2017-05-10 10:19:13
阅读:198次
点赞(0)
收藏
作者:adlab_puky
热点概要:FireEye在野外发现微软Office产品中两个RCE 0day,同时还有一个提权漏洞、NVIDIA GPU显卡驱动程序存在漏洞可能导致拒绝服务或权限升级、Hajime样本技术分析报告、ESET Sednit组织利用"Trump’s attack on Syria"文件(两个0day)作为诱导进行攻击,影响法国大选、WOLFSSL库X509证书文本解析存在代码执行漏洞、关于逆向工程移动应用程序的一系列文章
资讯类:
新型物联网僵尸网络Persirai现身
http://www.securityweek.com/new-persirai-iot-botnet-emerges
海康威视修补IP摄像头的后门
https://threatpost.com/hikvision-patches-backdoor-in-ip-cameras/125522/
技术类:
微软发布五月致谢
https://portal.msrc.microsoft.com/en-us/security-guidance/acknowledgments
WOLFSSL库X509证书文本解析存在代码执行漏洞
http://www.talosintelligence.com/reports/TALOS-2017-0293/
FireEye在野外发现微软Office产品中两个RCE 0day,同时还有一个提权漏洞
https://www.fireeye.com/blog/threat-research/2017/05/eps-processing-zero-days.html
ESET Sednit组织利用"Trump’s attack on Syria"文件(两个0day)作为诱导进行攻击,影响法国大选
https://www.welivesecurity.com/2017/05/09/sednit-adds-two-zero-day-exploits-using-trumps-attack-syria-decoy/
MSRC团队发布关于解决EPS攻击的公告
https://blogs.technet.microsoft.com/msrc/2017/05/09/coming-together-to-address-encapsulated-postscript-eps-attacks/
在AD中滥用DNSAdmins权限
http://www.labofapenetrationtester.com/2017/05/abusing-dnsadmins-privilege-for-escalation-in-active-directory.html
Airachnid:Burp Web Cache欺骗扩展插件
https://www.trustwave.com/Resources/SpiderLabs-Blog/Airachnid--Web-Cache-Deception-Burp-Extender/
MS-Edge:欺骗恶意软件页面修补后被再次绕过
https://www.cracking.com.ar/demos/edgesmartscreen/patch-bypass-2.html
NVIDIA GPU显卡驱动程序存在漏洞可能导致拒绝服务或权限升级
http://nvidia.custhelp.com/app/answers/detail/a_id/4462
Persirai:新的物联网IoT僵尸网络针对的IP摄像头
http://blog.trendmicro.com/trendlabs-security-intelligence/persirai-new-internet-things-iot-botnet-targets-ip-cameras/
Hajime样本技术分析报告
http://blog.nsfocus.net/hajime-sample-technical-analysis-report/
批量入侵免流网站(多为阿里云腾讯云等服务器)
https://bbs.ichunqiu.com/thread-19121-1-1.html
五指 CMS4.0 任意文件下载漏洞
http://139.129.31.35/index.php/archives/530/
Fuzzing Apache httpd server with American Fuzzy Lop + persistent mode
https://animal0day.blogspot.co.uk/2017/05/fuzzing-apache-httpd-server-with.html
IDA脚本-ARM系统指令高亮
https://github.com/gdelugre/ida-arm-system-highlight
GitLab的一处存储xss
https://hackerone.com/reports/218872
使用WhatsApp收集大量数据(附脚本)
https://www.lorankloeze.nl/2017/05/07/collecting-huge-amounts-of-data-with-whatsapp/
Expanding the Empire with SQL
https://blog.netspi.com/expanding-the-empire-with-sql/
Chrome XSS auditor bypass
https://twitter.com/jackmasa/status/861947048072953862
windows exploits
https://github.com/abatchy17/WindowsExploits
网络钓鱼广告文章
https://blog.inspired-sec.com/archive/2017/05/07/Phishing.html
关于逆向工程移动应用程序的一系列文章
http://www.vantagepoint.sg/blog/83-mobile-reverse-engineering-unleashed
本文由 安全客 原创发布,如需转载请注明来源及本文地址。
本文地址:http://bobao.360.cn/learning/detail/3831.html