6月7日-每日安全知识热点

阅读量    46882 |

分享到: QQ空间 新浪微博 微信 QQ facebook twitter

http://p0.qhimg.com/t01f7ef32da341925d2.jpg

https://www.fireeye.com/blog/threat-research/2016/06/angler_exploit_kite.html

ANGLER EXPLOIT KIT 可以逃逸emet

https://blog.nelhage.com/2011/03/exploiting-pickle/

Python's "Pickle"的利用

http://haxx.ml/post/145508617751/hacking-mattermost-2-year-of-nodejs-on-the

Hacking三菱欧蓝德PHEV混合动力车 (通过WIFI攻击禁止掉车辆报警系统)

http://haxx.ml/post/145508617751/hacking-mattermost-2-year-of-nodejs-on-the

node.js桌面应用开发的安全

https://blogs.mcafee.com/mcafee-labs/locky-ransomware-hides-under-multiple-obfuscated-layers-of-javascript/

Locky恶意欺诈勒索软件隐藏在多层javascript混淆中

https://www.invincea.com/2016/06/hash-factory-new-cerber-ransomware-morphs-every-15-seconds/

新的恶意欺诈软件Cerber没15秒变换一次

http://cyber-defense.sans.org/blog/2016/06/06/powershell-7-zip-compress-archive-encryption

powershell 的 7ZIP模块对比压缩归档加密

https://www.insinuator.net/2016/06/samlrequest-burpsuite-extention/

burpsuite的SAMLReQuest 扩展

https://blog.fortinet.com/2016/06/06/analysis-of-use-after-free-vulnerability-cve-2016-4119-in-adobe-acrobat-and-reader

分析(CVE-2016-4119) Adobe Acrobat和Reader的UAF漏洞

http://www.cutawaysecurity.com/blog/2016/06/06/creating-a-docker-ieee-802-dot-15-dot-4-toolkit/

新建 Docker IEEE 802.15.4 Toolkit

http://www.bmicrosystems.com/blog/windows-api-hooking-with-x86-assembly/

使用X86汇编进行WINDOWS API Hooking

http://onready.me/old_horse_attacks.html

老技巧:在LINK中潜入反弹SHELL脚本

http://www.ioctls.net/

windows ioctls参考

分享到: QQ空间 新浪微博 微信 QQ facebook twitter
|推荐阅读
|发表评论
|评论列表
加载更多