4月27日-每日安全知识热点

http://p0.qhimg.com/t01f7ef32da341925d2.jpg

1、在网络中的passive DNS的威胁捕捉:第一部分

https://www.endgame.com/blog/hunting-cheap-part-1-architecture

2、系列文章:探索Qualcomm的安全执行环境

http://bits-please.blogspot.tw/2016/04/exploring-qualcomms-secure-execution.html

3、通过OTF+SVG与XEE利用CSS注入允许你读取页面内容

https://gist.github.com/cure53/1501bcb6aa6608b2af38fcafd68af219

4、Burpsuite Intruder的payloads收集

https://github.com/1N3/IntruderPayloads

5、Mosh:移动设备端替换SSH的SHELL,介绍文档在https://mosh.mit.edu/mosh-paper.pdf

https://mosh.mit.edu/

6、在windows中运行不经修改的linux应用程序

https://github.com/wishstudio/flinux

7、理解和明白wmi恶意软件 (趋势2010年的报告)

https://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp__understanding-wmi-malware.pdf

8、Defusing a binary bomb with gdb 第四部分,前几部分分别在http://blog.carlosgaldino.com/2015/12/03/defusing-a-binary-bomb-with-gdb-part-3.html,http://blog.carlosgaldino.com/2015/11/19/defusing-a-binary-bomb-with-gdb-part-2.html

http://blog.carlosgaldino.com/2016/04/25/defusing-a-binary-bomb-with-gdb-part-4.html

9、调试内存异常

http://blogs.unity3d.com/2016/04/25/debugging-memory-corruption-who-the-hell-writes-2-into-my-stack-2/

10、了解恶意欺诈软件分发操作,第二部分,第一部分在https://reaqta.com/2016/04/uncovering-a-ransomware-distribution-operation/

https://reaqta.com/2016/04/uncovering-ransomware-distribution-operation-part-2/

11、Social-Engineer Toolkit (SET) v7.1 “Blue Steel” 发行

https://www.trustedsec.com/blog/social-engineer-toolkit-set-v7-1-blue-steel-released/

12、wireshark使用案例:结果慢相应时间

http://www.lovemytool.com/blog/2016/04/wireshark-use-case-slow-response-times-part-2-by-paul-offord.html?utm_source=twitterfeed&utm_medium=twitter

13、PenQ:一款集合多个安全测试插件的浏览器

http://www.qburst.com/products/PenQ

14、PowerShell Remoting 安全注意事项

https://msdn.microsoft.com/en-us/powershell/scripting/topic/winrmsecurity

15、上次推送的恶意欺诈软件统计列表新增了““Prevention"(防护)列

https://docs.google.com/spreadsheets/d/1TWS238xacAto-fLKh1n5uTsdijWdCEsGIM0Y0Hvmc5g/pubhtml#

16、FBI使用的TOR去匿名化工具分析

https://assets.documentcloud.org/documents/2124281/fbi-tor-busting-227-1.pdf

17、黑客如何滥用SS7漏洞的

https://blogs.mcafee.com/consumer/ss7-flaw-how-hackers-abuse-it/

18、H5SC Mini-Challenge 5 XSS挑战的writeup

https://github.com/cure53/XSSChallengeWiki/wiki/H5SC-Mini-Challenge-5

19、在scala中些x86_64动态汇编

https://github.com/guillaumebort/scasm

免责声明:文章内容不代表本站立场,本站不对其内容的真实性、完整性、准确性给予任何担保、暗示和承诺,仅供读者参考,文章版权归原作者所有。如本文内容影响到您的合法权益(内容、图片等),请及时联系本站,我们会及时删除处理。查看原文

为您推荐