3月18日-每日安全知识热点

http://p9.qhimg.com/t01f7ef32da341925d2.jpg

1.使用跨站脚本和中间人攻击绕过Noscript安全

https://mazinahmed.net/uploads/Bypassing%20NoScript%20Security%20Suite%20Using%20Cross-Site%20Scripting%20and%20MITM%20Attacks.pdf

2.ruby-nmap:nmap的ruby版接口 

https://github.com/sophsec/ruby-nmap

3.骇客给算法实现有缺陷的恶意欺诈软件打补丁,以后通过暴力破解希望很小了 

http://news.yahoo.com/hackers-now-patching-ransomware-making-impossible-crack-213003921.html

4.用于进行web目录递归或不安全文件上传模糊测试的perl脚本 

https://github.com/ewilded/get_docroots

5.vmware修补vRealize软件的xss漏洞 

http://www.zdnet.com/article/vmware-patches-severe-xss-flaws-in-vrealize-software/

6.针对消息队列(ZeroMQ/Redis/RabbitMQ )的渗透测试工具 

https://github.com/cr0hn/enteletaor

7.SHIPS介绍:linux/windows平台的集中化本地密码管理平台 

https://www.trustedsec.com/january-2015/introducing-ships-centralized-local-password-management-windows/

8.Cisco UCS Manager 2.1(1b) Shellshock 利用poc 

https://packetstormsecurity.com/files/download/136278/ciscoucs-exec.txt

9.Nemucod javascript恶意软件家族增加TeslaCrypt恶意欺诈软件 

http://blog.fortinet.com/post/nemucod-adds-ransomware-routine

10.SQL Injection Cheat Sheet从2007年以后,再次更新 

https://www.netsparker.com/blog/web-security/sql-injection-cheat-sheet/

11.安天AVL联合猎豹首曝“多米诺”恶意应用市场APP 

http://blog.avlyun.com/2016/03/2849/maliciousappstore/

12.McAfee使用web Beacons用来跟踪用户,投递定向广告 

https://duo.com/assets/pdf/bring-your-own-dilemma.pdf

13.滥用GPO权限 

http://www.harmj0y.net/blog/redteaming/abusing-gpo-permissions/

14.安全专家爱用python,恶意软件作者也一样 

https://isc.sans.edu/forums/diary/Security+Pros+Love+Python+and+So+Do+Malware+Authors/20853

15.安装和配置EMET 

https://4sysops.com/archives/installing-and-configuring-the-enhanced-mitigation-experience-toolkit-emet/

16.Encrypter-Metasploit:通过单字节异或方法实现杀毒基于特征码扫描的工具 

https://github.com/Sogeti-Pentest/Encrypter-Metasploit

17.BetterCap v1.5发行,增加新的TCP模块和传输层代理 

https://github.com/evilsocket/bettercap/archive/v1.5.0.zip

18.ltrace是如何工作的 

http://blog.packagecloud.io/eng/2016/03/14/how-does-ltrace-work/

19.Dridex僵尸网络开始加密他们的配置文件 

http://blog.avira.com/dridex-starts-hardening-settings-files/

20.PE和ELF指南第二部分 

http://resources.infosecinstitute.com/complete-tour-of-pe-and-elf-part-2/

21.CVE-2016-2098:以及rails的CVE-2016-2097,2个RCE,一个通过controller利用,一个通过view利用 

https://groups.google.com/forum/#!msg/rubyonrails-security/ly-IH-fxr_Q/WLoOhcMZIAAJ

22.PoC||GTFO 11发行 

http://www.sultanik.com/pocorgtfo

免责声明:文章内容不代表本站立场,本站不对其内容的真实性、完整性、准确性给予任何担保、暗示和承诺,仅供读者参考,文章版权归原作者所有。如本文内容影响到您的合法权益(内容、图片等),请及时联系本站,我们会及时删除处理。查看原文

为您推荐