新权限模型剖析与预警
http://blogs.360.cn/360mobile/2016/10/11/android_new_permission_model/
黑客从数据存储提供商窃取了5800万用户记录
几个exploitKits开始派发cerber勒索软件
Windows 10的提权漏洞:Object Manager Pathological Lookup EoP
https://bugs.chromium.org/p/project-zero/issues/detail?id=924
OWASP London会议视频
https://www.youtube.com/owasplondon
对OwnCloud服务器的利用和后渗透攻击
文章原文链接:https://www.anquanke.com/post/id/84719