Skip to content

Latest commit

 

History

History
48 lines (45 loc) · 3.53 KB

20180509.md

File metadata and controls

48 lines (45 loc) · 3.53 KB

VUL

名称 URL
CVE-2018-7573 (仅作密网/公网测试) https://www.exploit-db.com/exploits/44596/
'sendfromfile.php'文件名'验证'代码执行 需验证可用及效果性 https://www.exploit-db.com/exploits/44599/
Palo Alto Networks - 'readSessionVarsFromFile()' Session Corruption (Metasploit) 仅作参考 https://www.exploit-db.com/exploits/44597/

攻防

名称 URL
Bug-Project-Framework https://github.com/Fplyth0ner-Combie/Bug-Project-Framework
axer将替换使用msfvenom创建有效载荷 https://github.com/ceh-tn/The-Axer
红蓝对抗中的对手弹性方法论介绍(一) http://www.4hou.com/penetration/11351.html
NBNS 欺骗介绍与工具使用 https://pentestlab.blog/2018/05/08/nbns-spoofing/
使用 Splunk 进行渗透测试前期情报分析的方法 https://vincentyiu.co.uk/offensivesplunk/
AutoTTP - Python 实现的 Empire / Metasploit 等框架的 API 调用库,用于实现自动化攻击 https://github.com/jymcheong/AutoTTP

honeypot

名称 URL
无线路由器范围内的严重漏洞 https://threatpost.com/sierra-wireless-patches-critical-vulns-in-hundreds-of-thousands-of-wireless-routers/131804/

APT&code

名称 URL
Lock. 勒索病毒分析 http://blogs.360.cn/blog/lock-%E5%8B%92%E7%B4%A2%E7%97%85%E6%AF%92%E5%88%86%E6%9E%90/
对 MuddyWater 新样本的分析 https://sec0wn.blogspot.ae/2018/05/clearing-muddywater-analysis-of-new.html
NCC Group 发布新工具 yaml2yara,用于将 YAML 快速转换为 Yara 规则 https://www.nccgroup.trust/uk/about-us/newsroom-and-events/blogs/2018/may/tool-release-yaml2yara/
DbgShell - Powershell 编写的 Windows 调试引擎 https://github.com/Microsoft/DbgShell

研究资料

名称 URL
heap-viewer - 用于检查 glibc 堆的 IDA Pro 插件 https://github.com/danigargu/heap-viewer
隐藏和寻求物联网僵尸网络以新的技巧,持久性复活 https://paper.tuisec.win/detail/050a0c911e810f0
取证分析】Linux XOR.DDoS样本取证特征与清除 https://paper.tuisec.win/detail/9ef56d6c5616fcb
CVE-2018-7573 https://cn.0day.today/exploit/30317
信息安全服务五大资质 http://www.youxia.org/2018/05/38229.html
调查暗网中的钓鱼工具包 http://www.freebuf.com/sectool/170663.html
Hiding Metasploit Shellcode to Evade Windows Defender https://blog.rapid7.com/2018/05/03/hiding-metasploit-shellcode-to-evade-windows-defender/?from=timeline
2017中国企业邮箱安全性研究报告 https://mp.weixin.qq.com/s/1My9bwN2BLbCwcqEIP-xeA
探寻诺顿安全路由器任意命令执行漏洞(CVE-2018-5234) https://www.anquanke.com/post/id/107280
栈溢出之ret2dlresolve学习 http://www.freebuf.com/articles/system/170661.html
Ghost Tunnel http://www.freebuf.com/articles/wireless/171108.html
GitLab web hooks SSRF https://github.com/Cryin/Paper/blob/master/GitLab%20web%20hooks%20SSRF(CVE-2018-8801)%20Patch%20analysis%20and%20How%20to%20safely%20fix%20SSRF.md
GPON家庭路由器上的RCE(CVE-2018-10561) https://github.com/f3d0x0/GPON
区块链安全生存指南 https://chaitin.cn/cn/download/blockchain_security_guide_20180507.pdf
PeDoll 开源及使用教程 https://bbs.ichunqiu.com/thread-39930-1-1.html?from=sec
启明星辰集团工业物联网网络安全解决方案白皮书 http://www.venustech.com.cn/UserFiles/%E5%90%AF%E6%98%8E%E6%98%9F%E8%BE%B0%E5%B7%A5%E4%B8%9A%E7%89%A9%E8%81%94%E7%BD%91%E7%BD%91%E7%BB%9C%E5%AE%89%E5%85%A8%E8%A7%A3%E5%86%B3%E6%96%B9%E6%A1%88%E7%99%BD%E7%9A%AE%E4%B9%A6-20180428(6).pdf