【知识】8月24日 - 每日安全知识热点

http://p6.qhimg.com/t017313015b51e6034e.png

热点概要:如何将Kali Linux转换为一个路由器、图解wifi工作原理、渗透测试学习笔记、Project Zero:在Windows上绕过VirtualBox Process Hardening、跨平台Macro钓鱼攻击payload、canisrufus:基于Python的Windows后门,使用Github作为CC服务器、如何安全的使用PGP、浏览器漏洞挖掘思路、raven:针对Linkedin信息收集工具

资讯类:

ROPEMAKER攻击:攻击者可以电子邮件的内容(即使是已经发送的邮件)

http://thehackernews.com/2017/08/change-email-content.html 

BTCMine:针对Linux设备的新型矿机现身

https://www.bleepingcomputer.com/news/security/brian-krebs-fan-creates-new-cryptocurrency-miner-for-linux-devices/ 

暗网新闻:

美国缉毒局和NSO 集团谈判购买NSO的后门软件,NSO集团的后门软件可以在补丁全打的情况下监控最新版苹果系统

https://www.deepdotweb.com/2017/08/22/dea-talks-iphone-hacking-group/ 

技术类:

kalirouter:如何将Kali Linux转换为一个路由器(向在另一台机器上运行的拦截代理(如BurpSuite)发送HTTP和HTTPS流量、可以通过wireshark记录所有流量)

https://github.com/koenbuyens/kalirouter 

Postmortem Program Analysis with Hardware-Enhanced Post-Crash Artifacts

https://www.usenix.org/system/files/conference/usenixsecurity17/sec17-xu.pdf 

图解wifi工作原理

http://www.verizoninternet.com/bookmark/how-wifi-works/ 

openstar 

https://github.com/starjun/openstar 

渗透测试学习笔记之案例三

http://mp.weixin.qq.com/s/_zbSCm_fRNP8bDQ2Vxcs9A 

恶意软件仿真器的自动逆向工程

http://old.iseclab.org/people/andrew/download/oakland09.pdf 

如何使用Shodan命令行获取一个国家最受欢迎的服务列表

https://asciinema.org/a/48142 

Practical Reverse Engineering Part 4 – Dumping the Flash

http://jcjc-dev.com/2016/06/08/reversing-huawei-4-dumping-flash/ 

如何在特定的渗透测试中适用Burp扩展

http://blog.portswigger.net/2017/08/adapting-burp-extensions-for-tailored.html 

Sysmon View:跟踪和可视化Sysmon日志

https://cybernext.org/sysmon-view/ 

Project Zero:在Windows上绕过VirtualBox Process Hardening

https://googleprojectzero.blogspot.com/2017/08/bypassing-virtualbox-process-hardening.html 

Using certutil as wget on win hosts

http://carnal0wnage.attackresearch.com/2017/08/certutil-for-delivery-of-files.html 

跨平台Macro钓鱼攻击payload

https://medium.com/@malcomvetter/multi-platform-macro-phishing-payloads-3b688e8eff68 

canisrufus:隐藏的基于Python的Windows后门,使用Github作为CC服务器

https://github.com/maldevel/canisrufus 

redteam-plan:规划红队演习时要考虑的问题

https://github.com/magoo/redteam-plan 

Deep Analysis of New Poison Ivy Variant

https://blog.fortinet.com/2017/08/23/deep-analysis-of-new-poison-ivy-variant 

portia:在内网渗透中自动化执行

https://github.com/SpiderLabs/portia 

如何安全的使用PGP

https://medium.com/@thegrugq/the-zen-of-pgp-6f55d44657dd 

sRDI:Shellcode反射式DLL注入

https://silentbreaksecurity.com/srdi-shellcode-reflective-dll-injection/ 

逆向Humble Bundle应用程序以获得API访问

https://www.schiff.io/blog/2017/07/21/reverse-engineering-humble-bundle-api 

3 insights from the Gartner Hype Cycle for Mobile Security 2017

https://blog.lookout.com/gartner-hype-cycle-mobile-security-2017 

浏览器漏洞挖掘思路

https://zhuanlan.zhihu.com/p/28719766 

raven:针对Linkedin信息收集工具

https://github.com/0x09AL/raven 

Crystal Finance Millennium used to spread malware 

https://bartblaze.blogspot.com/2017/08/crystal-finance-millennium-used-to.html 

GCC low-level IR and basic code generation 

http://kristerw.blogspot.com/2017/08/gcc-low-level-ir-and-basic-code.html 

Hack Chip: An Uber Portable Hacking Powerhouse

https://blog.hackster.io/hack-chip-an-uber-portable-hacking-powerhouse-4a92a5c84293 

(完)