5月20日-每日安全知识热点

http://p0.qhimg.com/t01f7ef32da341925d2.jpg

GMAIL禁止了SMTP的rc4和sslv3的支持

https://cryptosense.com/gmail-disabling-rc4-and-sslv3-smtp-support/

泄露的 Carberp KBot 源码被用于新的钓鱼广告活动中

http://phishme.com/bolek-leaked-carberp-kbot-source-code-complicit-new-phishing-campaigns/

InstaBrute:2种方式破解 Instagram 账号

https://www.arneswinnen.net/2016/05/instabrute-two-ways-to-brute-force-instagram-account-credentials/

反向工程 C++ 第一部分:函数模板和函数载入

http://www.cybersmash.io/reversing-c-pt-1-function-overloading-and-function-templates/

绕过 Device Guard执行.net代码

http://subt0x10.blogspot.tw/2016/05/to-disarm-device-guard-bring-debugger.html

Petya 和 Mischa – 勒索软件二重奏(第一部分)

https://blog.malwarebytes.org/threat-analysis/2016/05/petya-and-mischa-ransomware-duet-p1/

CoreOS Linux Alpha远程SSH安全问题描述,昨天曾推送过https://coreos.com/blog/alpha-security-incident-subset-of-users-affected.html

https://coreos.com/blog/security-brief-coreos-linux-alpha-remote-ssh-issue.html

powershell版本的autoruns,列举开机自动运行项

https://github.com/p0w3rsh3ll/AutoRuns

使用一条指令探测KMDs

http://www.anti-reversing.com/detecting-kmds-with-a-single-instruction/

一般网民的在线隐私

https://www.troyhunt.com/going-dark-online-privacy-and-anonymity-for-normal-people/

Apple OS X IOAudioFamily 缓冲区溢出导致的提权漏洞

http://www.zerodayinitiative.com/advisories/ZDI-16-347/

Apple OS X IntelAccelerator 越界索引导致的提权漏洞

http://www.zerodayinitiative.com/advisories/ZDI-16-345/

(Pwn2Own) Apple Safari TextTrack 对象UAF漏洞导致的远程代码执行

http://www.zerodayinitiative.com/advisories/ZDI-16-342/

x86 shellcode 混淆第二部分

https://breakdev.org/x86-shellcode-obfuscation-part-2/

从hackintTeam泄露的Kernel Waitery利用一直在使用

http://blog.trendmicro.com/trendlabs-security-intelligence/kernel-waiter-exploit-from-the-hacking-team-leak-still-being-used/

Defusing a binary bomb with gdb – Part 6

http://blog.carlosgaldino.com/2016/05/19/defusing-a-binary-bomb-with-gdb-part-6.html

当游戏遇到OSINT

http://www.automatingosint.com/blog/2015/07/gaming-meets-osint-her-story/

SyScan360 新加坡会议所有视频

https://www.youtube.com/playlist?list=PLKpjtdatAwijAJQZXk1piUynjIL3TYxRO

html5的webrtc,audio,battery等api可以被滥用曝光用户浏览隐私

https://webtransparency.cs.princeton.edu/webcensus/index.html#fp-results

使用windbg 捕捉rootkit

http://www.reconstructer.org/papers/Hunting%20rootkits%20with%20Windbg.pdf

客户端的战争

http://www.hackinbo.it/wp-content/uploads/2016/05/HackInBO_2016_Orru.pdf

免责声明:文章内容不代表本站立场,本站不对其内容的真实性、完整性、准确性给予任何担保、暗示和承诺,仅供读者参考,文章版权归原作者所有。如本文内容影响到您的合法权益(内容、图片等),请及时联系本站,我们会及时删除处理。查看原文

为您推荐