Nicolas Krassas @Dinosn
[ Pentest ] WMI Post-Exploitation with CrackMapExec https://t.co/41pR7sZGIu
"WMI Post-Exploitation with CrackMapExec: http://t.cn/RGEnWbX"
Nicolas Krassas @Dinosn
[ Malware ] Macro Malware Associated With Dridex Finds New Ways to Hide https://t.co/qG3f2nJRIj
"銀行木馬 Dridex 相關的宏惡意軟體又發現了新的隱藏方法, 來自 McAfee Blog: http://t.cn/RGEnOB2"
Justin Lowery @jlowerydevelops
[ Others ] Fingerprinting anonymous TOR users by their mouse wheel movements. Impressive.https://t.co/4qMSsbeY37
"基於滑鼠滾輪的移動數據獲取匿名 TOR 用戶 Web 指紋圖譜: http://t.cn/RGEnOkT 技術 Blog:http://jcarlosnorte.com/security/2016/03/06/advanced-tor-browser-fingerprinting.html "
Nicolas Krassas @Dinosn
[ Others ] SSD Advisory – Zyxel Remote Unauthenticated Code Execution (NSA310) https://t.co/3EqdZPUTq6
"網絡存儲設備 Zyxel NSA310 存在遠程未授權代碼執行,而且是以 Root 權限: http://t.cn/RGEnOk1"
Magnus Stubman @magnusstubman
[ Web Security ] One XSS vector to rule them all: https://t.co/gmpIgzJpeT #infosec #xss
"一個 XSS Payload 實現 Rule Them All - 這篇文章介紹作者寫的一個 XSS Payload,可以適應各種各樣的上下文環境 ︰ http://t.cn/RGEnWGO "
PythonArsenal @PythonArsenal
[ MalwareAnalysis ] unpacker - script to automate malware unpacking. Based on WinAppDbg.https://t.co/rFRmPM79SD
"unpacker - 基於 WinAppDbg 調試器的惡意代碼分析工具,可以檢測脫殼行為、Dump 原始內存、Dump 解密後的網絡流量: http://t.cn/RGEnOk2"
Nicolas Krassas @Dinosn
[ Malware ] Alpha Testing the AlphaLeon HTTP Bot https://t.co/Ux0wQqroDQ
"Arbor Blog 對 AlphaLeon HTTP Bot 的分析: http://t.cn/RGEnOB4"
Jack Mannino @jack_mannino
[ Web Security ] Exploring Server-Side Template Injection in Flask/Jinja2 https://t.co/ERMnMEBi9H
"Flask/Jinja2 中的服務端模板注入, 來自 Nvisium Blog: http://t.cn/RGEnWGR"
Nicolas Krassas @Dinosn
[ Network ] How to exploit TFTP protocol to launch powerful DDoS amplification attacks https://t.co/VT6umjWwdH
"如何利用 TFTP 協議發起 DDoS 放大攻擊, 來自 SecurityAffairs 的報導, 文中有相關 Paper 的連結:http://t.cn/RGEnOk5"
Nicolas Krassas @Dinosn
[ Web Security ] Analysis on a remote code execution on SpagoBI https://t.co/b3QuzxGHsi
"開源商務智能套件 SpagoBI 遠程代碼執行漏洞分析: http://t.cn/RGEnWGg "
Francisco Falcon @fdfalcon
[ Browser ] This P0 bug in IE is marked as Read AV, underlying cause is indirect call to null function ptr caught by CFG https://t.co/MmC7xdpLW9
"Project Zero Issue 669 IE 讀操作訪問違例(CAnimatablePropertyListElement::GetCurrentValues), Crash 的位置是在 CFG 的檢查中(LdrpValidateUserCallTargetBitMapCheck): http://t.cn/RGEnO88 "
Tom Creedon @n300trg
[ Others ] 360's report on OnionDog APT set 「洋蔥狗」潛伏3年終曝光 定期偷襲能源及交通行業 #cybersecurity #Chinahttps://t.co/blMqs0I4wY
"「洋蔥狗」潛伏3年終曝光 定期偷襲能源及交通行業, 來自 360 安全播報: http://t.cn/RG8wsgG"
quarkslab @quarkslab
[ Tools ] [BLOG+TOOL] Binmap: a system scanner https://t.co/9jjh00ka3I Vulnerability research is not only about luck, it is also about strategy
"Binmap - 開源掃描器,搜索系統中所有文件,收集程序、庫的各種信息,如依賴信息、符號信息等:http://t.cn/RGEORHB "
Trend Micro @TrendMicro
[ Industry News ] Trend Micro welcomes TippingPoint, DVLabs and the Zero Day Initiative. https://t.co/PkTZdPCUoghttps://t.co/FWNVj8ycYQ
"趨勢科技收購了惠普的 TippingPoint,包括旗下的 ZDI: http://t.cn/RGEnORw http://t.cn/RGEnORf"
Lukas Stefanko @LukasStefanko
[ Android ] #Android banking malware can easily change this targeted attack to different countries or banking apps!https://t.co/tzamZsvGdZ #malware
"Android 銀行木馬偽裝成 Flash Player,可以繞過基於簡訊的雙因素認證。 來自 WeLiveSecurity 的分析: http://t.cn/RGEnO87"
Tamas K Lengyel @tklengyel
[ MalwareAnalysis ] Slides of my DCC2016 presentation: Stealthy, Hypervisor-based Malware Analysishttps://t.co/ohIRQfGhrD
"基於 Hypervisor、具有強隱蔽性的惡意軟體分析技術, 來自 DCC2016 會議的演講: http://t.cn/RGEnODD"
Ben Hawkes @benhawkes
[ Linux ] Linux netfilter IPT_SO_SET_REPLACE memory corruption: https://t.co/M3AAmoRTQC
"Linux netfilter IPT_SO_SET_REPLACE 內存破壞漏洞, 來自 Project Zero Issue 758: http://t.cn/RGEnO1S"
darell tan @zxcvgm
[ Android ] Android emulator internals by @freesamael https://t.co/kyr7QjEMdF
"Android 模擬器內幕, 來自 Slideshare: http://t.cn/RGEnO8I "
Nicolas Krassas @Dinosn
[ Others ] The Problem with Dynamic Program Analysis https://t.co/MfqzbfFcG6
"目前,有很多工具採用動態分析的方法尋找程序中的漏洞, 這篇 Blog 談動態分析無法遍歷所有路徑的問題:http://t.cn/RGEnOkM "
Full Disclosure @SecLists
[ Others ] [CORE-2016-0003] - Samsung SW Update Tool MiTM https://t.co/CCz5C0NFDl #FullDisclosure
"三星軟體更新工具中間人劫持漏洞,該工具會分析系統中的驅動,為的是更方便的給用戶安裝或者更新軟體、驅動。 來自 FullDisclosure 的公告: http://t.cn/RGEnOkC "
Nikolaos Chrysaidos @virqdroid
[ Android ] Android with machine learning to detect malicious code - https://t.co/jazkrnBV6j (Chinese)
"用機器學習檢測Android惡意代碼,來自烏雲 Drops,作者為 runner: http://t.cn/RGQBUNB "
Nicolas Krassas @Dinosn
[ ThirdParty ] Memory Corruption Vulnerability in "libotr" https://t.co/5038DEJhFq
" OTR 加密消息傳輸協議實現庫 libotr 內存破壞漏洞, 來自 X41-D Sec 的公告: http://t.cn/RGEnWGG "
Ryan @Fuzion24
[ Android ] Sending of multiple certificate chains leads to some broken TLS cert pinning implementations on Android:https://t.co/vNLwW8XyJa
"幾個無效 Certificate Pinning 實現方案的測試 - Certificate Pinning 保護機制的繞過, 來自 Cigital Blog︰ http://t.cn/RGEnO8K"
Threatpost @threatpost
[ Browser ] Latest @Firefox update fixes 40 vulnerabilities, 22 critical - https://t.co/FmTFF9nDww
"Firefox 發布 45 版本,本次修復 40 個漏洞, 其中 22 個為 Critical, 來自 ThreatPost 的報導: http://t.cn/RGEnO8l"
Anders Fogh @anders_fogh
[ Hardware ] New blog post (technical): Anvil and next generation rowhammer attacks: https://t.co/2mmA2fnYKC
"Anvil 與下一代 Rowhammer 攻擊, Anvil 指的是針對這一攻擊的防禦技術, Blog ︰ http://t.cn/RGEnO8D"
Rapid7 @rapid7
[ ThreatIntelligence ] Threat Intelligence Foundations: Crawl, Walk, Analyze (part 1) https://t.co/NlOWg1LiSI Blog series by @PDXbek
"威脅情報的等級劃分和使用方式, 來自 Rapid 7 威脅情報系列文章裡的第一篇: http://t.cn/RGEnWGf "
Nicolas Krassas @Dinosn
[ Popular Software ] Bind DNS remote exploit vuln: CVE-2016-1285: An error parsing input received by the rndc control channel... https://t.co/HnXYgjBPzy
"Bind 9 DNS CVE-2016-1285 拒絕服務,在處理 rndc 控制信道收到的數據時觸發 Assert,導致服務退出: http://t.cn/RGEnWG2"
Full Disclosure @SecLists
[ ThreatIntelligence ] New Security Tool: MrLooquer - IPv6 Intelligence https://t.co/wRtFGunEMX #FullDisclosure
"MrLooquer - 結合開源情報技術和數據挖掘技術, 創建實時 IPv6 部署情況圖: http://t.cn/RGEnWGX "
Giuseppe `N3mes1s` @gN3mes1s
[ Linux ] Sigreturn-oriented programming and its mitigation - https://t.co/B0amp4H94J https://t.co/4ib1e6epEn
"SROP(Sigreturn-oriented programming) 攻擊以及緩解技術: http://t.cn/RGEnO1g http://t.cn/RGEnOBv 關於 SROP, 紅黑聯盟網站有一篇文章參考: http://www.2cto.com/Article/201512/452080.html "
Sean Metcalf @PyroTek3
[ Pentest ] Sneaky #ActiveDirectory Persistence: Computer Accounts & Domain Controller Silver Ticketshttps://t.co/3OtiAcFi6C https://t.co/jLZ8r2JXQz
"Active Directory 攻擊維持技術 Part 16︰ 計算機帳戶與域控制器 Silver Tickets: http://t.cn/RGEnOFGhttp://t.cn/RGEnOF6"