http://p6.qhimg.com/t017313015b51e6034e.png


热点概要:Apache Struts 远程代码执行(devMode开启)Adobe Acrobat Reader的JPEG解码器的远程代码执行Windows事件响应基础windows内核利用java反序列化exp集合试、渗透测试技术之另类Windows提权


国内热词(以下内容部分摘自http://www.solidot.org/):


ProtonMail允许用户通过Tor访问

比特币交易面临更严格审查

移动: 美图应用引发监视用户的担忧

资讯类:


暗网中Satan勒索平台提供勒索服务

http://securityaffairs.co/wordpress/55487/malware/satan-raas.html

数据泄漏类:


Supercell(部落冲突,超级细胞)社区论坛上的帐户被黑泄漏100w多个账户

http://securityaffairs.co/wordpress/55507/data-breach/supercell-forum-hacked.html

技术类:


Apache Struts 远程代码执行(devMode开启)

http://www.securityfocus.com/bid/95675/info

Adobe Acrobat Reader的JPEG解码器的远程代码执行

http://www.talosintelligence.com/reports/TALOS-2016-0259/

docker在蜜罐和检测恶意软件沙盒中的应用

https://dadario.com.br/docker-for-automating-honeypots-or-malware-sandboxes/

Windows事件响应基础

https://jordanpotti.com/2017/01/20/basics-of-windows-incident-response/

java反序列化exp集合

https://github.com/CoalfireLabs/java_deserialization_exploits

跨平台的后门分析

https://securelist.com/blog/research/73503/from-linux-to-windows-new-family-of-cross-platform-desktop-backdoors-discovered/


bypass Win10 x64 v1511 w / SMEP 任意重写漏洞利用

https://github.com/GradiusX/HEVD-Python-Solutions/blob/master/Win10%20×64%20v1511/HEVD_arbitraryoverwrite.py

windows内核利用

http://www.hacking-training.com/download/WKE.pdf

通过QueueUserAPC进行Shellcode注入

http://subt0x10.blogspot.com/2017/01/shellcode-injection-via-queueuserapc.html

Telegram模糊流量绕过审查

https://blog.susanka.eu/how-telegram-obfuscates-its-mtproto-traffic/

渗透测试技术之另类Windows提权

http://bobao.360.cn/learning/detail/3439.html

hook Android系统调用的乐趣和好处

http://bobao.360.cn/learning/detail/3432.html

文章原文链接:https://www.anquanke.com/post/id/85378