Skip to content

Latest commit

 

History

History
98 lines (91 loc) · 7.99 KB

20180415-16.md

File metadata and controls

98 lines (91 loc) · 7.99 KB

RCE

名称 URL
GitHub - a2u / CVE-2018-7600:CVE-2018-7600的概念验证 https://paper.tuisec.win/detail/2df24739ba1cf2b
Drupal远程代码执行漏洞(CVE-2018-7600)分析 https://paper.seebug.org/571/ https://www.anquanke.com/post/id/104697
SysGauge Server 3.6.18 栈溢出漏洞分析及利用 https://paper.seebug.org/568/
云鼎实验室:Drupal CVE-2018-7600 分析及 PoC 构造 https://paper.seebug.org/567/
HoleyBeep: Explanations and exploit(数据回收) https://sigint.sh/#/holeybeep https://www.anquanke.com/post/id/104447
LimeSurvey中存在两个严重漏洞 可导致 web 服务器遭远程攻击 https://www.anquanke.com/post/id/104642
RCE with Spring Data Commons 分析和利用 http://t.cn/RmoKasD
Microsoft Credential Security Support Provider - Remote Code Execution Vulnerability https://cn.0day.today/exploit/description/30174
漏洞聚焦:TALOS-2018-0529-531 https://paper.tuisec.win/detail/d8f61baef4fea43
3月份最受欢迎的mal vul https://paper.tuisec.win/detail/892378a959ce283
GitHub - preempt / credssp:展示CVE-2018-0886的代码 https://paper.tuisec.win/detail/d4aa4a2dfc56f26
CVE-2018-1273 https://paper.tuisec.win/detail/fcb90bf72cec966
Drupal 0day Remote PHP Code Execution (Perl) https://cxsecurity.com/issue/WLB-2018040108
Microsoft凭据安全支持提供程序 - 远程执行代码 https://www.exploit-db.com/exploits/44453/

攻防对抗

名称 URL
恶意软件监视器 - 利用PyREBox进行恶意软件分析 https://blog.talosintelligence.com/2018/04/malware-monitor-pyrebox-for-analysis.html#more%22
ReconCat - 从Archive.org获取归档网址快照的工具 https://paper.tuisec.win/detail/645ec5e1a24e04a
模仿 - 在Linux中隐藏执行的工具 https://paper.tuisec.win/detail/0f1d486cbceb0be
宜信漏洞管理平台『洞察』开源啦 https://paper.tuisec.win/detail/8f492110eb4d092
五种测试工具和技术(每个系统管理员都应该知道) https://paper.tuisec.win/detail/2234033815fc0db
对手仿真工具列表 https://paper.tuisec.win/detail/8849258db43828d
GitHub - python-security / pyt https://paper.tuisec.win/detail/2ea3d0f305a4a48
GitHub - ustayready / CredKing https://paper.tuisec.win/detail/04fa3aa7df2eac6
GitHub - pownjs / pown https://paper.tuisec.win/detail/f01a802fba84daf
GitHub - pinnace / burp-jwt-fuzzhelper-extension https://paper.tuisec.win/detail/5829fe2d4c57ce5
不调用 Win32_Process 的情况下使用 WMI 横向渗透的技巧,来自 HITB 2018AMS https://conference.hitb.org/hitbsecconf2018ams/materials/D2T1%20-%20Philip%20Tsukerman%20-%20Expanding%20Your%20WMI%20Lateral%20Movement%20Arsenal.pdf
CredKing - 使用 AWS Lambda 轮换 IP 地址进行密码破解的工具 https://github.com/ustayready/CredKing
一款用于替代 PsExec 远程执行命令的 PowerShell 模块 Invoke-CommandAs 介绍 https://mkellerman.github.io/Death_to_psexec/ GitHub: https://github.com/mkellerman/Invoke-CommandAs
Vultr 域名劫持漏洞 https://vincentyiu.co.uk/vultr-domain-hijacking/

honypot

名称 URL
OWASPIoT攻击面区域项目 https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project?from=timeline#tab=IoT_Attack_Surface_Areas
另一天,又一系列的DDoS攻击 - 这次Sucuri及其客户遭到了全球一系列的攻击。 https://paper.tuisec.win/detail/eb46fcea02a1cf1 https://www.hackread.com/memcached-ddos-attack-poc-code-ip-addresses-posted-online/
漏洞聚焦:Moxa EDR-810工业安全路由器中的多个漏洞 https://paper.tuisec.win/detail/4c417fb8b51e439
专家发现一个代理僵尸网络由超过65,000个通过UPnP协议暴露的路由器组成 https://paper.tuisec.win/detail/f062fb831dfe58c
利用 iptables 的 TPROXY 模块简单实现对所有端口的监听 https://weibo.com/ttarticle/p/show?id=2309404229410592047332&mod=zwenzhang

APT&code

名称 URL
创新沙盒初探 (1) - RSAC2018之一 https://mp.weixin.qq.com/s/aiVCRboVeWXwope4zcho5A
APT趋势报告2018年第一季度 https://securelist.com/apt-trends-report-q1-2018/85280/
基于TaskKill命令防杀的进程保护 http://www.freebuf.com/articles/system/168094.html
Metasploit的简单木马免杀技术及后渗透面临的问题 http://www.freebuf.com/sectool/166682.html
Linux系统ETN挖矿病毒实例分析 http://www.freebuf.com/vuls/165348.html
Rp ++ - 旨在查找PE / Elf / Mach-O X86 / X64二进制文件中的ROP序列的工具 https://paper.tuisec.win/detail/a9f76817e2e59bb
Practical Black-Box Attacks Against Machine Learning https://paper.tuisec.win/detail/070f10cf650026e
金融黑客的惯用手段 MITB https://paper.tuisec.win/detail/62c14245b12a645
加密101:解密工具代码演练 https://blog.malwarebytes.com/threat-analysis/2018/04/encryption-101-decryption-tool-code-walkthrough/
Domato Fuzzer的一代引擎内部 https://www.sigpwn.io/blog/2018/4/14/domato-fuzzers-generation-engine-internals
利用深度神经网络检测恶意 PowerShell 命令 https://arxiv.org/pdf/1804.04177.pdf
Bitdefender 对一款用于复杂间谍活动的一体化工具包 RadRAT 的分析报告 https://labs.bitdefender.com/2018/04/radrat-an-all-in-one-toolkit-for-complex-espionage-ops/
新型代码注入技术 "Early Bird" 分析 https://www.cyberbit.com/blog/endpoint-security/new-early-bird-code-injection-technique-discovered/
关于 Rig Exploit Kit 通过 Adobe Flash CVE-2018-4878 漏洞传播 GandCrab 勒索软件的分析报告 https://jask.ai/wp-content/uploads/2017/11/TA_00012_2.pdf
PowerHammer:Exfiltrating Data from Air-GappedComputers through Power Lines(Paper) https://arxiv.org/pdf/1804.04014.pdf
XDiFF - 一款差分模糊测试框架 https://github.com/IOActive/XDiFF
如何制作一个 Password Cracker https://secapps.com/blog/2018/03/how-to-make-a-password-cracker

研究资料

名称 URL
如何成为最好的恶意软件分析师 http://www.hexacorn.com/blog/2018/04/14/how-to-become-the-best-malware-analyst-e-v-e-r/
爬虫 JavaScript 篇[Web 漏洞扫描器 https://paper.seebug.org/570/
Cisco ios shellcode: all-in-one译文 https://paper.seebug.org/569/
CISSP 课件 https://pan.baidu.com/s/1jGmqMbG#list/path=%2FCISSP&parentPath=%2F
jxwaf下一代防火墙 https://github.com/jx-sec/jxwaf
情报 3.0 时代情报的特征、任务与工具 https://mp.weixin.qq.com/s/_9VgIcg_m_reYJH-wRjOMA
Stealing HttpOnly Cookie via XSS https://xz.aliyun.com/t/2266
后台Getshell的两种常规姿势 https://mp.weixin.qq.com/s/jc1mYH8o2YyteY8hEyTbnw
科威盒子导航系统代码审计过程总结 https://blog.csdn.net/vspiders/article/details/79947816
如何在CTF中少走弯路(基础篇) http://www.freebuf.com/articles/rookie/166925.html
2017金融科技安全分析报告 https://mp.weixin.qq.com/s/RpYilQpXXuJXEfMhlSJ3lA
创新沙盒初探 (2) - RSAC2018之二 https://mp.weixin.qq.com/s/KEF458q-88jzrpRq6JpCUA
王飞跃——生成式对抗网络GAN的研究进展与展望 https://mp.weixin.qq.com/s/QiIRIHiGv6u-4QfK8awKpw
科普 一文读懂各种拟态防御网络设备 https://mp.weixin.qq.com/s/FHyE0fbEzEEIQoxbX1vSVA
pwnhub time injection带来的新思路 https://www.anquanke.com/post/id/104319
RSA2018专题报道:议题亮点抢先揭秘(含112份PPT) https://www.anquanke.com/post/id/104656#h3-14
记一次利用BLIND OOB XXE漏洞获取文件系统访问权限的测试 http://www.freebuf.com/vuls/167087.html
有趣的闪存:通过实践分析意外内存泄漏 http://www.freebuf.com/articles/web/167360.html
对一款不到2KB大小的JavaScript后门的深入分析 http://www.freebuf.com/articles/web/167702.html
Windows漏洞利用开发教程Part 2:Short Jump http://www.freebuf.com/articles/system/167959.html
Blockchain can be Blocked(比特币网络通讯底层漏洞详解) https://xz.aliyun.com/t/2280
HITBCTF-WEB-WP - Veneno https://paper.tuisec.win/detail/b08ed210247fba1
Appium Android For Windows 搭建环境 https://paper.tuisec.win/detail/310dc681b495a9b
androidre - 一款用于安卓逆向工程的 Docker 镜像 https://weibo.com/ttarticle/p/show?id=2309404229410592047332&mod=zwenzhang
awesome-firmware-security - 优秀的固件安全方向资源收集 https://github.com/PreOS-Security/awesome-firmware-security
pown - Node.js 上的安全测试与漏洞利用框架 https://github.com/pownjs/pown