【知识】8月2日 - 每日安全知识热点

http://p6.qhimg.com/t017313015b51e6034e.png

热点概要:使用Frida从TeamViewer内存中提取密码、通过使用Burp和Sqlmap Tamper利用二次注入漏洞、Rooting the Amazon Echo、使用SSH反向隧道进行内网穿透、命令注入漏洞测试方法谈、OWASP移动安全测试指南、SQLMap Web GUI、高通声卡驱动中的条件竞争漏洞分析(CVE-2017-7368)

国内热词(以下内容部分摘自http://www.solidot.org/ ):

黑客窃取 HBO 1.5 TB 数据,泄漏权力游戏剧本

Qubes OS 4.0-rc1 发布

资讯类:

Amazon Echo可成为攻击者的监听设备

http://www.securityweek.com/amazon-echo-could-become-attackers-listening-device 

美国最大医保公司Anthem再遭数据泄露,1.8万用户受影响

https://threatpost.com/breach-at-third-party-contractor-affects-18000-anthem-members/127139/ 

技术类:

【APT报告】Cobalt strikes回归:一个针对金融行业的APT组织

http://blog.ptsecurity.com/2017/08/cobalt-group-2017-cobalt-strikes-back.html 

使用Frida从TeamViewer内存中提取密码

https://github.com/vah13/extractTVpasswords 

通过使用Burp和Sqlmap Tamper利用二次注入漏洞

https://pentest.blog/exploiting-second-order-sqli-flaws-by-using-burp-custom-sqlmap-tamper/ 

Rooting the Amazon Echo

https://labs.mwrinfosecurity.com/blog/alexa-are-you-listening/ 

使用SSH反向隧道进行内网穿透

http://arondight.me/2016/02/17/%E4%BD%BF%E7%94%A8SSH%E5%8F%8D%E5%90%91%E9%9A%A7%E9%81%93%E8%BF%9B%E8%A1%8C%E5%86%85%E7%BD%91%E7%A9%BF%E9%80%8F/ 


EXP-CVE-2016-3935

https://github.com/jiayy/android_vuln_poc-exp/tree/master/EXP-CVE-2016-3935 

BlackHat 2017: The Shadow Brokers — Cyber Fear Game Changers

https://blog.comae.io/the-shadow-brokers-cyber-fear-game-changers-d143796f560f 


对Clemency进行了额外的分析

https://blog.trailofbits.com/2017/07/30/an-extra-bit-of-analysis-for-clemency/ 

在WAGO PLC Ethernet中静默修复未授权命令注入漏洞

https://cbolat.blogspot.com.tr/2017/08/silently-fixed-unauthorizedcommand.html 

命令注入漏洞测试方法谈

https://www.hackerone.com/blog/how-to-command-injections 

CableTap White Paper – 26 CVEs for exploiting cable modems and set top boxes

https://github.com/BastilleResearch/CableTap/blob/master/doc/pdf/DEFCON-25-Marc-Newlin-CableTap-White-Paper.pdf 

高通声卡驱动中的条件竞争漏洞分析(CVE-2017-7368)

http://paper.seebug.org/364/ 

SQLMap Web GUI

https://n0where.net/sqlmap-web-gui/

https://github.com/Hood3dRob1n/SQLMAP-Web-GUI 

REMnux v6:逆向工程和恶意软件分析的Linux工具包

https://n0where.net/reverse-engineering-malicious-software-remnux-distro/ 

WiFiBeat:将802.11 frames存储在Elasticsearch中,并通过Kibana可视化

https://www.wifibeat.org/# 

WMIMon:Windows平台监控WMI活动的命令行工具

https://github.com/luctalpe/WMIMon 

破坏认证和会话管理 – Session Fixation

https://www.peerlyst.com/posts/broken-authentication-and-session-management-session-fixation-hari-charan 

OWASP移动安全测试指南

https://b-mueller.gitbooks.io/the-owasp-mobile-security-testing-guide/content/ 

(完)