4月7日-每日安全知识热点

http://p0.qhimg.com/t01f7ef32da341925d2.jpg

1、使用ESP8266模块构建以太网连接的远程wifi嗅探平台

http://phasenoise.livejournal.com/4003.html

2、出错的安全故事

http://gavinmiller.io/2016/a-tale-of-security-gone-wrong/

3、国际间谍和阴谋的故事:当俄罗斯渗透摩根大通

https://medium.com/@kim_crawley/a-tale-of-international-espionage-and-intrigue-when-russia-infiltrated-jpmorgan-chase-d14c3773a4d7#.18trr6ua8

4、通过path进行xss攻击

https://speakerd.s3.amazonaws.com/presentations/d0225b4050874512ad25e17fff4548ee/shibuya_en.pdf

5、golang编写的linux漏扫

https://github.com/future-architect/vuls

6、分析最近的flash 0day漏洞:CVE-2016-1010

http://blog.trendmicro.com/trendlabs-security-intelligence/root-cause-analysis-recent-flash-zero-day-vulnerability-cve-2016-1010/

7、CSP:使用反射XSS绕过form-action

http://labs.detectify.com/2016/04/04/csp-bypassing-form-action-with-reflected-xss/

8、恶意欺诈软件会在钓鱼邮件中标识目标的名字,提高信任感

http://arstechnica.com/security/2016/04/crypto-ransomware-targets-called-by-name-in-spear-phishing-blast/

9、获取Tesla Model S 的 root访问权限

http://www.su-tesla.space/

10、突破ibm java7/8的安全修复补丁

http://seclists.org/fulldisclosure/2016/Apr/3

11、FORRESTER简介:FireEye的演变成一个企业安全厂商

https://www.fireeye.com/current-threats/threat-intelligence-reports/forrester-research-brief.html

12、安全清空隐私数据

http://www.viva64.com/en/b/0388/

https://github.com/dionyziz/rupture

12、BREACH攻击的poc和blackhat上的ppt

https://www.blackhat.com/docs/asia-16/materials/asia-16-Karakostas-Practical-New-Developments-In-The-BREACH-Attack.pdf

13、ARM Thum 的反编译IDA Pro插件

https://code.google.com/archive/p/arm-thumb-decompiler-plugin/

14、安全评估微软directaccess

https://www.insinuator.net/2016/04/security-assessment-of-microsoft-directaccess/

15、Cacti 0.8.8g 注入漏洞poc

https://cxsecurity.com/issue/WLB-2016040036

16、分析Neutrino EK分发

https://blog.malwarebytes.org/threat-analysis/exploits-threat-analysis/2016/04/a-look-at-a-neutrino-ek-distributor/

17、Go语言编写的http压力测试工具

https://github.com/tsenart/vegeta

免责声明:文章内容不代表本站立场,本站不对其内容的真实性、完整性、准确性给予任何担保、暗示和承诺,仅供读者参考,文章版权归原作者所有。如本文内容影响到您的合法权益(内容、图片等),请及时联系本站,我们会及时删除处理。查看原文

为您推荐