【知识】7月3日 - 每日安全知识热点

http://p6.qhimg.com/t017313015b51e6034e.png

热点概要:对Systemd用户名以数字开头导致权限提升到root问题的分析绕过EMET(Microsoft的增强缓解工具包)保护的一种方法实现Windows键盘记录器的一些方法威胁情报在甲方安全运维中的应用德国电子政务的基础库OSCI Library 存在XXE漏洞,通过获取解密的信息,一定情况可以伪造信息玩转无线电——不安全的蓝牙锁对Petya涉及的主引导记录的分析、微软Azure网络安全白皮书


资讯类:

CIA使用OutlawCountry恶意软件来监控Linux系统

http://securityaffairs.co/wordpress/60584/breaking-news/cia-outlawcountry-hack-linux.html

技术类:

Google Chrome – Out-of-Bounds Access in RegExp Stubs

https://www.exploit-db.com/exploits/42286/

微软Dynamic CRM 2016 XSS漏洞

https://remoteawesomethoughts.blogspot.com/2017/06/cross-site-scripting-vulnerability-in.html

filewatcher:基于OpenBSM库的对macOS的程序和进程进行审计的工具

https://github.com/m3liot/filewatcher

https://m3liot.github.io/blog/2017/07/02/mac-os-real-time-auditing/

以1password为例介绍伪造电子邮件

http://hackanddefense.com/blog/how-to-send-fake-emails/index.html

Puppet Strings – Dirty Secret for Windows Ring 0 Code Execution 

https://github.com/zerosum0x0/puppetstrings 

https://zerosum0x0.blogspot.com/2017/07/puppet-strings-dirty-secret-for-free.html

对Systemd用户名以数字开头导致权限提升到root问题的分析

https://ma.ttias.be/giving-perspective-systemds-usernames-start-digit-get-root-privileges-bug/

实现Windows键盘记录器的一些方法

https://eyeofrablog.wordpress.com/2017/06/27/windows-keylogger-part-2-defense-against-user-land/ 

https://eyeofrablog.wordpress.com/2017/06/11/windows-keylogger-part-1-attack-on-user-land/

绕过EMET(Microsoft的增强缓解工具包)保护的一种方法

https://www.okta.com/blog/2016/07/the-emet-serendipity-emets-ineffectiveness-against-non-exploitation-uses/

对Remcos RAT木马的分析

https://secrary.com/ReversingMalware/RemcosRAT/

微软Azure网络安全白皮书

https://docs.microsoft.com/en-us/azure/security/azure-network-security

德国电子政务的基础库OSCI Library 存在XXE漏洞,通过获取解密的信息,一定情况可以伪造信息

http://blog.sec-consult.com/2017/06/german-e-government-details-vulnerabilities.html

和其他的勒索软件比较Petya更具有破坏性

https://securingtomorrow.mcafee.com/business/petya-effective-destruction-ransomware/

威胁情报在甲方安全运维中的应用

https://shimo.im/doc/SECYkqSAk1wH2oVt

标准化建设之网络安全应急响应浅析

https://secvul.com/topics/707.html

玩转无线电——不安全的蓝牙锁

https://xianzhi.aliyun.com/forum/read/1799.html

给你压缩包却不给你密码的人到底在想什么

http://veritas501.space/2017/06/23/%E7%BB%99%E4%BD%A0%E5%8E%8B%E7%BC%A9%E5%8C%85%E5%8D%B4%E4%B8%8D%E7%BB%99%E4%BD%A0%E5%AF%86%E7%A0%81%E7%9A%84%E4%BA%BA%E5%88%B0%E5%BA%95%E5%9C%A8%E6%83%B3%E4%BB%80%E4%B9%88/ 

ActiveMQ < 5.14.0 – Web Shell Upload (Metasploit)

https://threathunter.org/topic/5957b9cd5ebe12b96cebd8e5

对Petya涉及的主引导记录的分析

https://countuponsecurity.com/2017/07/02/analysis-of-a-master-boot-record-eternalpetya/

Google在Android O 中新加入createAppSpecificSmsToken解决之前短信验证导致的隐私问题,不在需要READ_SMS权限

https://proandroiddev.com/no-permission-required-for-sms-verification-in-android-o-761fe2d4f675

Windows 10 EAF/EMET "Bypass"  反射 DLL 注入

https://zerosum0x0.blogspot.jp/2017/06/proposed-eafemet-bypass-for-reflective.html

使用IDA Pro逆向MD380固件

https://github.com/travisgoodspeed/md380tools/wiki/IDAPro

unarcrypto:描述zip,rar和7zip文件中的加密用法

https://github.com/lclevy/unarcrypto

攻击者在攻击中通过混淆等方式逃避检测

https://www.fireeye.com/blog/threat-research/2017/06/obfuscation-in-the-wild.html

(完)