热点概要:Linux内网渗透、androidre:逆向Android程序的docker镜像、如何确认Google用户的具体电子邮件地址(Bug Bounty)、看我如何从54G日志中溯源web应用攻击路径、朝鲜攻击事件暴露KONNI和DarkHotel之间的关联、执法部门在荷兰逮捕了第一个Hansa用户,此前名为'Area51'的供应商已被判刑6.5年
国内热词(以下内容部分摘自http://www.solidot.org/ ):
制定密码定期更改规则的作者表示后悔
微软浏览器将停止信任沃通和 StartCom 的新证书
资讯类:
朝鲜攻击事件暴露KONNI和DarkHotel之间的关联
http://www.securityweek.com/north-korea-campaigns-show-link-between-konni-and-darkhotel
暗网新闻:
执法部门在荷兰逮捕了第一个Hansa用户,此前名为'Area51'的供应商已被判刑6.5年
https://www.deepdotweb.com/2017/08/09/law-enforcement-arrested-the-first-hansa/
技术类:
androidre:逆向Android程序的docker镜像
https://github.com/cryptax/androidre
Linux内网渗透
http://mp.weixin.qq.com/s/VJBnXq3–0HBD7eVeifOKA
Harvesting Cb Response Data Leaks for fun and profit
https://www.directdefense.com/harvesting-cb-response-data-leaks-fun-profit/
如何确认Google用户的具体电子邮件地址(Bug Bounty)
http://www.tomanthony.co.uk/blog/confirm-google-users-email/
Week of Evading Microsoft ATA – Day 3 – 受约束的授权、跨信任的攻击、DCSync和DNSAdmins
http://www.labofapenetrationtester.com/2017/08/week-of-evading-microsoft-ata-day3.html
写shellcode执行iptables -P INPUT ACCEPT
https://0day.work/writing-my-first-shellcode-iptables-p-input-accept/
一个价值一万刀的Google漏洞
https://sites.google.com/site/testsitehacking/10k-host-header
Wednesday Stream – Windows 95 Bug Finding
https://www.youtube.com/watch?v=Q9v8lQYitak
Adobe Acrobat Pro DC ImageConversion EMF解析EMR_EXTTEXTOUTA数组索引远程执行代码漏洞
http://srcincite.io/advisories/src-2017-0007/
看我如何从54G日志中溯源web应用攻击路径
https://secvul.com/topics/715.html
RPL攻击框架:simulating WSN with a malicious mote based on Contiki
Cobalt组织活动信息(2017年夏季)
https://cys-centrum.com/ru/news/activity_of_cobalt_summer_2017
CVE-2017-7781/CVE-2017-10176: Issue with elliptic curve addition in mixed Jacobian-affine coordinates in Firefox/Java
http://blog.intothesymmetry.com/2017/08/cve-2017-7781cve-2017-10176-issue-with.html
Quantum Key-Recovery on full AEZ Encryption
https://eprint.iacr.org/2017/767.pdf