1月7日-每日安全知识热点

阅读量    28591 |

分享到: QQ空间 新浪微博 微信 QQ facebook twitter

http://p3.qhimg.com/t012dfaf746e4fefbe3.jpg

1.使用Radare2和ruby写恶意软件配置文件解析

http://www.morphick.com/blog/2016/1/6/writing-a-malware-config-parser-using-radare2-and-ruby

2.另一款签名的恶意软件:Spymel

http://research.zscaler.com/2016/01/yet-another-signed-malware-spymel.html

3.Blackphone被暴可被接管的风险漏洞

https://www.sentinelone.com/blog/vulnerability-in-blackphone-puts-devices-at-risk-for-takeover/

4.Let's Encrypt项目被Malvertisers滥用

http://blog.trendmicro.com/trendlabs-security-intelligence/lets-encrypt-now-being-abused-by-malvertisers/

5.“逆向工程”真正的蜡烛

https://cpldcpu.wordpress.com/2016/01/05/reverse-engineering-a-real-candle/

6.GunCon3逆向和Linux驱动

https://beardypig.github.io/2016/01/06/guncon3/

7.从HTTPS到http的referer泄露

http://c0rni3sm.blogspot.com/2016/01/referrer-leakage-from-https-to-https.html

8.通过部署蜜罐捕捉0DAY第一部分

http://null-byte.wonderhowto.com/how-to/hack-like-pro-capturing-zero-day-exploits-wild-with-dionaea-honeypot-part-1-0165708/

9.使用idapython使你的逆向生活更轻松第四部分

http://researchcenter.paloaltonetworks.com/2016/01/using-idapython-to-make-your-life-easier-part-4/

10.cisco VLAN Trunking协议漏洞

http://tools.cisco.com/security/center/content/CiscoSecurityResponse/cisco-sr-20060913-vtp

11.Kaspersky Labs DLL Hijacking

https://cxsecurity.com/issue/WLB-2016010022

12.针对乌克兰网络攻击的恶意文件样本分析

https://ics.sans.org/blog/2016/01/01/potential-sample-of-malware-from-the-ukrainian-cyber-attack-uncovered

13.VoLTE安全分析第一部分

https://www.insinuator.net/2016/01/security-analysis-of-volte-part-1/

14.Kippo配置netscreen后门蜜罐

https://github.com/gregcmartin/Kippo_JunOS

分享到: QQ空间 新浪微博 微信 QQ facebook twitter
|推荐阅读
|发表评论
|评论列表
加载更多