【知识】6月29日 - 每日安全知识热点

http://p6.qhimg.com/t017313015b51e6034e.png

热点概要:网络攻击后,联邦快递暂停其股票交易震惊!NotPetya是网络武器而不是勒索软件、星巴克官网博客评论区存在存储型xss偏执的PlugX病毒(分析)USE-AFTER-SILENCE: vMware悄然修补UAF漏洞专家发现Skype中存在一个关键的远程缓冲区溢出漏洞【权威报告】Petya勒索蠕虫完全分析报告我是如何找一个影响数千职业网站的持续型XSS的逆向三星s6 sboot Part II


资讯类:


网络攻击后,联邦快递暂停其股票交易

https://www.darkreading.com/attacks-breaches/after-cyber-attack-fedex-temporarily-halts-trading-of-its-shares/d/d-id/1329244?_mc=RSS_DR_EDT

震惊!NotPetya是网络武器而不是勒索软件

https://www.bleepingcomputer.com/news/security/surprise-notpetya-is-a-cyber-weapon-its-not-ransomware/

【图文直播】WCTF世界黑客大师赛

http://bobao.360.cn/ctf/activity/452.html

技术类:



【权威报告】Petya勒索蠕虫完全分析报告

http://bobao.360.cn/learning/detail/4039.html

GSoC(谷歌编程之夏)Phase1: Timeless Debugger Update (Timeless Debugger 是一种新的调试模式,它非常类似于反向调试、记录和重放。)

https://rkx1209.github.io/2017/06/28/gsoc-phase1-timeless-debugger-update.html

在HitmanPro独立扫描版本3.7.15-Build 281中识别漏洞(CVE-2017-6008)—Windows 7

http://trackwatch.com/kernel-pool-overflow-exploitation-in-real-world-windows-7/

星巴克官网博客评论区存在存储型xss

https://hackerone.com/reports/218226

使用radare2分析恶意软件

http://unlogic.co.uk/2017/06/28/malwaring-with-r2/index.html

RunShellcode:小巧的shellcode运行工具

https://github.com/zerosum0x0/RunShellcode

偏执的PlugX病毒(分析)

https://researchcenter.paloaltonetworks.com/2017/06/unit42-paranoid-plugx/

USE-AFTER-SILENCE: vMware悄然修补UAF漏洞 

https://www.zerodayinitiative.com/blog/2017/6/26/use-after-silence-exploiting-a-quietly-patched-uaf-in-vmware

新的勒索,旧技术:Petya 增加了蠕虫能力(微软官方分析)

https://blogs.technet.microsoft.com/mmpc/2017/06/27/new-ransomware-old-techniques-petya-adds-worm-capabilities/

    

逆向三星s6 sboot Part II

 https://blog.quarkslab.com/reverse-engineering-samsung-s6-sboot-part-ii.html

    

Stack Clash exploits are now available

https://www.qualys.com/research/security-advisories/


 Windows Keylogger Part 2: Defense against user-land

 https://eyeofrablog.wordpress.com/2017/06/27/windows-keylogger-part-2-defense-against-user-land/

 我是如何找一个影响数千职业网站的持续型XSS的

 https://labs.detectify.com/2017/06/28/how-i-found-a-persistent-xss-affecting-thousands-of-career-sites/

(完)