热点概要:如何将Kali Linux转换为一个路由器、图解wifi工作原理、渗透测试学习笔记、Project Zero:在Windows上绕过VirtualBox Process Hardening、跨平台Macro钓鱼攻击payload、canisrufus:基于Python的Windows后门,使用Github作为CC服务器、如何安全的使用PGP、浏览器漏洞挖掘思路、raven:针对Linkedin信息收集工具
资讯类:
ROPEMAKER攻击:攻击者可以电子邮件的内容(即使是已经发送的邮件)
http://thehackernews.com/2017/08/change-email-content.html
BTCMine:针对Linux设备的新型矿机现身
暗网新闻:
美国缉毒局和NSO 集团谈判购买NSO的后门软件,NSO集团的后门软件可以在补丁全打的情况下监控最新版苹果系统
https://www.deepdotweb.com/2017/08/22/dea-talks-iphone-hacking-group/
技术类:
kalirouter:如何将Kali Linux转换为一个路由器(向在另一台机器上运行的拦截代理(如BurpSuite)发送HTTP和HTTPS流量、可以通过wireshark记录所有流量)
https://github.com/koenbuyens/kalirouter
Postmortem Program Analysis with Hardware-Enhanced Post-Crash Artifacts
https://www.usenix.org/system/files/conference/usenixsecurity17/sec17-xu.pdf
图解wifi工作原理
http://www.verizoninternet.com/bookmark/how-wifi-works/
openstar
https://github.com/starjun/openstar
渗透测试学习笔记之案例三
http://mp.weixin.qq.com/s/_zbSCm_fRNP8bDQ2Vxcs9A
恶意软件仿真器的自动逆向工程
http://old.iseclab.org/people/andrew/download/oakland09.pdf
如何使用Shodan命令行获取一个国家最受欢迎的服务列表
Practical Reverse Engineering Part 4 – Dumping the Flash
http://jcjc-dev.com/2016/06/08/reversing-huawei-4-dumping-flash/
如何在特定的渗透测试中适用Burp扩展
http://blog.portswigger.net/2017/08/adapting-burp-extensions-for-tailored.html
Sysmon View:跟踪和可视化Sysmon日志
https://cybernext.org/sysmon-view/
Project Zero:在Windows上绕过VirtualBox Process Hardening
https://googleprojectzero.blogspot.com/2017/08/bypassing-virtualbox-process-hardening.html
Using certutil as wget on win hosts
http://carnal0wnage.attackresearch.com/2017/08/certutil-for-delivery-of-files.html
跨平台Macro钓鱼攻击payload
https://medium.com/@malcomvetter/multi-platform-macro-phishing-payloads-3b688e8eff68
canisrufus:隐藏的基于Python的Windows后门,使用Github作为CC服务器
https://github.com/maldevel/canisrufus
redteam-plan:规划红队演习时要考虑的问题
https://github.com/magoo/redteam-plan
Deep Analysis of New Poison Ivy Variant
https://blog.fortinet.com/2017/08/23/deep-analysis-of-new-poison-ivy-variant
portia:在内网渗透中自动化执行
https://github.com/SpiderLabs/portia
如何安全的使用PGP
https://medium.com/@thegrugq/the-zen-of-pgp-6f55d44657dd
sRDI:Shellcode反射式DLL注入
https://silentbreaksecurity.com/srdi-shellcode-reflective-dll-injection/
逆向Humble Bundle应用程序以获得API访问
https://www.schiff.io/blog/2017/07/21/reverse-engineering-humble-bundle-api
3 insights from the Gartner Hype Cycle for Mobile Security 2017
https://blog.lookout.com/gartner-hype-cycle-mobile-security-2017
浏览器漏洞挖掘思路
https://zhuanlan.zhihu.com/p/28719766
raven:针对Linkedin信息收集工具
https://github.com/0x09AL/raven
Crystal Finance Millennium used to spread malware
https://bartblaze.blogspot.com/2017/08/crystal-finance-millennium-used-to.html
GCC low-level IR and basic code generation
http://kristerw.blogspot.com/2017/08/gcc-low-level-ir-and-basic-code.html
Hack Chip: An Uber Portable Hacking Powerhouse
https://blog.hackster.io/hack-chip-an-uber-portable-hacking-powerhouse-4a92a5c84293