1月20日-每日安全知识热点

https://p4.ssl.qhimg.com/t012dfaf746e4fefbe3.jpg

1.CVE-2016-0728 LINUX内核漏洞分析与利用

http://perception-point.io/2016/01/14/analysis-and-exploitation-of-a-linux-kernel-vulnerability-cve-2016-0728/

2.使用脚本编写一个windows键盘记录器

http://www.patch-tuesday.net/2016/01/scripting-windows-key-logger.html

3.破解恶意欺诈软件

http://blog.cylance.com/cracking-ransomware

4.cisco安全辅导之加固cisco ios设备

http://www.cisco.com/c/en/us/support/docs/ip/access-lists/13608-21.html

5.我如何利用Angular expression窃取的plunker session会话

https://royaljay.com/security/angular-expression-injections/

6.cve-2015-5090: adobe reader/acrobat pro 提权漏洞分析

http://warchest.fusionx.com/cve-2015-5090-adobe-readeracrobat-pro-privilege-escalation/

7.firefox沙盒辅导

https://firejail.wordpress.com/documentation-2/firefox-guide/

8.More Registry Fun

http://windowsir.blogspot.com/2016/01/more-registry-fun.html

9.cve_2016_0728 :linux内核 exploit POC

https://gist.github.com/PerceptionPointTeam/18b1e86d1c0f8531ff8f

10恶意软件分析教程[可能是目前能看到最好的免费教程了

http://fumalwareanalysis.blogspot.gr/p/malware-analysis-tutorials-reverse.html

11.微软Unicode脚本处理器漏洞允许代码执行

https://secunia.com/blog/vulnerability-in-microsofts-unicode-scripts-processor-allows-execution-of-arbitrary-code-441/

12.列举常见杀毒软件的排除【不扫描】位置

http://securitypadawan.blogspot.com/2016/01/enumerating-excluded-antivirus-locations.html

13.linux eBPF栈Trace Hack

http://www.brendangregg.com/blog/2016-01-18/ebpf-stack-trace-hack.html

14.Webshells :每次都是同样的故事,第二部分

https://dfir.it/blog/2016/01/18/webshells-every-time-the-same-story-dot-dot-dot-part2/

15.gatekeeper 曝光

https://www.synack.com/wp-content/uploads/2016/01/GatekeeperExposed.pdf

16.Dridex, Pony, and Neutrino…oh my!

http://phishme.com/dridex-pony-and-neutrinooh-my/

17.BSides哥伦布区2016年安全会议视频

http://www.irongeek.com/i.php?page=videos/bsidescolumbus2016/mainlist

18.用于CSRF测试的chrome扩展

http://yelgroup.github.io/Yel-CSRF-tool/

免责声明:文章内容不代表本站立场,本站不对其内容的真实性、完整性、准确性给予任何担保、暗示和承诺,仅供读者参考,文章版权归原作者所有。如本文内容影响到您的合法权益(内容、图片等),请及时联系本站,我们会及时删除处理。查看原文

为您推荐