1.俄罗斯《生意人报》商业报纸报道说,一个包含数百万美国选民详细信息的数据库已经出现在俄罗斯黑暗网上
https://securityaffairs.co/wordpress/107784/data-breach/us-voters-db-leak.html
1.前置NGINX的TAS群集可能易受DoS攻击(CVE-2020-5416)
https://tanzu.vmware.com/security/cve-2020-5416
2.FreeBSD在8月份修复的内核提权漏洞(CVE-2020-7460)
https://www.zerodayinitiative.com/blog/2020/9/1/cve-2020-7460-freebsd-kernel-privilege-escalation
3.介绍在现代Web浏览器中查找和利用JavaScript引擎漏洞所涉及的技术挑战,评估了当前的缓解漏洞技术
https://googleprojectzero.blogspot.com/2020/09/jitsploitation-one.html
https://googleprojectzero.blogspot.com/2020/09/jitsploitation-two.html
https://googleprojectzero.blogspot.com/2020/09/jitsploitation-three.html
4.Magento电子商务网站使用的第三方插件Magmi的多个漏洞(CVE-2020-5776, CVE-2020-5777)
https://www.tenable.com/blog/cve-2020-5776-cve-2020-5777-multiple-vulnerabilities-in-the-magmi-magento-mass-import-plugin
1.在野发现的无需不使用Microsoft Office即可创建装载宏的Excel工作簿的攻击方式
https://blog.nviso.eu/2020/09/01/epic-manchego-atypical-maldoc-delivery-brings-flurry-of-infostealers/
2.QNAP NAS在野漏洞攻击事件
https://blog.netlab.360.com/in-the-wild-qnap-nas-attacks/
3.对远控ComRAT v4的详尽分析
https://www.msreverseengineering.com/blog/2020/8/31/an-exhaustively-analyzed-idb-for-comrat-v4
4.BLINDINGCAN远控以及朝鲜的恶意攻击活动
https://www.sentinelone.com/blog/the-blindingcan-rat-and-malicious-north-korean-activity/
5.深入研究黑客组织Fin7进行的BadUSB攻击
https://threatintel.blog/OPBlueRaven-Part2/
6.使用Telegram做C&C的信用卡Skimmer
The public key for JSEncrypt is on line 120, followed by the jsencryptstart function.
6/x pic.twitter.com/dME3eXe4Gz
— Affable Kraut (@AffableKraut) August 28, 2020
7.2020年夏季的事件响应趋势报告
https://blog.talosintelligence.com/2020/09/CTIR-quarterly-trends-Q4-2020.html
8.CrowdStrike发布的2020全球威胁报告
https://www.crowdstrike.com/resources/reports/2020-crowdstrike-global-threat-report/
1.lib-lir:Lua语言通用中间表示,类似于LLVM
https://github.com/DefCon42/lib-lir
2.WMIHACKER:免杀横向移动命令执行测试工具(无需445端口)
https://github.com/360-Linton-Lab/WMIHACKER
1.Google CTF Quals 2020 sprint task
2.针对CouchDB的渗透测试
https://www.hackingarticles.in/penetration-testing-on-couchdb-5984/
3.威胁狩猎:使用Velociraptor用于端点监控
https://www.hackingarticles.in/threat-hunting-velociraptor-for-endpoint-monitoring/
4.Android App后门植入指南
https://blog.nviso.eu/2020/08/31/backdooring-android-apps-for-dummies/
5.如何使用BMC/IPMI漏洞利用将直接sqlmap直连到数据库,以危害大型云托管客户端
https://medium.com/@securityshenaningans/how-a-badly-configured-db-allowed-us-to-own-an-entire-cloud-of-over-25k-hosts-part-1-2-8846beab691e
6.PE文件的静态检测方式
https://winternl.com/static-detection-of-portable-executable-files/
7.Azure AD PRT之旅:通过pass-the-token和pass-the-cert获得访问权限
https://o365blog.com/post/prt/
8.使用hashcat破解密码
https://dzone.com/articles/crack-hashed-passwords-with-hashcat
9.Force firmware code to be measured and attested by Secure Launch on Windows 10
https://www.microsoft.com/security/blog/2020/09/01/force-firmware-code-to-be-measured-and-attested-by-secure-launch-on-windows-10/
天融信阿尔法实验室成立于2011年,一直以来,阿尔法实验室秉承“攻防一体”的理念,汇聚众多专业技术研究人员,从事攻防技术研究,在安全领域前瞻性技术研究方向上不断前行。作为天融信的安全产品和服务支撑团队,阿尔法实验室精湛的专业技术水平、丰富的排异经验,为天融信产品的研发和升级、承担国家重大安全项目和客户服务提供强有力的技术支撑。
天融信
阿尔法实验室
长按二维码关注我们
- 左青龙
- 微信扫一扫
-
- 右白虎
- 微信扫一扫
-
评论