1.消费者信用报告机构Experian的南非分公司发生数据泄露事件,影响2400万南非人和793749个商业实体
https://www.sabric.co.za/media-and-news/press-releases/experian-data-breach/
1.我是如何发现Horde Groupware Webmail应用程序的漏洞的,以及如何利用漏洞实现RCE
https://srcincite.io/blog/2020/08/19/a-smorgashorde-of-vulnerabilities-a-comparative-analysis-of-discovery.html
2.如何在谷歌托管的关系数据库服务Cloud SQL上释放Shell
https://offensi.com/2020/08/18/how-to-contact-google-sre-dropping-a-shell-in-cloud-sql/
3.IBM Db2共享内存漏洞(CVE-2020-4414)
https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/ibm-db2-shared-memory-vulnerability-cve-2020-4414/
4.macOS Mojave 10.14中远程登录(ssh)中的漏洞仍然存在
https://eclecticlight.co/2020/08/20/the-vulnerability-in-remote-login-ssh-persists/
5.Cisco vWAAS for Cisco ENCS 5400-W系列和CSP 5000-W系列默认证书漏洞
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-waas-encsw-cspw-cred-hZzL29A7
1.Transparent Tribe: Evolution analysis, part 1
https://securelist.com/transparent-tribe-part-1/98127/
https://www.proofpoint.com/sites/default/files/proofpoint-operation-transparent-tribe-threat-insight-en.pdf
1.reconspider:开源OSINT框架,用于扫描IP地址、邮件、网站和组织,从不同的源查找信息
https://github.com/bhavsec/reconspider
2.Backdoorplz:使用win32api添加后门用户
https://github.com/jfmaes/Backdoorplz
3.DmaBackdoorHv:Hyper-V后门,它提供了一个接口,用于从来宾或主机分区检查虚拟机监控程序状态(VMCS,物理/虚拟内存,寄存器等)并执行VM逃逸攻击
https://github.com/Cr4sh/s6_pcie_microblaze/tree/master/python/payloads/DmaBackdoorHv#deploying-the-backdoor-using-firmware-flash-infection
4.bof_helper:Cobalt Strike引入了用于Beacon agent的Beacon Object File (BOF)的概念,此工具用于辅助创建BOF
https://github.com/dtmsecurity/bof_helper
1.绕过Web框架Play Framework的CSRF防护
https://blog.doyensec.com/2020/08/20/playframework-csrf-bypass.html
2.如何使用WEB代理窃取内部信息
https://sefod.eu/posts/web_proxies/
3.2020年OSCP备考终极指南
https://johnjhacking.com/blog/the-oscp-preperation-guide-2020/
4.Office 365邮件转发规则(以及其他邮件规则)
https://isc.sans.edu/diary/26484
5.我是如何在不被邻居察觉的情况下破解其密码的
https://arstechnica.com/information-technology/2012/08/wireless-password-easily-cracked/
6.从奇虎360安全浏览器和Tor浏览器中提取密码
https://eforensicsmag.com/extracting-passwords-from-qihoo-360-safe-browser-and-tor-browser-by-oleg-afonin/
7.为什么扫描UDP端口如此重要,Part2
https://medium.com/@securityshenaningans/why-you-should-always-scan-udp-part-2-2-42050fb136d8
8.Kernel Panic: DEF CON 2020回顾
https://dttw.tech/posts/Skww4fzGP
9.DHCP饥饿攻击:不用发出任何DHCP请求
https://medium.com/bugbountywriteup/dhcp-starvation-attack-without-making-any-dhcp-requests-bef0022133c9
10.WordPress用户管理终极指南
https://www.wpwhitesecurity.com/ultimate-guide-wordpress-user-management/
11.攻击Azure & Azure AD, Part II
https://posts.specterops.io/attacking-azure-azure-ad-part-ii-5f336f36697d
12.Bypass Windows Defender Attack Surface Reduction
https://blog.sevagas.com/IMG/pdf/bypass_windows_defender_attack_surface_reduction.pdf
天融信阿尔法实验室成立于2011年,一直以来,阿尔法实验室秉承“攻防一体”的理念,汇聚众多专业技术研究人员,从事攻防技术研究,在安全领域前瞻性技术研究方向上不断前行。作为天融信的安全产品和服务支撑团队,阿尔法实验室精湛的专业技术水平、丰富的排异经验,为天融信产品的研发和升级、承担国家重大安全项目和客户服务提供强有力的技术支撑。
天融信
阿尔法实验室
长按二维码关注我们
- 左青龙
- 微信扫一扫
-
- 右白虎
- 微信扫一扫
-
评论