http://p1.qhimg.com/t01ee0ded1a480b06ce.jpg

1、多个严重的漏洞影响RSI Videofied(一家法国生产报警面板的公司)告警协议

http://cybergibbons.com/alarms-2/multiple-serious-vulnerabilities-in-rsi-videofieds-alarm-protocol/

2、Jenkins漏洞利用,还是搞Nishang(powershell渗透利用程序)那哥们,这次搞一周渗透系列,这是第一天

http://www.labofapenetrationtester.com/2015/11/week-of-continuous-intrusion-day-1.html


3、针对欺骗TCP握手的讨论(好像当年Mitnick黑下村努的技术)

http://lgms.nl/blog-2

4、针对内存破坏漏洞的浏览器缓解措施

https://docs.google.com/document/d/19dspgrz35VoJwdWOboENZvccTSGudjQ_p8J4OPsYztM/edit#heading=h.3bmhtfuce3n8


5、反向工程parrot无人机(获取ROOT权限)

http://www.semecayounexploit.com/?sec=drones-robots&nota=14

6、来自LLVM项目的ELF链接器

http://blog.llvm.org/2015/11/new-elf-linker-from-llvm-project.html


7、燃气盗窃团队的Pump Skimming欺骗

http://krebsonsecurity.com/2015/11/gas-theft-gangs-fuel-pump-skimming-scams/

8、上周的Arris Modems设备的后门中的后门(https://w00tsec.blogspot.tw/2015/11/arris-cable-modem-has-backdoor-in.html),给出了shodan搜索关键字“net-dk”,“arris enter password”,“SSH-2.0-ARRIS_0.50”大概影响600,000个设备

https://threatpost.com/backdoor-in-a-backdoor-identified-in-600000-arris-modems/115459/


9、ANGLER EK派发恶意欺诈勒索软件CryptoWall 4.0的pcap通信包分析

http://malware-traffic-analysis.net/2015/11/30/index.html

10、通过恶意AP访问点,自动种植后门第二部分,第一部分在(http://decidedlygray.com/2015/11/19/evil-access-point-with-auto-backdooring-ftw/)

http://decidedlygray.com/2015/11/29/evil-access-point-with-auto-backdooring-part-2/


11、VolatilityBot :一个自动恶意代码dumper

http://volatility-labs.blogspot.tw/2015/11/guest-post-martin-korman-volatilitybot.html

12、IOT面对的安全挑战(从设备自身加密,设备不能及时更新/打补丁等方面讨论了下)

http://resources.infosecinstitute.com/security-challenges-in-the-internet-of-things-iot/


13、Belkin N150 路由器多个漏洞

https://0x62626262.wordpress.com/2015/11/30/belkin-n150-router-multiple-vulnerabilities/

14、来自FortiGuard实验室的针对2016年的5个威胁预测

http://blog.fortinet.com/post/the-top-5-threat-predictions-for-2016-from-fortiguard-labs


15、反向工程intel DRAM Addressing和利用

http://arxiv.org/pdf/1511.08756v1.pdf

16、反向工程tomtom智能手表第三部分

http://grangeia.io/2015/11/30/hacking-tomtom-runner-pt3/


17、QEMU新虚拟机逃逸漏洞深入分析

http://bobao.360.cn/learning/detail/2280.html

文章原文链接:https://www.anquanke.com/post/id/83019