【知识】11月27日 - 每日安全知识热点

http://p6.qhimg.com/t017313015b51e6034e.png

热点概要:新的mirai僵尸网络变种正在端口23和2323上积极传播、著名图片分享网站imgur承认在2014年曾遭遇数据泄露导致170万用户的email地址和密码、Cobalt group被发现利用CVE-2017-11882漏洞、使用node.js调用CoinHive挖矿、作者用C和Python写了个Linux上的勒索软件GonnaCry 

资讯类:

新的mirai僵尸网络变种正在端口23和2323上积极传播

http://bobao.360.cn/learning/detail/4754.html

著名图片分享网站imgur承认在2014年曾遭遇数据泄露导致170万用户的email地址和密码

https://thehackernews.com/2017/11/imgur-data-breach.html 

Cobalt group被发现利用CVE-2017-11882漏洞

https://www.bleepingcomputer.com/news/security/a-hacking-group-is-already-exploiting-the-office-equation-editor-bug/ 

http://securityaffairs.co/wordpress/66021/cyber-crime/cobalt-group-cve-2017-11882.html 

上周勒索软件盘点:qkG, Scarab, Necurs等

https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-november-24th-2017-qkg-scarab-necurs-and-more/ 

技术类:

使用node.js调用CoinHive挖矿

https://0x00sec.org/t/coinhive-node-js/4472 

https://github.com/cazala/coin-hive 

作者用C和Python写了个Linux上的勒索软件GonnaCry 

https://0x00sec.org/t/gonnacry-a-linux-ransomware/4467 

https://github.com/tarcisio-marinho/GonnaCry 

https://p3.ssl.qhimg.com/t012a6ff1fe282d079d.png

Exim RCE的PoC

https://bugs.exim.org/attachment.cgi?id=1052 

【Bugs】Windows win32kfull!GreUpdateSpriteInternal Kernel Stack Memory Disclosure Exp

http://0day.today/exploits/29057 

【Bugs】Microsoft Windows 10 nt!NtQueryDirectoryFile (luafv!LuafvCopyDirectoryEntry) Pool Memory Disclosure

https://cxsecurity.com/issue/WLB-2017110143 

【Bugs】Linux mincore() Uninitialized Kernel Heap Page Disclosure

https://cxsecurity.com/issue/WLB-2017110142 

【Bugs】D-Link DIR-850L Credential Disclosure

https://cxsecurity.com/issue/WLB-2017110144 

【Bugs】Segwit2x Bugs Explained

https://bitcointechtalk.com/segwit2x-bugs-explained-8e0c286124bc 

【教程】An Introduction to Writing .NET Executables for Pentesters

https://www.peew.pw/blog/2017/11/24/an-introduction-to-writing-net-executables-for-pentesters

【教程】Shodan完整指南

https://leanpub.com/shodan 

【教程】反逆向的虚拟机技术

https://www.youtube.com/watch?v=ZUXP9ZbPv9s&ab_channel=GynvaelEN 


【Tools】社区维护的在线手册

http://tldr.sh/ 


【Tools】pestudio 8.70发布

https://winitor.com/binaries.html 

http://p8.qhimg.com/t01421e34844e417fdc.jpg

【Tools】记录和组织信息搜集工具输出的工具

https://github.com/jobertabma/recon.sh 

【Tools】解密Scapy packets的radare2插件

https://github.com/guedou/r2scapy/blob/master/README.md 


渗透测试的一些备忘录

http://pentestmonkey.net/category/cheat-sheet

SCADA Hacking: SCADA Protocols (DNP3)

https://www.hackers-arise.com/single-post/2017/02/10/SCADA-Hacking-SCADA-Prortocols-DNP3 

(完)