【知识】11月4日 - 每日安全知识热点

http://p6.qhimg.com/t017313015b51e6034e.png

热点概要:Tor浏览器泄露用户IP、假的WhatsApp应用在Google Play上已被下载超过百万、包含挖矿代码的app出现在Google Play、又一个“隐藏的眼泪”勒索软件:文件名为The Art of Amazon Carding.pdf.exe、如何感染PE文件Part II、如何构造Android平台的勒索软件、Linux平台如何感染运行的进程

资讯类:

Tor浏览器泄露用户IP

(由于Firefox处理file://的URL的bug,使得macOS和Linux的Tor浏览器(不影响Windows)用户在访问某个精心构造的网页时,导致操作系统绕过Tor浏览器,直接连接到远程主机,从而泄露IP。

https://thehackernews.com/2017/11/tor-browser-real-ip.html 

https://www.wearesegment.com/news/the-tormoil-bug-torbrowser-critical-security-vulnerability/ 

假的WhatsApp应用在Google Play上已被下载超过百万(通过Unicode编码的空格使得用户在GooglePlay上看起来一样)

安装之后会有推广其他app的广告

https://thehackernews.com/2017/11/fake-whatsapp-android.html 

https://www.reddit.com/r/Android/comments/7ahujw/psa_two_different_developers_under_the_same_name/ 

CIA(中央情报局)违反特朗普的承诺,公布只有姓名+地址的JFK文件

https://www.archives.gov/research/jfk/2017-release 

https://www.archives.gov/files/research/jfk/releases/104-10188-10000.pdf 

技术类:

包含挖矿代码的app出现在Google Play(点击按钮之后会在后台运行一个WebView加载CoinHive的JS挖矿代码)

https://blog.avast.com/cryptocurrency-mining-malware-sneaks-onto-google-play 

http://p2.qhimg.com/t01fe5fca2e7103ef96.pnghttp://p4.qhimg.com/t01f24c8729f36f1f5e.png

Demo视频:



Gibon勒索软件的免费解密工具

https://download.bleepingcomputer.com/demonslay335/GibonDecrypter.zip 

又一个“隐藏的眼泪”勒索软件:文件名为The Art of Amazon Carding.pdf.exe

https://www.virustotal.com/en/file/ea41a989d1f9f8bc01d81d6e9834204105bb1a07a01671a403478e82af02fa6b/analysis/1509504581/ 

http://p1.qhimg.com/t01a81ba039fc0582e8.jpg

Snort 3.0 with ElasticSearch, LogStash, and Kibana (ELK) 发布

http://blog.snort.org/2017/11/snort-30-with-elasticsearch-logstash.html 

http://p7.qhimg.com/t01f2c286c5c1969fa0.jpg

如何感染PE文件Part II

https://0x00sec.org/t/pe-file-infection-part-ii/4135 

Part I

https://0x00sec.org/t/pe-file-infection/401 

Oracle PeopleSoft Enterprise PeopleTools < 8.55远程代码执行(通过XXE盲注)

https://www.exploit-db.com/exploits/43114/ 

https://www.ambionics.io/blog/oracle-peoplesoft-xxe-to-rce 

如何构建自己的区块链 Part 3

https://bigishdata.com/2017/11/02/build-your-own-blockchain-part-3-writing-nodes-that-mine/ 

Part 1

https://bigishdata.com/2017/10/17/write-your-own-blockchain-part-1-creating-storing-syncing-displaying-mining-and-proving-work/ 

Part 2

https://bigishdata.com/2017/10/27/build-your-own-blockchain-part-2-syncing-chains-from-different-nodes/ 

xsssniper:XSS自动发现工具

https://securityonline.info/xsssniper-automatic-xss-discovery-tool/ 

CertStream – 实时查看发布的SSL证书 (含Python、JS、Go、Java的库)

https://certstream.calidog.io/ 

http://p4.qhimg.com/t01317d52cf24356c79.gif

如何构造Android平台的勒索软件

https://0x00sec.org/t/creating-ransomware-for-android/4063 

西班牙语原文:

https://blog.underc0de.org/creando-ransomware-para-android/ 

如何用Python建一个TCP后门Part 2

https://0x00sec.org/t/how-to-make-a-reverse-tcp-backdoor-in-python-part-2/1040 

Part 1

https://0x00sec.org/t/how-to-make-a-reverse-tcp-backdoor-in-python-part-1/1038 

Linux平台如何感染运行的进程

https://0x00sec.org/t/linux-infecting-running-processes/1097 

https://github.com/0x00pf/0x00sec_code/tree/master/mem_inject 

(完)