<ol id="pzjdr"></ol>

    <b id="pzjdr"></b>

      <cite id="pzjdr"></cite>

        证券简称:天融信   证券代码:002212
        安全通告
        首页 > 技术支持 > 安全通告

        每日攻防资讯简报[May.7th]

        发布时间:2021-05-07查看次数:48
        分享到

        0x00漏洞

        1.高通的移动台调制解调器(MSM)芯片中发现的高危漏洞,攻击者可以利用该漏洞访问移动电话用户的短信,通话记录并收听他们的对话(CVE-2020-11292)

        https://research.checkpoint.com/2021/security-probe-of-qualcomm-msm/

        2.DNS漏洞TsuNAME,使攻击者可以使用权威DNS服务器执行大规模基于反射的DDoS攻击

        https://tsuname.io/

        https://tsuname.io/advisory.pdf

        3.开源网络数据包嗅探器VoIPmonitor中的漏洞使未经身份验证的攻击者执行任意代码(CVE-2021-30461)

        https://ssd-disclosure.com/ssd-advisory-voipmonitor-unauth-rce/

        4.MouseTrap六个0days,使远程攻击者可以在没有用户交互的情况下获得完整的RCE

        https://axelp.io/MouseTrap

        5.CVE-2021-32030:ASUS GT-AC2900身份验证绕过

        https://www.atredis.com/blog/2021/4/30/asus-authentication-bypass

        6.VMware vRealize Business for Cloud中的严重RCE漏洞(CVE-2021-21984)

        https://www.vmware.com/security/advisories/VMSA-2021-0007.html

        0x01工具

        1.MicroBackdoor:适用于Windows目标的小型便捷C2工具

        https://github.com/Cr4sh/MicroBackdoor

        2.Priv2Admin:Windows提权工具

        https://github.com/gtworek/Priv2Admin

        3.KubeArmor:可感知容器的运行时安全实施系统,可在系统级别限制容器的行为(例如进程执行,文件访问,联网操作和资源利用)

        https://github.com/accuknox/KubeArmor

        4.Mystikal:macOS初始访问有效负载生成器

        https://github.com/D00MFist/Mystikal

        https://posts.specterops.io/introducing-mystikal-4fbd2f7ae520

        5.puredns:子域爆破工具

        https://github.com/d3mondev/puredns

        6.DcRat:C#编写的简易远程工具

        https://github.com/qwqdanchun/DcRat

        7.DoubleStar:A personalized/enhanced re-creation of the Darkhotel "Double Star" APT exploit chain with a focus on Windows 8.1 and mixed with some of my own techniques

        https://github.com/forrest-orr/DoubleStar

        8.nginxpwner:寻找常见Nginx错误配置和漏洞的简单工具

        https://github.com/stark0de/nginxpwner

        9.pentest_lab:使用docker-compose进行本地渗透测试的实验室

        https://github.com/oliverwiegers/pentest_lab

        10.vaf:非常高级的Web Fuzzer

        https://github.com/d4rckh/vaf

        11.paragon:Red Team互动平台,旨在统一简单UI后的进攻工具

        https://github.com/KCarretto/paragon

        12.Storm-Breaker:使用Ngrok的工具社交工程,访问网络摄像头和麦克风以及Os密码收集器和位置查找器

        https://github.com/ultrasecurity/Storm-Breaker

        0x02恶意代码

        1.窃密软件Panda Stealer,通过垃圾邮件发送,窃取加密货币钱包

        https://www.trendmicro.com/en_us/research/21/e/new-panda-stealer-targets-cryptocurrency-wallets-.html

        2.TunnelSnake行动:在野发现的针对Windows的Rootkit Moriya,使攻击者可以秘密监视受害者的网络流量,并将命令发送给受感染的主机

        https://securelist.com/operation-tunnelsnake-and-moriya-rootkit/101831/

        3.sx:网络扫描器

        https://github.com/v-byte-cpu/sx

        4.Evasor:一种自动化的安全评估工具,可在Windows操作系统上找到可用于绕过任何应用程序控制规则的现有可执行文件

        https://github.com/cyberark/Evasor

        0x03技术

        1.深度讨论VB6 P代码反汇编和VB6运行时

        https://decoded.avast.io/davidzimmer/vb6-p-code-disassembly/

        2.TJnull的PEN-200 PWK / OSCP 2.0准备指南

        https://www.netsecfocus.com/oscp/2021/05/06/The_Journey_to_Try_Harder-_TJnull-s_Preparation_Guide_for_PEN-200_PWK_OSCP_2.0.html

        3.Android应用程序静态分析入门指南

        https://blog.securelayer7.net/static-analysis-of-android-application-tools-used-securelayer7/

        4.一种基于SQL注入攻击IIS和SQL Server的新颖攻击面

        https://www.blackhat.com/asia-21/briefings/schedule/#give-me-a-sql-injection-i-shall-pwn-iis-and-sql-server-22251

        5.使用Wireshark解码RDP流量

        https://www.hackingarticles.in/wireshark-for-pentester-decrypting-rdp-traffic/

        6.针对初学者的缓冲区溢出指南

        https://www.hackingarticles.in/a-beginners-guide-to-buffer-overflow/

        7.通过参数污染的XSS

        https://infosecwriteups.com/xss-through-parameter-pollution-9a55da150ab2?source=rss----7b722bfd1b8d---4

        8.coin_artist 50k Follower Puzzle – Write-up

        https://buer.haus/2021/05/05/coin_artist-50k-follower-puzzle-write-up/

        9.使用事务性NTFS和API挂钩诱骗CLR“从磁盘”加载代码

        http://blog.redxorblue.com/2021/05/assemblylie-using-transactional-ntfs.html

        10.Networking VMs for HTB

        https://0xdf.gitlab.io/2021/05/04/networking-vms-for-htb.html

        11.在Chrome中启用硬件强制的堆栈保护(cetcompat)

        https://security.googleblog.com/2021/05/enabling-hardware-enforced-stack.html

        12.Metasploit Payload列表:详细清单

        https://www.infosecmatter.com/list-of-metasploit-payloads-detailed-spreadsheet/


        交换温柔,张筱雨人体艺术写真,欧美在线看欧美视频免费,欧美色美人在线视频 网站地图