【知识】5月10日 - 每日安全知识热点

http://p6.qhimg.com/t017313015b51e6034e.png

热点概要:FireEye在野外发现微软Office产品中两个RCE 0day,同时还有一个提权漏洞NVIDIA GPU显卡驱动程序存在漏洞可能导致拒绝服务或权限升级、Hajime样本技术分析报告ESET Sednit组织利用"Trump’s attack on Syria"文件(两个0day)作为诱导进行攻击,影响法国大选WOLFSSL库X509证书文本解析存在代码执行漏洞 、关于逆向工程移动应用程序的一系列文章


资讯类:


新型物联网僵尸网络Persirai现身

http://www.securityweek.com/new-persirai-iot-botnet-emerges

海康威视修补IP摄像头的后门

https://threatpost.com/hikvision-patches-backdoor-in-ip-cameras/125522/

技术类:


微软发布五月致谢

https://portal.msrc.microsoft.com/en-us/security-guidance/acknowledgments

WOLFSSL库X509证书文本解析存在代码执行漏洞

http://www.talosintelligence.com/reports/TALOS-2017-0293/

FireEye在野外发现微软Office产品中两个RCE 0day,同时还有一个提权漏洞

https://www.fireeye.com/blog/threat-research/2017/05/eps-processing-zero-days.html

ESET Sednit组织利用"Trump’s attack on Syria"文件(两个0day)作为诱导进行攻击,影响法国大选

https://www.welivesecurity.com/2017/05/09/sednit-adds-two-zero-day-exploits-using-trumps-attack-syria-decoy/

MSRC团队发布关于解决EPS攻击的公告

https://blogs.technet.microsoft.com/msrc/2017/05/09/coming-together-to-address-encapsulated-postscript-eps-attacks/

在AD中滥用DNSAdmins权限

http://www.labofapenetrationtester.com/2017/05/abusing-dnsadmins-privilege-for-escalation-in-active-directory.html

Airachnid:Burp Web Cache欺骗扩展插件

https://www.trustwave.com/Resources/SpiderLabs-Blog/Airachnid–Web-Cache-Deception-Burp-Extender/

MS-Edge:欺骗恶意软件页面修补后被再次绕过

https://www.cracking.com.ar/demos/edgesmartscreen/patch-bypass-2.html

NVIDIA GPU显卡驱动程序存在漏洞可能导致拒绝服务或权限升级

http://nvidia.custhelp.com/app/answers/detail/a_id/4462

Persirai:新的物联网IoT僵尸网络针对的IP摄像头

http://blog.trendmicro.com/trendlabs-security-intelligence/persirai-new-internet-things-iot-botnet-targets-ip-cameras/

Hajime样本技术分析报告

http://blog.nsfocus.net/hajime-sample-technical-analysis-report/

批量入侵免流网站(多为阿里云腾讯云等服务器)

https://bbs.ichunqiu.com/thread-19121-1-1.html

五指 CMS4.0 任意文件下载漏洞

http://139.129.31.35/index.php/archives/530/

Fuzzing Apache httpd server with American Fuzzy Lop + persistent mode

https://animal0day.blogspot.co.uk/2017/05/fuzzing-apache-httpd-server-with.html

IDA脚本-ARM系统指令高亮

https://github.com/gdelugre/ida-arm-system-highlight

GitLab的一处存储xss

https://hackerone.com/reports/218872

使用WhatsApp收集大量数据(附脚本)

https://www.lorankloeze.nl/2017/05/07/collecting-huge-amounts-of-data-with-whatsapp/

Expanding the Empire with SQL

https://blog.netspi.com/expanding-the-empire-with-sql/

Chrome XSS auditor bypass

https://twitter.com/jackmasa/status/861947048072953862

Windows exploits

https://github.com/abatchy17/WindowsExploits

网络钓鱼广告文章

https://blog.inspired-sec.com/archive/2017/05/07/Phishing.html

关于逆向工程移动应用程序的一系列文章

http://www.vantagepoint.sg/blog/83-mobile-reverse-engineering-unleashed

(完)