http://p6.qhimg.com/t017313015b51e6034e.png

热点概要:方程式组织eqgrp-auction-file.tar.xz文件归档、CIA专门针对 Windows 操作系统的恶意程序框架 GrasshopperMysql字符编码利用技巧Two Bugs, One Func():内核信息泄漏CVE-2017-2416:在 ImageIO框架中由于畸形gif文件导致的远程代码执行,影响大多ios/mac os 应用野外捕获的office 0day在二进制代码级别缓解高级代码重用攻击

国内热词(以下内容部分摘自http://www.solidot.org/):


黑客组织公开 NSA 的网络战武器

WikiLeaks 曝光 CIA 的 Windows 黑客工具

研究人员发现旨在破坏物联网设备的恶意攻击 

资讯类:


Microsoft Word 0day在野外被利用

http://thehackernews.com/2017/04/microsoft-word-zero-day.html

数以百万计的手机和笔记本电脑潜在地受到基带存在0day

http://securityaffairs.co/wordpress/57867/hacking/mobile-baseband-zero-day.html

Crooks 窃取通过无文件的恶意软件从俄罗斯的8台ATM窃取80万美刀

http://securityaffairs.co/wordpress/57881/cyber-crime/atmitch-fileless-malaware.html

技术类:


CIA专门针对 Windows 操作系统的恶意程序框架 Grasshopper

https://wikileaks.org/vault7/document/Grasshopper-v2_0_2-UserGuide/

Mysql字符编码利用技巧

https://www.leavesongs.com/PENETRATION/mysql-charset-trick.html

SSRF in java

http://joychou.org/index.php/web/javassrf.html

SSRF in php

http://joychou.org/index.php/web/phpssrf.html

方程式组织eqgrp-auction-file.tar.xz文件归档

https://github.com/x0rz/EQGRP

TYPO3 模块存在sql注入,影响60k+网站

https://www.ambionics.io/blog/typo3-news-module-sqli

CVE-2017-2416:在 ImageIO框架中由于畸形gif文件导致的远程代码执行,影响大多ios/mac os 应用

https://blog.flanker017.me/cve-2017-2416-gif-remote-exec/

虚拟化:利用Xen虚拟机管理程序

https://googleprojectzero.blogspot.com/2017/04/pandavirtualization-exploiting-xen.html

CVE-2017-7185:Mongoose OS – Use-after-free / Denial of Service

http://seclists.org/bugtraq/2017/Apr/9

野外捕获的office 0day

https://securingtomorrow.mcafee.com/mcafee-labs/critical-office-zero-day-attacks-detected-wild/

Two Bugs, One Func():内核信息泄漏

https://objective-see.com/blog/blog_0x1A.html  

https://objective-see.com/blog/blog_0x1B.html

针对方程式黑客攻击的YARA & Sigma规则

https://github.com/Neo23x0/signature-base/blob/master/yara/apt_eqgrp_apr17.yar 

https://github.com/Neo23x0/sigma/blob/master/rules/apt/apt_equationgroup_lnx.yml

APT2: 自动化渗透测试工具集

http://pentestit.com/apt2-automated-penetration-testing-toolkit/

Horde Groupware Webmail 多个远程代码执行漏洞

https://blogs.securiteam.com/index.php/archives/3107

使用Ubuntu .DESKTOP作为恶意软件向量

http://blog.mazinahmed.net/2017/04/using-ubuntu-desktop-as-malware-vector.html

在二进制代码级别缓解高级代码重用攻击

http://syssec.rub.de/media/emma/veroeffentlichungen/2016/05/01/Tough-call-Oakland16.pdf

Linux内核用户和管理员指南

https://01.org/linuxgraphics/gfx-docs/drm/admin-guide/index.html

Sn1per v2.4发布,新增IIS6 RCE, Apache Struts RCE,open X11 server detection

https://github.com/1N3/Sn1per

2017 AsiaCSS 会议论文列表

http://dl.acm.org/citation.cfm?id=3052973

OS X 逆向实例(二)- BETTERZIP 3.1.2

https://and-rev.blogspot.com/2017/04/os-x-betterzip-312.html

文章原文链接:https://www.anquanke.com/post/id/85854