热点概要:微软补丁日修复了两个NTLM中继漏洞(LDAP Relay、RDP Relay)、通过子域名接管绕过Uber的SSO认证、基于Vulners.com漏洞库的Burp Suite扫描插件、构建Python BITS服务器、一个.NET恶意软件通过滥用ffmpeg录制受害者屏幕、第十届信息安全国赛 Web MISC writeup
资讯类:
Windows NTLM协议存在高危漏洞,请及时更新系统!
http://thehackernews.com/2017/07/windows-ntlm-security-flaw.html
技术类:
通过子域名接管绕过Uber的SSO认证
https://www.arneswinnen.net/2017/06/authentication-bypass-on-ubers-sso-via-subdomain-takeover/
微软补丁日修复了两个NTLM中继漏洞(LDAP Relay、RDP Relay)
https://blog.preempt.com/new-ldap-rdp-relay-vulnerabilities-in-ntlm
基于Vulners.com漏洞库的Burp Suite扫描插件
https://github.com/vulnersCom/burp-vulners-scanner
针对趋势科技Deep Discovery Director多个漏洞的分析
https://www.coresecurity.com/advisories/trend-micro-deep-discovery-director-multiple-vulnerabilities
针对POS机的新型恶意软件
https://www.arbornetworks.com/blog/asert/lockpos-joins-flock/
构建Python BITS服务器
https://safebreach.com/Post/Building-a-Python-BITS-Server
https://github.com/SafeBreach-Labs/SimpleBITSServer
看着电影电脑怎么就被黑了?给你技术细节分析
http://www.4hou.com/info/news/6201.html
一个.NET恶意软件通过滥用ffmpeg录制受害者屏幕
https://blog.malwarebytes.com/threat-analysis/2017/07/malware-abusing-ffmpeg/
解析HaaS(蜜罐即服务)
https://medium.com/@foospidy/my-serverless-frankenstein-for-honeypots-e449b63ab0ed
Invoke-HostEnum更新完全兼容Empire 2.0
https://github.com/minisllc/red-team-scripts/blob/master/Invoke-HostEnum.ps1
第十届全国大学生信息安全竞赛 web writeup
http://www.math1as.com/index.php/archives/493/
第十届信息安全国赛 Web MISC writeup
http://lorexxar.cn/2017/07/11/guosai2017/
详解权限提升
https://azeria-labs.com/privilege-escalation/
htcap:Web应用扫描器
https://n0where.net/recursive-web-application-scanner/