http://p6.qhimg.com/t017313015b51e6034e.png


热点概要:当代Windows Exp开发教程深度分析绕过UAC的恶意doc使用MMC20.Application COM对象进行横向移动

国内热词(以下内容部分摘自http://www.solidot.org/):


超声跟踪可能被用于去匿名Tor用户

中国在2020年前投资2.5万亿人民币发展可再生能源

安全: FTC起诉D-Link销售不安全的路由器和摄像头

资讯类:


Plone安全团队声称FBI.gov被黑并不是由于Plone CMS的0day

http://www.networkworld.com/article/3155104/security/plone-dismisses-claim-that-flaw-in-its-cms-was-used-to-hack-fbi.html

针对linux的勒索软件KillDisk,交了赎金缺不解密文件

http://thehackernews.com/2017/01/linux-ransomware-malware.html

技术类:


windows/*nix下DNS传出注入数据的背后

http://www.lonelyrain.me/index.php/archives/315/

CVE-2016-6313 随机数预测分析

http://paper.seebug.org/170/

Sysmon Woes, Elasticsearch, and MITRE's ATTCK Matrix(part1)

http://www.blacklanternsecurity.com/blog/2016/12/11/sysmon-woes-elasticsearch-and-mitres-attack-matrix/

用Golang绕过防病毒软件

https://averagesecurityguy.github.io/2017/01/06/bypassing-av-with-golang/

https://github.com/averagesecurityguy/scripts/blob/master/stealth.go

当代Windows Exp开发教程 

https://drive.google.com/file/d/0B8sHjc3kJKQrUTYxSkpldy01ZWs/view

常见开源的安全测试的环境

https://github.com/joe-shenouda/awesome-cyber-skills

CVE-2016-7200 & CVE-2016-7201 (Edge) and Exploit Kits

http://malware.dontneedcoffee.com/2017/01/CVE-2016-7200-7201.html

分析Android恶意软件GM Bot的变体

http://securityaffairs.co/wordpress/55125/malware/gm-bot-android-malware.html

DNI发布的关于美国总统选举期间,俄罗斯活动的过程和起因的报告

https://www.dni.gov/files/documents/ICA_2017_01.pdf

Inside74181 ALU芯片:裸片照片和逆向工程

http://www.righto.com/2017/01/die-photos-and-reverse-engineering.html

深度分析绕过UAC的恶意doc

https://www.joesecurity.org/reports/report-1144eeaebb15044fa64f4d9bb5670349.html

hashcat v3.30发布

https://hashcat.net/forum/thread-6187.html

windows内核调试

https://vvalien1.wordpress.com/2016/12/26/kernel-debugging-101/

https://vvalien1.wordpress.com/2017/01/01/kernel-debugging-101-part2/

https://vvalien1.wordpress.com/2017/01/01/kernel-debugging-101-part3/

使用MMC20.Application COM对象进行横向移动

https://enigma0x3.net/2017/01/05/lateral-movement-using-the-mmc20-application-com-object/

如何绕过杀毒软件运行Mimikatz

http://www.blackhillsinfosec.com/?p=5555

【技术分享】Windows exploit开发系列教程:内核利用- >内存池溢出

http://bobao.360.cn/learning/detail/3376.html

文章原文链接:https://www.anquanke.com/post/id/85276