1月4日-每日安全知识热点

http://p6.qhimg.com/t01eba11609afc35030.jpg

1.UPC Router WPA2 密码恢复工具

http://haxx.in/upc_keys.c

2.在树莓派和RetroPie上运行街机游戏系统(第一部分和第二部分)

http://carnal0wnage.attackresearch.com/2016/01/arcade-gaming-system-on-raspberry-pi-2.html

http://carnal0wnage.attackresearch.com/2016/01/arcade-gaming-system-on-raspberry-pi-2_2.html

3.ios objc 方法调用记录插件: itracer v1.3

https://github.com/waruqi/itrace

4.hellcode2vba.py 0.4发行

http://blog.didierstevens.com/2016/01/02/update-shellcode2vba-py-version-0-4/

5.分析MIME文件的一些tips

https://isc.sans.edu/diary/A+Tip+For+The+Analysis+Of+MIME+Files/20561

6.DLL HIJACKING攻击指南

http://null-byte.wonderhowto.com/how-to/dll-hijacking-tutorial-0167466/

7.32C3 CTF: Docker writeup

https://kitctf.de/writeups/32c3ctf/docker/

8.第一款JAVASCRIPT恶意欺诈软件

http://blog.emsisoft.com/2016/01/01/meet-ransom32-the-first-javascript-ransomware/

9.查看被删的微信好友的python脚本

https://github.com/0x5e/wechat-deleted-friends

10.建立fREedom和BinNavi逆向环境

https://summitroute.com/blog/2015/12/31/setting_up_freedom_and_binnavi/

11.明白XSA-155漏洞:Compiler-Introduced Double-Fetch Vulnerabilities

http://tkeetch.co.uk/blog/?p=58

12.BlackEnergy木马SSHBearDoor:对乌克兰新闻媒体和电子工业的攻击

http://www.welivesecurity.com/2016/01/03/blackenergy-sshbeardoor-details-2015-attacks-ukrainian-news-media-electric-industry/

13.介绍 WiFi Pineapple TETRA

https://forums.hak5.org/index.php?/topic/37173-introducing-the-wifi-pineapple-tetra/

14.CVE-2014-2851 group_info UAF 利用

https://cyseclabs.com/page?n=02012016

15.手动分析 ‘NSKeyedArchiver’ 格式的Plist文件

http://www.mac4n6.com/blog/2016/1/1/manual-analysis-of-nskeyedarchiver-formatted-plist-files-a-review-of-the-new-os-x-1011-recent-items

16.保护windows网络-applocker

http://dfir-blog.com/2016/01/03/protecting-windows-networks-applocker/

17.使用DOcker 运行一个隐藏的TOR服务

http://randywestergren.com/running-a-hidden-tor-service-with-docker-compose/

18.HTTPS Bicycle Attack

https://guidovranken.wordpress.com/2015/12/30/https-bicycle-attack/

19.Reef:IDAPYthon插件,从一个函数发现Xrefs

https://github.com/darx0r/Reef

20.如何使用beef和javascript进行前期调查

http://null-byte.wonderhowto.com/how-to/use-beef-and-javascript-for-reconnaissance-0167468/

21.HackingTeam:如何使用0day感染你的andorid设备

http://archive.hack.lu/2015/HT_Android_hack_lu2015_v1.0.pdf

22.通过被动检测唯一DNS查询检测Tor Exit

https://github.com/NullHypothesis/exitmap/issues/37

免责声明:文章内容不代表本站立场,本站不对其内容的真实性、完整性、准确性给予任何担保、暗示和承诺,仅供读者参考,文章版权归原作者所有。如本文内容影响到您的合法权益(内容、图片等),请及时联系本站,我们会及时删除处理。查看原文

为您推荐