2634 lines
273 KiB
Plaintext
2634 lines
273 KiB
Plaintext
|
id: 461
|
|||
|
title: 警方查获Matrix 加密聊天服务
|
|||
|
link: https://www.4hou.com/posts/om8k
|
|||
|
description: <p>代号为“Operation Passionflower”的国际执法行动已经关闭了 MATRIX,这是一个加密消息平台,网络犯罪分子利用该平台协调非法活动,同时逃避警方追捕。</p><p>MATRIX 与同名的安全开源、去中心化、实时通信协议是不同的实体,继续使用是完全合法的。该行动在欧洲各地进行,包括法国、荷兰、意大利、立陶宛、西班牙和德国,并由欧洲刑警组织和欧洲司法组织协调。</p><p><span style="font-size: 20px;"><strong>犯罪推动者</strong></span></p><p>警方在找到一名 2021 年 7 月试图暗杀记者的枪手的手机后,顺藤摸瓜找到了 MATRIX。在分析手机后,他们发现该手机经过定制,可以连接到名为 Matrix 的加密消息服务。</p><p>荷兰和法国当局之间的联合调查小组 (JIT) 允许警方监控和拦截通过这些设备发送的 33 种不同语言的 230 万条消息。但是,没有提供有关如何做到这一点的技术细节。 </p><p>“三个月来,当局能够监控可能犯罪分子的信息,这些信息现在将用于支持其他调查。”欧洲刑警组织发布了一份声明。</p><p>在欧洲司法组织和欧洲刑警组织支持的协调行动中,荷兰和法国当局关闭了该消息服务,意大利、立陶宛和西班牙当局采取了后续行动。</p><p>MATRIX 遍布欧洲的 40 台服务器促进了至少 8,000 个用户帐户的通信,这些用户帐户支付了 1350 至 1700 美元的加密货币购买基于 Google Pixel 的设备以及手机上安装的服务的六个月订阅。</p><p>MATRIX 还以“Mactrix”、“Totalsec”、“X-quantum”和“Q-safe”等名称出售,但它们都使用相同的基础设施。 MATRIX 还提供加密视频通话、跟踪交易和匿名浏览互联网的功能。</p><p><span style="font-size: 20px;"><strong>扣押和逮捕</strong></span></p><p>本周,执法部门在四个国家同时进行了突袭和搜查,导致法国和德国的 40 台服务器被关闭,西班牙和法国的 5 名嫌疑人被捕。</p><p>其中一名被捕者是一名 52 岁的立陶宛男子,他被怀疑是 MATRIX 的所有者和主要运营商。当局还查获了 970 部加密手机、152,500 美元现金、525,000 美元加密货币以及四辆汽车。 MATRIX 网站上张贴的查封横幅警告该服务的用户他们的通信已被暴露,调查将继续进行。</p><p style="text-align:center"><img src="https://img.4hou.com/uploads/ueditor/php/upload/image/20241206/1733453697519973.png" title="1733295792775604.png" alt="seizure.webp.png"/></p><p style="text-align: center;"><span style="font-size: 14px;">扣押通知</span><br/></p><p>荷兰警方在另一份公告中指出,任何出于隐私和匿名目的而选择该服务且未参与犯罪活动的 MATRIX 用户应发送电子邮件请求豁免调查。尽管 MATRIX 的运营商技术先进,并且相信它优于之前被拆除的加密电话服务,但 MATRIX 仍被拆除。</p><p>然而,之前取缔类似加密电话服务(如 Ghost、EncroChat、Exclu 和 Sky ECC)的执法行动表明,一旦执法部门了解其基础设施,他们就可以通过监控截获的消息或通过查获的信息来收集犯罪行为的重要证据。这些证据导致数千名毒贩、武器经销商、有组织犯罪分子、杀人犯和洗钱犯被捕。</p>
|
|||
|
pubDate: 2024-12-06 12:00:00
|
|||
|
author: 胡金鱼
|
|||
|
|
|||
|
id: 462
|
|||
|
title: 伏特加制造商 Stoli 因勒索软件攻击申请破产
|
|||
|
link: https://www.4hou.com/posts/nl7P
|
|||
|
description: <p>Stoli 集团的美国公司在 8 月份遭遇勒索软件攻击后申请破产,俄罗斯当局查封了该公司在该国的剩余酿酒厂。Stoli 集团的两家子公司 Stoli USA 和 Kentucky Owl 的总裁兼全球首席执行官在最近的一份文件中表示,这是因为 8 月份的攻击严重破坏了其 IT 系统(包括企业资源规划 (ERP))之后发生的。此次网络攻击还迫使整个集团进行手动操作,影响了会计等关键流程,预计要到 2025 年初才能完全恢复。</p><p>Caldwell 表示:“2024 年 8 月,Stoli 集团的 IT 基础设施因数据泄露和勒索软件攻击而遭受严重破坏。” 由于 Stoli 集团的企业资源规划 (ERP) 系统被禁用,并且 Stoli 集团的大部分内部流程(包括会计职能)被强制,此次攻击给 Stoli 集团内的所有公司(包括 Stoli USA 和 KO)造成了严重的运营问题。</p><p>这一事件还导致 Stoli 美国子公司无法向两家公司拖欠 7800 万美元债务的贷款人提供财务报告。2024 年 7 月,该集团在俄罗斯仅存的最后资产——两家价值 1 亿美元的酿酒厂也因 Stoli 集团及其创始人 Yuri Shefler 被认定为“极端分子”而被没收。</p><p>此外,Stoli 集团还花费了数千万美元与俄罗斯国有企业 FKP Sojuzplodoimport 就 Stolichnaya 和 Moskovskaya 伏特加商标权进行了长达 23 年的长期法庭诉讼,涉及多个司法管辖区,其中包括美国。</p><p>这场法律斗争源于 2000 年 3 月总统普京的一项行政命令,旨在“恢复和保护国家对伏特加商标的权利”,这些商标的权利在 20 世纪 90 年代被私营公司购买。该公司创始人谢夫勒也因批评普京政权而受到出于政治动机和“捏造”的指控,于 2002 年被迫逃离俄罗斯。</p>
|
|||
|
pubDate: 2024-12-06 12:00:00
|
|||
|
author: 胡金鱼
|
|||
|
|
|||
|
id: 463
|
|||
|
title: ChatGPT 诞生两周年:AI 世界的一次代际飞跃
|
|||
|
link: https://www.4hou.com/posts/pnBm
|
|||
|
description: <p><span style=";font-family:宋体;font-size:15px"><span style="font-family:宋体">人工智能</span> <span style="font-family:Arial">(AI) </span><span style="font-family:宋体">技术已有数十年的历史,推动着从机器人到预测分析等方方面面的创新。两年前,伴随着 </span><span style="font-family:Arial">ChatGPT </span><span style="font-family:宋体">的横空出世,生成式人工智能 </span><span style="font-family:Arial">(GenAI) </span><span style="font-family:宋体">成为了 </span><span style="font-family:Arial">AI </span><span style="font-family:宋体">发展史上的一个里程碑式转折点。</span><span style="font-family:Arial">ChatGPT </span><span style="font-family:宋体">被设计用于以近乎人类的水平进行对话、创作和理解。得益于这一变革性功能,</span><span style="font-family:Arial">AI </span><span style="font-family:宋体">走出技术领域,进入日常生活,以前所未有的方式推动着先进技术的广泛普及。</span></span></p><p><span style=";font-family:宋体;font-size:15px"><span style="font-family:Arial">ChatGPT </span><span style="font-family:宋体">于 </span><span style="font-family:Arial">2022 </span><span style="font-family:宋体">年底推出,</span></span><a href="file:///E:/CP/cp/CP%E5%8F%91%E7%A8%BF/2024/12%E6%9C%88/5%E6%97%A5/ChatGPT%202nd%20Anniversary_FINAL.docx#:~:text=Launched%20in%20November%202022%2C%20ChatGPT,fastest%2Dgrowing%20applications%20in%20history."><span style="text-decoration:underline;"><span style="font-family: 宋体;color: rgb(116, 25, 132)"><span style="font-family:宋体">在短短</span> <span style="font-family:Arial">5 </span><span style="font-family:宋体">天内迅速走红,用户数量达到了 </span><span style="font-family:Arial">100 </span><span style="font-family:宋体">万</span></span></span></a><span style=";font-family:宋体;font-size:15px"><span style="font-family:宋体">。</span><span style="font-family:Arial">2024 </span><span style="font-family:宋体">年,</span><span style="font-family:Arial">ChatGPT </span><span style="font-family:宋体">的活跃用户数量骤增至 </span><span style="font-family:Arial">2 </span><span style="font-family:宋体">亿,成为历史上增长速度最快的应用之一。 凭借实时生成上下文相关的连贯回答的能力,</span><span style="font-family:Arial">ChatGPT </span><span style="font-family:宋体">让 </span><span style="font-family:Arial">AI </span><span style="font-family:宋体">成为了一个家喻户晓的名词。这两年以来,人类仿佛又迎来了一次技术革命,全球各个行业都在</span><span style="font-family:Arial">AI</span><span style="font-family:宋体">应用中看到了无限可能。</span></span></p><p><span style=";font-family:宋体;font-size:15px"><span style="font-family:宋体">在十一月乌镇举办的</span><span style="font-family:Arial">2024</span><span style="font-family:宋体">年世界互联网大会上,人工智能成为展示重点,涵盖低空经济、智能网联汽车、人形机器人、数字文创等热点,</span><span style="font-family:Arial">40</span><span style="font-family:宋体">余个大模型及垂直模型、</span><span style="font-family:Arial">10</span><span style="font-family:宋体">余个机器人集中亮相。今年十月,我国一位儿童用户通过视频展示了两个</span><span style="font-family:Arial">AI</span><span style="font-family:宋体">就“愚公是否应该移山”这一主题展开辩论,这两个应用占线的严密逻辑以及“类人化”的表达方式在短短几天就收获了数十万观看与数万条评论。可以看出,在短短两年时间内,各个</span><span style="font-family:Arial">AI</span><span style="font-family:宋体">应用已经开始“飞入寻常百姓家”。</span></span></p><p><span style=";font-family:宋体;font-size:15px"><span style="font-family:宋体">然而,在</span><span style="font-family:Arial">ChatGPT </span><span style=
|
|||
|
pubDate: 2024-12-06 11:45:46
|
|||
|
author: Check Point
|
|||
|
|
|||
|
id: 464
|
|||
|
title: 网络钓鱼电子邮件越来越多地使用 SVG 附件来逃避检测
|
|||
|
link: https://www.4hou.com/posts/rpXB
|
|||
|
description: <p>威胁者越来越多地使用可扩展矢量图形 (SVG) 附件来显示网络钓鱼形式或部署恶意软件,同时逃避检测。网络上的大多数图像都是 JPG 或 PNG 文件,它们由称为像素的小方块网格组成。每个像素都有特定的颜色值,这些像素一起形成整个图像。 SVG(即可缩放矢量图形)以不同的方式显示图像,因为图像不是使用像素,而是通过代码中文本数学公式中描述的线条、形状和文本创建。</p><p>例如,以下文本将创建一个矩形、一个圆形、一个链接和一些文本:</p><p><span style="text-wrap: nowrap;"></span></p><pre class="brush:html;toolbar:false">
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Hello, SVG!</pre><p>在浏览器中打开时,该文件将生成上述文本描述的图形。</p><p style="text-align:center"><img src="https://img.4hou.com/uploads/ueditor/php/upload/image/20241119/1731998603688767.png" title="1731997921186248.png" alt="图片1.png"/></p><p style="text-align: center;"><span style="font-size: 14px;">生成的 SVG 图像</span></p><p>由于这些是矢量图像,它们会自动调整大小,而不会损失图像质量或形状,这使得它们非常适合在可能具有不同分辨率的浏览器应用程序中使用。</p><p><span style="font-size: 20px;"><strong>使用 SVG 附件逃避检测</strong></span></p><p>在网络钓鱼活动中使用 SVG 附件并不是什么新鲜事,然而,根据安全研究人员发现,威胁者正在网络钓鱼活动中越来越多地使用 SVG 文件。</p><p>SVG 附件的多功能性,使得它们不仅可以显示图形,还可以使用。这使得威胁者可以创建 SVG 附件,这些附件可以创建网络钓鱼表单来窃取凭据。如下所示,最近的 SVG 附件 [VirusTotal] 显示了一个带有内置登录表单的虚假 Excel 电子表格,提交后会将数据发送给受害者。</p><p style="text-align:center"><img src="https://img.4hou.com/uploads/ueditor/php/upload/image/20241119/1731998604189053.png" title="1731997813179088.png" alt="svg-phishing-form.webp.png"/></p><p style="text-align: center;"><span style="font-size: 14px;">显示网络钓鱼表单的 SVG 附件</span><br/></p><p>最近活动 [VirusTotal] 中使用的其他 SVG 附件会伪装成官方文档或要求提供更多信息,提示您单击下载按钮,然后从远程站点下载恶意软件。</p><p style="text-align:center"><img src="https://img.4hou.com/uploads/ueditor/php/upload/image/20241119/1731998606904866.png" title="1731997857155979.png" alt="svg-malware.webp.png"/></p><p style="text-align: center;"><span style="font-size: 14px;">用于分发恶意软件的 SVG 附件</span><br/></p><p>其他活动利用 SVG 附件和嵌入式 JavaScript 在打开图像时,自动将浏览器重定向到托管网络钓鱼表单的网站。问题在于,由于这些文件大多只是图像的文本表示,因此安全软件往往不会检测到它们。</p><p>从上传到VirusTotal的样本来看,最多只有一两次被安全软件检测到。尽管如此,接收 SVG 附件对于合法电子邮件来说并不常见,人们应保持怀疑态度。</p><p>除非您是开发人员并希望收到这些类型的附件,否则安全研究人员会建议删除包含它们的任何电子邮件会更安全。</p>
|
|||
|
pubDate: 2024-12-05 12:00:00
|
|||
|
author: 胡金鱼
|
|||
|
|
|||
|
id: 465
|
|||
|
title: 新型漏洞攻击利用服务器进行恶意更新
|
|||
|
link: https://www.4hou.com/posts/8gW2
|
|||
|
description: <p>一组被称为“NachoVPN”的漏洞允许流氓 VPN 服务器在未修补的 Palo Alto 和 SonicWall SSL-VPN 客户端连接到它们时安装恶意更新。</p><p>安全研究人员发现,威胁者可以利用社交工程或网络钓鱼攻击中的恶意网站或文档,诱骗潜在目标将其 SonicWall NetExtender 和 Palo Alto Networks GlobalProtect VPN 客户端连接到攻击者控制的 VPN 服务器。</p><p>威胁者可以使用恶意 VPN 端点窃取受害者的登录凭据、以提升的权限执行任意代码、通过更新安装恶意软件,以及通过安装恶意根证书发起代码签名伪造或中间人攻击。</p><p>SonicWall 在 7 月份发布了补丁来解决 CVE-2024-29014 NetExtender 漏洞,距 5 月份初次报告两个月后,Palo Alto Networks 本周发布了针对 CVE-2024-5921 GlobalProtect 漏洞的安全更新。</p><p>虽然 SonicWall 表示客户必须安装 NetExtender Windows 10.2.341 或更高版本来修补安全漏洞,但 Palo Alto Networks 表示,除了安装 GlobalProtect 6.2.6 或更高版本之外,在 FIPS-CC 模式下运行 VPN 客户端还可以减轻潜在的攻击(其中修复了该漏洞)。</p><p>上周,AmberWolf 披露了有关这两个漏洞的更多详细信息,并发布了一个名为 NachoVPN 的开源工具,该工具模拟可以利用这些漏洞的流氓 VPN 服务器。</p><p>经证实,该工具与平台无关,能够识别不同的 VPN 客户端,并根据连接到它的特定客户端调整其响应。它也是可扩展的,建议在发现新漏洞时添加它们。</p><p><span style="text-wrap: wrap;">AmberWolf 还</span>在该工具的 GitHub 页面上表示,它目前支持各种流行的企业 VPN 产品,例如 Cisco AnyConnect、SonicWall NetExtender、Palo Alto GlobalProtect 和 Ivanti Connect Secure。</p>
|
|||
|
pubDate: 2024-12-04 12:00:00
|
|||
|
author: 胡金鱼
|
|||
|
|
|||
|
id: 466
|
|||
|
title: 黑客利用 macOS 扩展文件属性隐藏恶意代码
|
|||
|
link: https://www.4hou.com/posts/42Yg
|
|||
|
description: <p>黑客被发现正滥用 macOS 文件的扩展属性来传播一种新的木马,研究人员将其称为 RustyAttr。</p><p>威胁分子将恶意代码隐藏在自定义文件元数据中,并使用诱饵 PDF 文档来帮助逃避检测。这项新技术类似于 2020 年 Bundlore 广告软件将其有效负载隐藏在资源分支中以隐藏 macOS 有效负载的方式。安全研究人员在一些野外恶意软件样本中发现了它。</p><p>根据他们的分析,由于无法确认任何受害者,研究人员有一定把握将这些样本归因于朝鲜黑客拉扎勒斯。他们认为攻击者可能正在尝试一种新的恶意软件传递解决方案。</p><p>这种方法并不常见,现在已被证明可以有效地防止检测,因为 Virus Total 平台上的安全代理都没有标记恶意文件。</p><p><span style="font-size: 20px;"><strong>在文件属性中隐藏代码</strong></span></p><p>macOS 扩展属性 (EA) 表示通常与文件和目录关联的隐藏元数据,这些元数据在 Finder 或终端中不直接可见,但可以使用“xattr”命令提取以显示、编辑或删除扩展属性。在 RustyAttr 攻击的情况下,EA 名称为“test”并包含 shell 脚本。</p><p style="text-align:center"><img src="https://img.4hou.com/uploads/ueditor/php/upload/image/20241114/1731555262178663.png" title="1731555017196894.png" alt="ShellScript-macOS-xattr.webp.png"/></p><p style="text-align: center;"><span style="font-size: 14px;">macOS 扩展属性内的 Shell 脚本</span></p><p>存储 EA 的恶意应用程序是使用 Tauri 框架构建的,该框架结合了可以调用 Rust 后端函数的 Web 前端(HTML、JavaScript)。当应用程序运行时,它会加载一个包含 JavaScript(“preload.js”)的网页,该网页从“测试”EA 中指示的位置获取内容,并将其发送到“run_command”函数以执行 shell 脚本。</p><p style="text-align:center"><img src="https://img.4hou.com/uploads/ueditor/php/upload/image/20241114/1731555263191403.png" title="1731555060158403.png" alt="preloadjs.webp.png"/></p><p style="text-align: center;"><span style="font-size: 14px;">preload.js 的内容</span></p><p>为了在此过程中降低用户怀疑,某些示例会启动诱饵 PDF 文件或显示错误对话框。</p><p style="text-align:center"><img src="https://img.4hou.com/uploads/ueditor/php/upload/image/20241114/1731555264183724.png" title="1731555098664334.png" alt="decoy.webp.png"/></p><p style="text-align: center;"><span style="font-size: 14px;">诱饵 PDF 隐藏恶意后台活动</span><br/></p><p>该 PDF 是从用于公共文件共享的 pCloud 实例获取的,其中还包含名称与加密货币投资主题相关的条目,这与 Lazarus 的目的和目标一致。</p><p>RustyAttr 应用程序 Group-IB 的少数样本发现,所有应用程序都通过了 Virus Total 的检测测试,并且应用程序是使用泄露的证书进行签名的,苹果已撤销该证书,但未经过公证。</p><p style="text-align:center"><img src="https://img.4hou.com/uploads/ueditor/php/upload/image/20241114/1731555265198960.png" title="1731555192591051.png" alt="signed.webp.png"/></p><p style="text-align: center;"><span style="font-size: 14px;">应用证书详细信息</span></p><p>Group-IB 无法检索和分析下一阶段的恶意软件,但发现临时服务器连接到 Lazarus 基础设施中的已知端点以尝试获取它。</p><p style="text-align:center"><img src="https://img.4hou.com/uploads/ueditor/php/upload/image/20241114/1731555266904028.png" title="1731555220670835.png" alt="exec-flow.webp.png"/></p><p style="text-align: center;"><span style="font-size: 14px;">执行流程</span><br/></p><p><span style="font-size: 20px;"><strong>尝试 macOS 规避</strong></span></p><p>Group-IB 报告的案例与 SentinelLabs 最近的另一份报告非常相似,该报告观察到朝鲜黑客 BlueNoroff 在 macOS 中尝试了类似但不同的规避技术。</p><p>BlueNoroff 使用以加密货币为主题的网络钓鱼来引诱目标下载经<E8BDBD><E7BB8F>
|
|||
|
pubDate: 2024-12-04 12:00:00
|
|||
|
author: 胡金鱼
|
|||
|
|
|||
|
id: 467
|
|||
|
title: AI+终端All in One全面落地,360开启终端5.0时代
|
|||
|
link: https://www.4hou.com/posts/l0XV
|
|||
|
description: <p>数字化漫长的发展进程中,终端永远是首要的攻击目标。伴随着安全威胁的不断演进升级,终端安全发展经历了4个阶段。在经历了1.0时代的付费杀毒与2.0时代的免费杀毒后,终端安全产品由于市场需求的多样化,变得更加细分。以EPP为代表的企业终端安全防护产品迅速崛起,从而衍生出EDR、CWPP、桌管、准入等终端安全系统,多端共存的3.0时代呈现出百花齐放之势。考虑到管理运维的便捷性,终端安全产品进行了高度整合,实现一个客户端+一个管理中心的架构,提高了部署、运维和资源效率。就此,终端安全All in One 4.0时代开启。</p><p style="text-align:center"><img src="https://img.4hou.com/uploads/ueditor/php/upload/image/20241203/1733220102175617.png" title="1733220102175617.png" alt="图片1.png"/></p><p>然而在4.0时代中,始终存在着4个主要问题:</p><p>一是“重管理、轻安全”偏离了本质,大多产品的APT实战对抗能力缺乏,“看不见”威胁成为核心挑战;</p><p>二是末端用户体验较差,如若降低设备性能,有可能干扰到办公效率;</p><p>三是大模型的出现,为终端建设提供了全新的发展思路,大多用户期待更加智能高效的解决方案;</p><p>四是仅凭产品和工具堆砌,无法全面覆盖终端的核心场景,解决不了用户痛点。</p><p>真正的以客户为中心,仅有安全能力还不够,所以360提出以客户为中心,以解决客户痛点场景为终极目标的终端 All in One 5.0全新理念!</p><p style="text-align:center"><img src="https://img.4hou.com/uploads/ueditor/php/upload/image/20241203/1733220114166382.png" title="1733220114166382.png" alt="图片2.png"/></p><p>360数字安全集团凭借自身在AI大模型先天基因优势,基于360安全大模型与360智脑大模型赋能,集成过去20年,面向终端侧积累的7类,1200+项能力,聚焦8大用户痛点场景,<strong>全面开启终端All in One 5.0 时代</strong>!</p><p><span style="font-size: 20px;"><strong>覆盖八大痛点场景</strong></span></p><p><span style="font-size: 20px;"><strong>All in的不仅是安全</strong></span></p><p>360基于服务百万企业客户的经验积淀,深度洞察终端安全建设的核心需求,提炼总结出<strong>数字资产“看不见”、被动防御不全面、高级威胁难对抗、勒索攻击难防护、数据泄露难掌控、合规管理需满足、软件供应链需保护、企业数转智</strong>改八大终端安全痛点场景。</p><p><strong>在AI大模型能力加持下,360终端All in One 5.0打造了覆盖八大痛点场景的多位一体解决方案</strong>,致力帮助广大政企机构在提升终端安全能力、安全运营效率的同时,实现低成本、高效能的数转智改。</p><p style="text-align:center"><img src="https://img.4hou.com/uploads/ueditor/php/upload/image/20241203/1733220126153851.png" title="1733220126153851.png" alt="图片3.png"/></p><p><strong><span style="font-size: 18px;">核心优势一:AI大模型增强“看见”能力,重塑终端防御+运营体系</span></strong></p><p>360终端All in One 5.0解决方案在安全大模型能力加持下,将过去20年积累的APT对抗能力、国家级实战攻防经验进行深度整合与梳理,对威胁检测-告警解读-影响面分析-攻击链溯源-威胁处置全流程进行赋能,重塑终端安全体系。</p><p>政企用户不仅能够在AI的帮助下,轻松识别出隐藏在大量数据中的复杂攻击模式,还可进行自动多端溯源、多维情报分析、威胁狩猎等配套操作;</p><p>专门打造的终端安全数字运营专家可以对任何日常安全运营的疑难杂症,给出精准的答案,让小白也可解决棘手问题,让专家可以效率飙升;</p><p>智能化的分析能力可以过滤90%以上的无用信息,让用户可以迅速找到核心结论,大大提升了使用体验;</p><p>在每
|
|||
|
pubDate: 2024-12-03 18:06:15
|
|||
|
author: 企业资讯
|
|||
|
|
|||
|
id: 468
|
|||
|
title: 融合共生 新质网安|2024科创西安·SSC网络安全大会圆满举办
|
|||
|
link: https://www.4hou.com/posts/jB5B
|
|||
|
description: <p><strong><span style="font-size: 18px;"></span></strong></p><p style="text-align:center"><img src="https://img.4hou.com/uploads/ueditor/php/upload/image/20241203/1733196286985185.jpg" title="1733195723132241.jpg" alt="微信图片_20241203103502.jpg"/></p><p>由西安市科技局指导、西安高新区管委会主办、四叶草安全承办的<strong>“2024科创西安·SSC网络安全大会”</strong>2024年11月29日在西安香格里拉大酒店成功举办。 </p><p>本届大会以<strong>“融合共生 新质网安”</strong>为主题,汇聚了国内网络安全领域的顶尖专家、企业领袖及行业精英,旨在共同探讨网络安全技术的最新进展、行业趋势以及面临的挑战与机遇。通过主论坛、两场分论坛的深度对话、技术展示、案例分享等多种形式,为参会者提供了全方位、多层次的交流平台,也展现了西安在网络安全领域的卓越成就和无限潜力。</p><p>西安市科技局一级巡视员李志军,中国信息协会信息安全专业委员会副主任、原国家信息技术安全研究中心主任俞克群,高新区党工委委员、管委会副主任任俊峰以及西安四叶草信息技术有限公司董事长马坤分别为大会致辞。</p><p>公安部十一局原副局长、一级巡视员、总工程师郭启全第一个发表主题演讲,题为《以网络安全新质战斗力引领网络空间实战能力的提升》。</p><p>西安市工信局副局长孙远昆,西安市委网信办信息化处长李永彬,西安公安网安支队政委刘建军,西安市数据局一级调研员马铁兵,高新区科创局、工信局、文宣局、西安软件园发展中心等单位的领导以及网络安全行业从业者、高校师生代表莅临本次大会现场。</p><p style="text-align:center"><img src="https://img.4hou.com/uploads/ueditor/php/upload/image/20241203/1733196287172900.jpg" title="1733195741183333.jpg" alt="微信图片_20241203103603.jpg"/></p><p style="text-align:center"><img src="https://img.4hou.com/uploads/ueditor/php/upload/image/20241203/1733196287611484.jpg" title="1733195751910189.jpg" alt="微信图片_20241203103610.jpg"/></p><p><span style="font-size: 20px;"><strong>大会致辞</strong></span><br/></p><p style="text-align:center"><img src="https://img.4hou.com/uploads/ueditor/php/upload/image/20241203/1733196288154772.jpg" title="1733195779236116.jpg" alt="微信图片_20241203103658.jpg"/></p><p style="text-align: center;"><span style="font-size: 14px;">西安市科技局一级巡视员 李志军</span></p><p>李志军分享了西安在科技创新方面正在努力推动“双中心”建设的各个计划,以科技创新推进产业创新,西安迈出可喜的一步。西安是全国新一代人工智能创业发展区,有500多家人工智能企业,带动着600多亿元产值。本土网络安全企业,据统计有50多家,使得西安在科技创新方面更具优势,希望通过SSC网络安全大会等一系列交流活动,助力科技创新与产业创新的深度融合。<br/></p><p style="text-align:center"><img src="https://img.4hou.com/uploads/ueditor/php/upload/image/20241203/1733196289177799.jpg" title="1733195836424321.jpg" alt="微信图片_20241203103735.jpg"/></p><p style="text-align: center;"><span style="font-size: 14px;">西安高新区党工委委员、管委会副主任 任俊峰</span></p><p>任俊峰表示今年主办SSC网络安全大会的整体考虑是要把握当今数字化、网络化、智能化的时代特征,共同探讨融合创新的发展之路。人工智能进入了高速发展和广泛应用的新阶段,建立安全的发展理念,构造安全的人工智能研发和应用环境,是人工智能安全发展、造福人类的保障。未来的网络安全从业者必须是懂得网络技术、被AI外挂加持的,AI工具赋能的网络安全人才。</p><p style="text-align:center"><img src="https://img.4hou.com/uploads/ueditor/php/upload/image/20241203/1733196290659541.jpg" title="17331958821
|
|||
|
pubDate: 2024-12-03 11:39:03
|
|||
|
author: 企业资讯
|
|||
|
|
|||
|
id: 469
|
|||
|
title: 黑客滥用流行的 Godot 游戏引擎感染数千台电脑
|
|||
|
link: https://www.4hou.com/posts/qo6D
|
|||
|
description: <p>黑客利用新的 GodLoader 恶意软件,广泛使用 Godot 游戏引擎功能,在短短三个月内逃避检测并感染了 17,000 多个系统。</p><p>Check Point Research 在调查攻击时发现,威胁者可以使用此恶意软件加载程序来针对所有主要平台(包括 Windows、macOS、Linux、Android 和 iOS)的游戏玩家。它还利用 Godot 的灵活性及其 GDScript 脚本语言功能来执行任意代码,并使用游戏引擎 .pck 文件(打包游戏资产)绕过检测系统来嵌入有害脚本。</p><p>一旦加载,恶意制作的文件就会触发受害者设备上的恶意代码,使攻击者能够窃取凭据或下载其他有效负载,包括 XMRig 加密矿工。</p><p>该矿工恶意软件的配置托管在 5 月份上传的私人 Pastebin 文件中,该文件在整个活动期间被访问了 206,913 次。 </p><p>至少自 2024 年 6 月 29 日起,网络犯罪分子一直在利用 Godot Engine 执行精心设计的 GDScript 代码,从而触发恶意命令并传播恶意软件。VirusTotal 上的大多数防病毒工具仍未检测到这种技术,可能仅在短短的时间内就感染了超过 17,000 台计算机。</p><p>Godot 拥有一个充满活力且不断发展的开发者社区,他们重视其开源性质和强大的功能。超过 2,700 名开发者为 Godot 游戏引擎做出了贡献,而在 Discord、YouTube 和其他社交媒体平台等平台上,Godot 引擎拥有大约 80,000 名关注者,他们可以随时了解最新消息。</p><p style="text-align:center"><img src="https://img.4hou.com/uploads/ueditor/php/upload/image/20241202/1733125759392945.png" title="1733125551854259.png" alt="Attack chain.webp.png"/></p><p style="text-align: center;"><span style="font-size: 14px;">攻击链</span><br/></p><p>攻击者通过 Stargazers Ghost Network 传播 GodLoader 恶意软件,这是一种恶意软件分发即服务 (DaaS),使用看似合法的 GitHub 存储库掩盖其活动。</p><p>2024 年 9 月至 10 月期间,他们使用由超过 225 个 Stargazer Ghost 帐户控制的 200 多个存储库,将恶意软件部署到目标系统,利用潜在受害者对开源平台和看似合法的软件存储库的信任。</p><p>在整个活动过程中,Check Point 在 9 月 12 日至 10 月 3 日期间检测到针对开发人员和游戏玩家的四次独立攻击浪潮,诱使他们下载受感染的工具和游戏。</p><p>虽然安全研究人员只发现了针对 Windows 系统的 GodLoader 样本,但他们还开发了 GDScript 概念验证漏洞利用代码,展示了恶意软件如何轻松地用于攻击 Linux 和 macOS 系统。</p><p>Stargazer Goblin 是这些攻击中使用的 Stargazers Ghost Network DaaS 平台背后的恶意分子,Check Point 于 2023 年 6 月首次观察到在暗网上推广此恶意软件分发服务。但是,它可能至少从 2022 年 8 月起就一直活跃,自这项服务推出以来,收入超过 100,000 美元。 </p><p>Stargazers Ghost Network 使用 3,000 多个 GitHub“ghost”帐户创建了数百个存储库的网络,这些存储库可用于传播恶意软件(主要是 RedLine、Lumma Stealer、Rhadamanthys、RisePro 和 Atlantida Stealer 等信息窃取程序)以及 star、fork 和订阅这些恶意代码库,将它们推送到 GitHub 的趋势部分并增加其明显的合法性。</p><p>随后,Godot Engine 维护者和安全团队成员发送声明说:“该漏洞并非 Godot 特有。 Godot Engine 是一个带有脚本语言的编程系统。例如,它类似于 Python 和 Ruby 运行时,用任何编程语言都可以编写恶意程序。”</p><p>Godot 不为“.pck”文件注册文件处理程序。这意味着恶意分子始终必须将 Godot 运行时与 .pck 文件一起发送。用户始终必须将运行时与 .pck 一起解压到同一位置,然后执行运行时。除非存在其他操作系统级漏洞,否则恶意分子无法创建“一键漏洞利用”。如果使用这样的操作系统级漏洞,那么由于运行时的大小
|
|||
|
pubDate: 2024-12-03 11:32:31
|
|||
|
author: 胡金鱼
|
|||
|
|
|||
|
id: 470
|
|||
|
title: IDC:360安全大模型安全运营领域实测结果行业第一
|
|||
|
link: https://www.4hou.com/posts/wx2g
|
|||
|
description: <p>近日,全球领先的IT市场研究和咨询公司IDC发布《IDC Technology Assessment:中国安全大模型实测之安全运营,2024》(Doc#CHC52725024,2024年11月)报告,对中国安全大模型产品在安全运营领域的应用落地情况从七大维度开展实测,<strong>360安全大模型凭借领先的技术能力和业务水平,在告警关联与处置、策略创建与优化、引导式调查与修正、威胁情报的收集与分析等多个维度位居首位,综合能力国内第一</strong>。</p><p style="text-align:center"><img src="https://img.4hou.com/uploads/ueditor/php/upload/image/20241202/1733131178829518.png" title="1733131178829518.png" alt="图片2.png"/></p><p>IDC指出,当前,安全大模型在安全运营、应用安全、数据安全、风险与暴露面管理以及安全合规等领域均有应用,其中,安全运营领域的应用落地最多。借助大模型的能力,将进一步提升安全产品检测、分析、响应的效率和效果,提高安全运营的自动化、智能化水平,帮助用户增强“看见”能力的同时降本增效。IDC预测,中国的安全大模型市场将在未来3年迎来市场的快速增长期。<br/></p><p>作为国内唯一兼具数字安全和人工智能双重能力的企业,3<strong>60率先推出行业首个安全大模型赋能全线安全产品,生成AI+安全整体解决方案。帮助客户在告警关联与处置、漏洞管理与修复、威胁情报分析等多个“明星场景”投入实战应用</strong>。</p><p>在本次实测中,IDC以网络安全通用知识、告警关联与处置、自动化安全报告、漏洞管理与修复、策略创建与优化、引导式调查与修正、威胁情报的收集与分析等七大维度为代表,综合考察运营平台的智能化水平。以本地安全大脑例,360通过安全大模型与本地安全大脑相结合,整合独家安全工具、高价值安全知识,融入智能体框架,重塑安全运营全流程,全面提升平台智能化水平,展开来说:</p><p><strong>智能化告警研判</strong>:基于学习到的资深安全专家分析知识,360安全大模型能够针对告警进行结果研判和过程推理,呈现攻击的结果判定、原因解析、报文分析、攻击链分析、链路图展示、攻击者分析、影响面分析、情报关联分析和处置建议。运营人员仅需要查看告警结论便可快速进行安全决策,进一步降低安全运营技术门槛,解放运营人员精力。2024攻防演练期间,360安全大模型智能告警超3000W条,平均为每个客户拦截超10W次攻击。</p><p><strong>攻击者智能溯源</strong>:根据告警内容,360安全大模型能够自动分析和泛化与攻击者关联的云端情报、本地情报、本地行为数据和告警数据,对攻击者进行全面画像并给出综合处置建议。同时,对影响面展开二次研判,为安全分析人员提供引导式的分析思路,进而迅速对攻击者做出合理的处置决策。在2024攻防演练期间,360安全大模型溯源3348次,提供26份黑客画像,为客户提供强有力支撑。</p><p><strong>自动化响应处置</strong>:360安全大模型通过任务拆解和逻辑推理,实现对告警类型、告警含义和威胁特征的理解,通过对自动化响应处置预案的融合分析,可以自动运行场景要求的处置预案或为安全分析人员推荐最优处置方案,衔接研判分析的结果,打通从分析到处置全链路智能化的最后“一公里”。在实际客户应用中,实现事件自动化响应效率等指标提效200%、人工平均响应时间等指标提效100%。</p><p><strong>安全知识沉淀</strong>:360用大模型将360沉淀多年的安全知识与企业私有化的规章制度、流程标准、处置经验等进行系统性地融合,帮客户构建新型的智能化知识库,解决企业数据量大、分散、多源化、内容关联度低、难以快速定位所<E4BD8D>
|
|||
|
pubDate: 2024-12-02 17:22:10
|
|||
|
author: 企业资讯
|
|||
|
|
|||
|
id: 471
|
|||
|
title: Windows 在新的网络钓鱼攻击中感染了后门 Linux 虚拟机
|
|||
|
link: https://www.4hou.com/posts/rpMk
|
|||
|
description: <p>一种名为“CRON#TRAP”的新网络钓鱼活动通过 Linux 虚拟机感染 Windows,该虚拟机包含内置后门,可以秘密访问公司网络。</p><p>使用虚拟机进行攻击并不是什么新鲜事,勒索软件团伙和加密货币挖矿者利用虚拟机来秘密执行恶意活动。然而,威胁者通常在破坏网络后手动安装这些软件。</p><p>Securonix 研究人员发现的一项新活动是使用网络钓鱼电子邮件执行无人值守的 Linux 虚拟机安装,以破坏企业网络并获得持久性。</p><p>网络钓鱼电子邮件伪装成“OneAmerica 调查”,其中包含一个 285MB 的大型 ZIP 存档,用于安装预装后门的 Linux 虚拟机。</p><p>该 ZIP 文件包含一个名为“OneAmerica Survey.lnk”的 Windows 快捷方式和一个包含 QEMU 虚拟机应用程序的“data”文件夹,其中主要可执行文件伪装为 fontdiag.exe。</p><p>启动快捷方式时,它会执行 PowerShell 命令将下载的存档解压到“%UserProfile%\datax”文件夹,然后启动“start.bat”以在设备上设置并启动自定义 QEMU Linux 虚拟机。</p><p style="text-align:center"><img src="https://img.4hou.com/uploads/ueditor/php/upload/image/20241105/1730794968157681.png" title="1730794799171519.png" alt="cron-trap.webp.png"/></p><p style="text-align: center;"><span style="font-size: 14px;">Start.bat批处理文件安装QEMU Linux虚拟机</span><br/></p><p>安装虚拟机时,同一个批处理文件将显示从远程站点下载的 PNG 文件,该文件显示虚假服务器错误作为诱饵,这意味着调查链接已损坏。</p><p style="text-align:center"><img src="https://img.4hou.com/uploads/ueditor/php/upload/image/20241105/1730794969662993.png" title="1730794828156005.png" alt="error.webp.png"/></p><p style="text-align: center;"><span style="font-size: 14px;">显示假错误的图像</span></p><p>名为“PivotBox”的定制 TinyCore Linux VM 预装了一个后门,可保护持久的 C2 通信,允许攻击者在后台进行操作。</p><p>由于 QEMU 是一个经过数字签名的合法工具,因此 Windows 不会对其运行发出任何警报,并且安全工具无法检查虚拟机内运行的恶意程序。</p><p style="text-align:center"><img src="https://img.4hou.com/uploads/ueditor/php/upload/image/20241105/1730794970994079.png" title="1730794875323638.png" alt="lnk-contents.webp.png"/></p><p style="text-align: center;"><span style="font-size: 14px;">LNK 文件内容</span><br/></p><p><span style="font-size: 20px;"><strong>后门操作</strong></span></p><p>后门的核心是一个名为 Chisel 的工具,这是一个网络隧道程序,经过预先配置,可通过 WebSockets 与特定命令和控制 (C2) 服务器创建安全通信通道。 </p><p>Chisel 通过 HTTP 和 SSH 传输数据,允许攻击者与受感染主机上的后门进行通信,即使防火墙保护网络也是如此。</p><p>为了持久性,QEMU 环境设置为在主机通过“bootlocal.sh”修改重新引导后自动启动。同时,会生成并上传 SSH 密钥,以避免重新进行身份验证。 </p><p>Securonix 突出显示了两个命令,即“get-host-shell”和“get-host-user”。第一个在主机上生成一个交互式 shell,允许执行命令,而第二个用于确定权限。</p><p>然后可以执行的命令包括监视、网络和有效负载管理操作、文件管理和数据泄露操作,因此攻击者拥有一组多功能的命令,使他们能够适应目标并执行破坏性操作。</p><p style="text-align:center"><img src="https://img.4hou.com/uploads/ueditor/php/upload/image/20241105/1730794971140620.png" title="1730794943174407.png" alt="ash.webp.png"/></p><p style="text-align: center;"><span style="font-size: 14px;">恶意分子的命令历史记录</span></p><p><span style="font-size: 20px;"><strong>防御 QEMU 滥用</strong></span></p><p>CRON#TRAP 活动并不是黑客第一次滥用 QEMU 与其 C2 服务器建立秘密通信。</p><p>2024 年 3 月,卡巴斯基报告了另一<E58FA6>
|
|||
|
pubDate: 2024-12-02 14:44:41
|
|||
|
author: 胡金鱼
|
|||
|
|
|||
|
id: 472
|
|||
|
title: 梆梆API安全平台 横向端到端 纵向全渠道
|
|||
|
link: https://www.4hou.com/posts/om8A
|
|||
|
description: <p style="text-align: center;"><img src="https://img.4hou.com/uploads/ueditor/php/upload/image/20241202/1733121775471210.jpg" title="1733121775471210.jpg" alt="微信图片_20241202143941.jpg"/></p>
|
|||
|
pubDate: 2024-12-02 14:43:57
|
|||
|
author: 梆梆安全
|
|||
|
|
|||
|
id: 473
|
|||
|
title: 静水深流 | 第2届BUGPWN TSCM黑盒挑战赛 • 顺利闭幕
|
|||
|
link: https://www.4hou.com/posts/l0X7
|
|||
|
description: <p style="text-align: center;"><img src="https://img.4hou.com/uploads/ueditor/php/upload/image/20241129/1732874260161066.jpg" title="1732873628937545.jpg" alt="1.jpg" width="513" height="719"/></p><p><span style="-webkit-tap-highlight-color: transparent;outline: 0px;color: rgb(255, 41, 65);">声明:</span><span style="-webkit-tap-highlight-color: transparent; outline: 0px;"><span style="-webkit-tap-highlight-color: transparent;outline: 0px;">以下内容均来自RC²反窃密实验室联合承办的正式赛事活动,活动均已向监管单位报备,一切均在合法、合规、可控下开展,仅供交流与参考</span>。</span></p><section><section><section><p style="-webkit-tap-highlight-color: transparent;outline: 0px;font-size: 15px;line-height: 1.6em;text-align: center;color: rgb(51, 51, 51);letter-spacing: 1.5px;"><strong style="-webkit-tap-highlight-color: transparent;outline: 0px;color: rgb(217, 33, 66);font-size: 17px;">01 电磁信息安全联合实验室</strong></p></section></section></section><p style="-webkit-tap-highlight-color: transparent; margin-top: 0.8em; margin-bottom: 0.8em; outline: 0px; white-space: pre-wrap; background-color: rgb(255, 255, 255); letter-spacing: 0.578px; line-height: inherit; orphans: 4; font-family: "Open Sans", "Clear Sans", "Helvetica Neue", Helvetica, Arial, sans-serif;"><strong style="-webkit-tap-highlight-color: transparent;outline: 0px;">RC²</strong>与深圳信通院成立的「<span style="-webkit-tap-highlight-color: transparent;outline: 0px;color: rgb(0, 82, 255);"><strong style="-webkit-tap-highlight-color: transparent;outline: 0px;">电磁信息安全联合实验室</strong></span>」,<span style="-webkit-tap-highlight-color: transparent;outline: 0px;letter-spacing: 0.578px;">隶属于</span><span style="-webkit-tap-highlight-color: transparent;outline: 0px;letter-spacing: 0.578px;">深圳信通院</span>电磁空间安全研究中心,<span style="-webkit-tap-highlight-color: transparent;outline: 0px;letter-spacing: 0.578px;">是目前国内最大的集电磁安全技术研究、模拟场景测试、设备专业检测、TSCM专业培训于一体的TSCM领域安全技术研究实验室。</span></p><p style="-webkit-tap-highlight-color: transparent; margin-top: 0.8em; margin-bottom: 0.8em; outline: 0px; white-space: pre-wrap; background-color: rgb(255, 255, 255); letter-spacing: 0.578px; line-height: inherit; orphans: 4; font-family: "Open Sans", "Clear Sans", "Helvetica Neue", Helvetica, Arial, sans-serif;">实验室占地<strong style="-webkit-tap-highlight-color: transparent;outline: 0px;">700</strong><strong style="-webkit-tap-highlight-color: transparent;outline: 0px;">平米</strong>,内设4个符合国际TSCM标准的专业模拟测试间、1个专业信号屏蔽室、2个设备操作间和2个专业教室等。</p><p style="-webkit-tap-highlight-color: transparent; margin-top: 0.8em; margin-bottom: 0.8em; outline: 0px; white-space: pre-wrap; background-color: rgb(255, 255, 255); letter-spacing: 0.578px; line-height: inherit; orphans: 4; font-family: "Open Sans", "Clear Sans", "Helvetica Neue", Helvetica, Arial, sans-serif; text-align: center;"><img src="https://img.4hou.com/uploads/ueditor/php/upload/image/20241129/1732874260143474.jpg" title="1732873670158111.jpg" alt="2.jpg" width="549" height="383"/></p><p style="-webkit-tap-highlight-color: transparent; margin-top: 0.8em; margin-bottom: 0.8em; outline: 0px; white-space: pre-wrap; background-color: rgb(255, 255, 255); letter-spacing: 0.578px; line-height: inherit; orphans: 4; font-family: "Open Sans", "Clear Sans", "Helvetica Neue", Helvetica, Arial, sans-serif; text-align: center;"><span style="-webkit-tap-highlight-color: transparent; outline: 0px;"><img src="https://img.4hou.com/uploads/ueditor/php/upload/image/20241129/1732874261627548.jpg" title="1732873690200471.jpg" alt="3.jpg"/></span></p><p style="-webkit-tap-highlight-color: transparent; margin-t
|
|||
|
pubDate: 2024-12-02 14:42:22
|
|||
|
author: RC2反窃密实验室
|
|||
|
|
|||
|
id: 474
|
|||
|
title: 梆梆加固“零”修改 率先完美兼容Android 16开发者预览版
|
|||
|
link: https://www.4hou.com/posts/nl7Y
|
|||
|
description: <p>Google于11月20日发布了Android 16的首个开发者预览版,<strong>梆梆安全基于移动应用预兼容加固框架技术,率先实现了“零修改”完美兼容适配Android 16首个开发者预览版</strong>。</p><p style="text-align:center"><img src="https://img.4hou.com/uploads/ueditor/php/upload/image/20241202/1733121273657153.jpg" title="1733121225193198.jpg" alt="微信图片_20241202143348.jpg"/></p><p>Google从Android 16起,改变了以往每年只发布一个大版本的节奏,以更快的迭代节奏实现新版本推送。</p><p>根据谷歌官方发布的时间表,预计Android 16将会在2025年Q2发布正式版本。</p><p style="text-align:center"><img src="https://img.4hou.com/uploads/ueditor/php/upload/image/20241202/1733121288408415.png" title="1733121288408415.png" alt="微信图片_20241202143414.png"/></p><p><strong>·</strong>2024年Q4发布Android 16开发者预览版;</p><p><strong>·</strong>2025年Q1发布Android 16公开测试版;</p><p><strong>·</strong>2025年Q2发布Android 16稳定版和正式版。</p><p><strong style="font-size: 20px;">梆梆安全移动应用预兼容加固框架</strong><br/></p><p>梆梆安全作为移动应用加固技术领跑者,始终坚持以客户为中心,以技术为导向,<strong>基于多年移动应用安全技术的积累,建立了高效的Android系统预兼容、自适应的安全加固框架技术</strong>,可以第一时间完成对Android系统新版本的兼容适配支持,做好客户安全服务的基础保障工作。</p><p>目前,<strong>梆梆安全与Google、OPPO、VIVO、小米、荣耀、三星等手机厂商建立了全面的技术合作伙伴关系</strong>,共同开展Android系统、手机硬件、加固技术的多方协同验证,确保应用加固技术的兼容性、稳定性和安全性。</p>
|
|||
|
pubDate: 2024-12-02 14:38:22
|
|||
|
author: 梆梆安全
|
|||
|
|
|||
|
id: 475
|
|||
|
title: 梆梆安全发布《2024年Q3移动应用安全风险报告》,全国66.12% Android APP涉及隐私违规现象
|
|||
|
link: https://www.4hou.com/posts/mk8E
|
|||
|
description: <p style="text-align:center"><img src="https://img.4hou.com/uploads/ueditor/php/upload/image/20241202/1733120342203421.jpg" title="1733120342203421.jpg" alt="微信图片_20241202141906.jpg"/></p><p>梆梆安全出品的《2024年Q3移动应用安全风险报告》来了!以梆梆安全移动应用监管平台2024年Q3监测、分析的移动应用安全态势为基础,为大家重点和深度分析国内移动应用攻击技术及安全趋势发展,为移动应用安全建设工作提供有效建议和参考。</p><p><span style="font-size: 20px;"><strong>01 全国移动应用概况</strong></span></p><p>梆梆安全移动应用监管平台对国内外1000+活跃应用市场实时监测的数据显示,2024年7月1日至2024年9月30日新发布的应用中,<strong>归属全国的Android应用总量为203,224款,涉及开发者总量62,156家</strong>。</p><p>从Q3新发布的APP分布区域来看,<strong>广东省APP数量位居第一,约占全国APP总量的20.02%</strong>,位居第二、第三的区域分别是北京市和上海市,对应归属的APP数量是34,301、19,843个。具体分布如图1所示:</p><section><p style="text-align:center"><img src="https://img.4hou.com/uploads/ueditor/php/upload/image/20241202/1733120243671402.png" title="1733119879189727.png" alt="微信图片_20241202141114.png"/></p><p style="text-align: center;"><span style="font-size: 14px;">图1 全国APP区域分布TOP10</span></p></section><p>从APP的功能和用途类型来看,<strong>实用工具类</strong>APP数量稳居首位,占全国APP总量的 19.92% ;<strong>教育学习类</strong>APP位居第二,占全国APP总量的13.78%;<strong>商务办公类</strong>APP排名第三,占全国 APP总量的9.44%。各类型APP占比情况如图2所示:</p><p style="text-align:center"><img src="https://img.4hou.com/uploads/ueditor/php/upload/image/20241202/1733120244190679.png" title="1733119938133995.png" alt="微信图片_20241202141147.png"/></p><p style="text-align: center;"><span style="font-size: 14px;">图2 全国APP类型分布TOP10</span></p><p><span style="font-size: 20px;"><strong>02 全国移动应用安全分析概况</strong></span></p><p>梆梆安全移动应用监管平台通过调用不同类型的自动化检测引擎,对全国Android应用进行抽样检测,风险应用从<strong>盗版(仿冒)、境外数据传输、高危漏洞、个人隐私违规</strong>4个维度综合统计,风险应用数量如图3所示:</p><p style="text-align:center"><img src="https://img.4hou.com/uploads/ueditor/php/upload/image/20241202/1733120246868115.png" title="1733119987200517.png" alt="微信图片_20241202141300.png"/></p><section><p style="text-align: center;"><span style="font-size: 14px;">图3 风险应用数量统计</span></p><p><strong><span style="font-size: 18px;">01 漏洞风险分析</span></strong></p><p>从全国Android APP中随机抽取98,945款进行漏洞检测,发现存在漏洞威胁的APP为75,513个,<strong>即76.32%以上的APP存在中高危漏洞风险</strong>。在75,513款APP漏洞中,高危漏洞占比74.26%,中危漏洞占比96.74%(同一APP可能存在多个等级漏洞)。</p><p><strong>对不同类型的漏洞进行统计,大部分漏洞可以通过应用加固方案解决</strong>。应用漏洞数量排名前三的类型分别为JAVA代码反编译风险、HTTPS未校验主机名漏洞,及动态注册Receiver风险。</p><p>从APP类型来看,<strong>实用工具类</strong>APP存在的漏洞风险最多,占漏洞APP总量的20.08%;其次为<strong>教育学习类</strong>APP,占比11.42%;<strong>商务办公类</strong>APP位居第三,占比9.17%。漏洞数量排名前10的APP类型如图4所示:</p></section><p style="text-align:center"><img src="https://img.4hou.com/uploads/ueditor/php/upload/image/20241202/1733120246133947.png" title="1733120023127243.png" alt="微信图片_20241202141339.png"/></p><p style="text-align: center;"><span style="font-size: 14px;">图4 存在漏洞
|
|||
|
pubDate: 2024-12-02 14:31:48
|
|||
|
author: 梆梆安全
|
|||
|
|
|||
|
id: 476
|
|||
|
title: 实力认证!Coremail CACTER入选中国信通院“铸基计划”全景图和解决方案集
|
|||
|
link: https://www.4hou.com/posts/jB5Y
|
|||
|
description: <section><section><section><section><p>近期,由中国互联网协会中小企业发展工作委员会主办的“2024大模型数字生态发展大会暨铸基计划年中会议”在北京成功召开。大会邀请了通信、金融、证券、汽车、制造、能源、交通等行业超800家企业共计1000余名企业代表,共同探讨行业数字化转型场景开放及行业共性需求,聚焦数字化转型高质量发展。</p></section></section></section><section><section><section><p>会上正式发布了《高质量数字化转型产品及服务全景图(2024上半年度)》(以下简称“全景图”)和《高质量数字化转型技术解决方案集(2024上半年度)》(以下简称“解决方案集”)。<strong>Coremail XT安全增强电子邮件系统V6.0、CACTER邮件安全网关系统和CACTER邮件数据防泄露系统均入选了全景图和解决方案集</strong>。</p></section></section></section><section><section><section><section><section><p style="text-align:center"><img src="https://img.4hou.com/uploads/ueditor/php/upload/image/20241128/1732776144104543.jpg" title="1732776144104543.jpg"/></p><p style="text-align:center"><img src="https://img.4hou.com/uploads/ueditor/php/upload/image/20241128/1732776144147003.jpg" title="1732776144147003.jpg"/></p><p style="text-align:center"><img src="https://img.4hou.com/uploads/ueditor/php/upload/image/20241128/1732776144511720.jpg" title="1732776144511720.jpg"/></p><p style="text-align:center"><img src="https://img.4hou.com/uploads/ueditor/php/upload/image/20241128/1732776144510795.jpg" title="1732776144510795.jpg"/></p><p style="text-align:center"><img src="https://img.4hou.com/uploads/ueditor/php/upload/image/20241128/1732776145383081.jpg" title="1732776145383081.jpg"/></p><p style="text-align:center"><img src="https://img.4hou.com/uploads/ueditor/php/upload/image/20241128/1732776144778490.jpg" title="1732776144778490.jpg"/></p><p>在2024年,铸基计划深入数字化转型需求侧企业内部进行调研发现,传统企业已经着手制定数字化转型的战略及计划,但仍存在着对数字化转型认知不全面、策略不明确、执行不到位、效果不明显等诸多问题。市场上数字化转型产品细分领域众多,产品种类繁杂,需求方难以全面广泛了解其产品及服务能力。<br/></p></section></section></section></section></section><section><p>为更好的解决上述问题,中国信通院启动了《高质量数字化转型产品及服务全景图》编制工作,收集并筛选了800家企业的申报,最终选出400余家企业的产品,覆盖26个领域,汇总成为2024年上半年度“全景图”。</p></section><p>同时,中国信通院“铸基计划” 还发起了高质量数字化转型技术解决方案征集活动,评选出若干数字化转型领域典型技术创新案例,<strong>旨在树立行业标杆、扩大产业影响,促进数字化转型技术创新、应用和服务的示范推广,全面推动国内数字化转型的创新发展</strong>。</p><section><p>Coremail XT安全增强电子邮件系统V6.0、CACTER邮件安全网关和CACTER邮件数据防泄露系统EDLP均入选了此次全景图和解决方案集,<strong>再次印证了我司在邮件产品和邮件安全产品领域的行业权威认可</strong>。</p></section><p>展望未来,Coremail将持续坚持自主创新,深化邮件技术研究,提供更可靠、好用的邮件产品,助力企业数字化升级转型。CACTER也将继续深耕邮件安全领域,优化产品品质、提高服务水平,致力于提供一站式邮件安全解决方案,推动邮件安全行业的数字化发展。</p></section>
|
|||
|
pubDate: 2024-11-29 17:55:12
|
|||
|
author: Coremail邮件安全
|
|||
|
|
|||
|
id: 477
|
|||
|
title: CACTER云商城:全球用户的邮件安全产品一站式购物平台
|
|||
|
link: https://www.4hou.com/posts/kgBr
|
|||
|
description: <section><section><section><section><section><section><section><section><section><section><section><section><section><section><section><section><p><span style="font-size: 20px;"><strong>CACTER云商城</strong></span></p></section></section></section></section></section></section></section></section></section></section></section></section></section></section><section><section><section></section></section></section></section><section><section><section><p>CACTER云商城是CACATER官方线上商城(链接:mall.cacter.com),作为一个<strong>面向全球用户的全新在线平台</strong>,CACTER云商城涵盖应用软硬件、服务以及Webrisk API等多种的高性能邮件安全产品。在这里,您可以轻松掌握最新邮件安全商品动态、了解商城的优惠活动等,享受一站式的购物便利。</p></section></section></section><section><section><p style="text-align:center"><img src="https://img.4hou.com/uploads/ueditor/php/upload/image/20241129/1732871733458598.jpg" title="1732871733458598.jpg" alt="CACTER云商城_副本.jpg"/></p><p><strong><span style="font-size: 18px;">CACTER云商城优势</span></strong><br/></p></section></section><section><section><section><section><section><section><section><section><p>1、便捷体验:在线轻松选购,快速响应需求。自助查询价格、下单交易、申请试用、在线议价,一切尽在掌握。</p></section></section></section></section><section><section><section><section><p>2、价格优惠:即日起至2024年12月31日,通过CACTER云商城<strong>成功续费云网关、安全海外中继且当季度付款70%以上,即可享受1年95折,2年9折优惠</strong>。</p></section></section></section></section><section><section><section><section><p>3、专业护航:专业服务团队在线解答,为您提供及时的在线支持和解决方案。</p></section></section></section></section></section></section></section></section><p><strong><span style="font-size: 18px;">CACTER云商城——邮件安全产品</span></strong><br/></p><section><section><section><section></section></section></section></section><section><section><section><p><strong>CACTER邮件安全网关(本地网关/云网关)</strong></p></section></section><section><section><section></section></section></section></section><p>CACTER邮件安全网关基于自主研发的神经网络平台NERVE2.0深度学习能力,全面检测并拦截各类恶意邮件,包括垃圾邮件、钓鱼邮件、病毒邮件及BEC诈骗邮件;反垃圾准确率高达99.8%,误判率低于0.02%。CACTER邮件安全网关支持软件/硬件/云部署,支持X86/信创环境。</p><p><strong>CACTER Email Webrisk API</strong></p><section><section><section><section></section></section></section></section><p>CACTER Email Webrisk API集成了Coremail邮件安全大数据中心的能力,具备恶意URL检测功能,通过多种方式采集钓鱼样本,并利用大模型的文本意图理解能力和多模态算法,准确判断邮件链接是否为钓鱼链接。此外,Webrisk API还集成风险IP情报库,具备爆破攻击IP检测功能,可对邮件服务器登录失败的IP进行风险查询,并对返回高风险的IP进行封锁,阻断恶意攻击流量,降低服务器被攻击风险。</p><p><strong>安全管理中心SMC2</strong></p><section><section><section><section></section></section></section></section><p>安全管理中心SMC2支持监测失陷账号、网络攻击、主机威胁,拥有邮件审计、用户行为审计、用户威胁行为分析等能力,并提供账号锁定、IP加黑、邮件召回、告警等处置手段,简化管理,助力邮件系统安全运营。安全管理中心SMC2提供持独立部署,支持支持X86/信创环境。</p><p><strong>CACTER邮件数据防泄露系统(软/硬件)</strong></p><section><section><section><section></section></section></section></section><p>邮件数据防泄露系统EDLP基于深度内容识别技术,根据不同安全级别采用不同算法和策略,<E795A5>
|
|||
|
pubDate: 2024-11-29 17:51:08
|
|||
|
author: Coremail邮件安全
|
|||
|
|
|||
|
id: 478
|
|||
|
title: MITRE 分享 2024 年最危险的 25 个软件弱点
|
|||
|
link: https://www.4hou.com/posts/XPn8
|
|||
|
description: <p>MITRE 分享了今年最常见和最危险的 25 个软件弱点列表,其中包含 2023 年 6 月至 2024 年 6 月期间披露的 31,000 多个漏洞。</p><p>软件弱点是指在软件代码、架构、实现、或设计时,攻击者可以利用它们来破坏运行易受攻击软件的系统,从而获得对受影响设备的控制权并访问敏感数据或触发拒绝服务攻击。</p><p>MITRE 表示:“这些漏洞通常很容易发现和利用,但可能会导致可利用的漏洞,使对手能够完全接管系统、窃取数据或阻止应用程序运行。” </p><p>揭示这些漏洞的根本原因可以为投资、政策和实践提供强有力的指导,以从一开始就防止这些漏洞的发生,从而使行业和政府利益相关者受益。</p><p>为了创建今年的排名,MITRE 在分析了 31,770 个 CVE 记录中的漏洞后,根据其严重性和频率对每个漏洞进行了评分,这些漏洞“将受益于重新映射分析”并在 2023 年和 2024 年报告,重点关注添加到 CISA 已知漏洞的安全漏洞被利用的 KEV 目录。</p><p>这份年度清单确定了攻击者经常利用的最关键的软件漏洞来危害系统、窃取敏感数据或破坏基本服务,<span style="text-wrap: wrap;"> CISA </span>强烈鼓励企业审查此列表并使用它来告知其软件安全策略。优先考虑开发和采购流程中的这些弱点有助于防止软件生命周期核心的漏洞。</p><p style="text-align:center"><img src="https://img.4hou.com/uploads/ueditor/php/upload/image/20241125/1732519812138340.png" title="1732519695149134.png" alt="图片1.png"/></p><p style="text-align:center"><img src="https://img.4hou.com/uploads/ueditor/php/upload/image/20241125/1732519813351179.png" title="1732519708175044.png" alt="图片2.png"/></p><p>CISA 还定期发布“设计安全”提醒,重点显示广为人知且已记录的漏洞,尽管有可用且有效的缓解措施,但这些漏洞尚未从软件中消除,其中一些是为了应对持续的恶意活动而发布的。</p><p>5 月和 3 月,网络安全机构又发布了两个“设计安全”提醒,敦促技术高管和软件开发人员防止其产品和代码中的路径遍历和 SQL 注入 (SQLi) 漏洞。</p><p>上周,FBI、NSA 和网络安全机构发布了去年 15 个经常被利用的安全漏洞清单,表示攻击者主要针对零日漏洞(已披露但尚未修补的安全漏洞) )。</p><p>到 2023 年,大多数最常被利用的漏洞最初都被作为零日漏洞利用,这比 2022 年有所增加,当时只有不到一半的最常被利用的漏洞被作为零日漏洞利用。</p>
|
|||
|
pubDate: 2024-11-29 12:00:00
|
|||
|
author: 胡金鱼
|
|||
|
|
|||
|
id: 479
|
|||
|
title: 专访盛邦安全副总裁袁先登:数据要素政策密集落地带来市场机遇,后续投入更多研发资源到数据技术方向
|
|||
|
link: https://www.4hou.com/posts/9jp4
|
|||
|
description: <section><p style="text-align: center;"><img src="https://img.4hou.com/uploads/ueditor/php/upload/image/20241022/1729582803720893.png"/></p></section><p></p><section><p style="box-sizing: border-box; margin-top: 0px; margin-bottom: 0px; padding: 0px;"> </p><p style="box-sizing: border-box; margin-top: 0px; margin-bottom: 0px; padding: 0px;">数据要素政策密集落地,我国公共数据资源开发利用将提速。近日,中共中央办公厅、国务院办公厅印发的《关于加快公共数据资源开发利用的意见》(以下简称《意见》)10月9日正式对外发布,其中提出到2025年,公共数据资源开发利用制度规则初步建立,培育一批数据要素型企业。</p><p style="box-sizing: border-box; margin-top: 0px; margin-bottom: 0px; padding: 0px;"> </p><p style="box-sizing: border-box; margin-top: 0px; margin-bottom: 0px; padding: 0px;">与此同时,《国家数据标准体系建设指南》《公共数据资源授权运营实施规范(试行)》等多个数据要素相关文件也于近期密集发布。当数据成为与土地、劳动力、资本、技术相提并论的第五大生产要素,将形成巨大市场空间。</p><p style="box-sizing: border-box; margin-top: 0px; margin-bottom: 0px; padding: 0px;"> </p><p style="box-sizing: border-box; margin-top: 0px; margin-bottom: 0px; padding: 0px;">那么数据要素企业如何看待相关政策对行业或公司带来的影响?财联社记者近日专访盛邦安全(688651.SH)副总裁、董秘袁先登。</p><p style="box-sizing: border-box; margin-top: 0px; margin-bottom: 0px; padding: 0px;"> </p><p style="box-sizing: border-box; margin-top: 0px; margin-bottom: 0px; padding: 0px;"><strong style="box-sizing: border-box; margin: 0px; padding: 0px;">以下为访谈实录:</strong></p><p style="box-sizing: border-box; margin-top: 0px; margin-bottom: 0px; padding: 0px;"> </p><p style="box-sizing: border-box; margin-top: 0px; margin-bottom: 0px; padding: 0px;"><strong style="box-sizing: border-box; margin: 0px; padding: 0px;">财联社:《意见》提出在市场需求大、数据资源多的行业和领域,拓展应用场景,鼓励经营主体利用公共数据资源开发产品、提供服务。在场景应用方面我们有哪些做的比较好的案例可以分享吗?</strong></p><p style="box-sizing: border-box; margin-top: 0px; margin-bottom: 0px; padding: 0px;"> </p><p style="box-sizing: border-box; margin-top: 0px; margin-bottom: 0px; padding: 0px;"><strong style="box-sizing: border-box; margin: 0px; padding: 0px;">袁先登:</strong>首先,在数据资源方向,安全行业需要数据库和引擎来支撑其工作。当识别一个资产是否有漏洞时,要将其与背后的漏洞库做对比,分析是否与漏洞库特征相一致,以此来判断该资产是否有漏洞。比如在做安全防护时,可以通过与防护规则库作对比来判断是否是攻击行为。</p><p style="box-sizing: border-box; margin-top: 0px; margin-bottom: 0px; padding: 0px;"> </p><p style="box-sizing: border-box; margin-top: 0px; margin-bottom: 0px; padding: 0px;">在这方面,我们有漏洞库、防护规则库、网络资产特征库、网络资产数据库。举例来说,网络资产特征库可以通过分析设备的突出特征及与网络资产特征库的对比来识别设备。这四个库就是我们的数据资源,目前盛邦的一部分收入来源于数据类产品与服务,我们每年都会收取产品订阅升级费用,用户缴费后,就可享受最新升级的数据库,这是目前数据变现的一个案例。</p><p style="box-sizing: border-box; margin-top: 0px; margin-bottom: 0px; padding: 0px;"> </p><p style="box-sizing: border-box; margin-top: 0px; margin-bottom: 0px; padding: 0px;">其次,盛邦安全帮助客户建立数据资产体系从而让它产生价值。比如我们有IP威胁管控设备,IP行为记录就是数据要素,我们的设备可以帮助客户连接到数据要素,让他<E8AEA9>
|
|||
|
pubDate: 2024-11-28 13:31:39
|
|||
|
author: 盛邦安全
|
|||
|
|
|||
|
id: 480
|
|||
|
title: 盛邦安全推出面向短信业务平台的API安全治理方案
|
|||
|
link: https://www.4hou.com/posts/OGJG
|
|||
|
description: <section><p style="box-sizing: border-box; margin-top: 0px; margin-bottom: 0px; padding: 0px;"><em style="box-sizing: border-box; margin: 0px; padding: 0px;">近日,一则安全事件刷爆了朋友圈:10月12日,多名网友反映收到了来自“某省教育厅”的短信,短信内容中带有黄色网站非法链接。经查,这些短信并非某省教育厅发送,而是不法分子入侵了短信平台后,以教育厅的名义发送的。该事件引发了广泛的社会关注和担忧。</em></p></section><p></p><section><p style="box-sizing: border-box; margin-top: 0px; margin-bottom: 0px; padding: 0px;"> </p></section><section><section><section><p style="box-sizing: border-box; margin-top: 0px; margin-bottom: 0px; padding: 0px;"><strong style="box-sizing: border-box; margin: 0px; padding: 0px;">✦ </strong><strong style="box-sizing: border-box; margin: 0px; padding: 0px;">事件分析</strong></p></section></section><section><section></section><section><section></section></section></section><section></section></section><section><p style="box-sizing: border-box; margin-top: 0px; margin-bottom: 0px; padding: 0px;"> </p></section><section><p style="box-sizing: border-box; margin-top: 0px; margin-bottom: 0px; padding: 0px;">短信平台群发短信通常需要和短信服务平台公司合作通过API接口实现。短信平台API接口是一种用于实现短信发送和接收功能的编程接口,它允许合作的短信服务平台公司将自己的应用程序与短信平台的功能进行集成,可以方便地调用短信平台提供的各种功能,如短信发送、状态查询等。</p><p style="box-sizing: border-box; margin-top: 0px; margin-bottom: 0px; padding: 0px;"> </p><p style="box-sizing: border-box; margin-top: 0px; margin-bottom: 0px; padding: 0px;">在某省教育厅短信平台被入侵事件中,暴露了短信平台在安全防护机制、身份认证和监控预警等存在缺陷。不法分子可能通过API接口发送了包含非法链接的短信,包含但不限于通过<strong style="box-sizing: border-box; margin: 0px; padding: 0px;">弱口令、身份认证信息的窃取或伪造、系统漏洞的利用、失效的API接口验证以及不当的权限管理</strong>等来实现诈骗和信息传播,试图诱骗用户点击并泄露个人信息。可见,<strong style="box-sizing: border-box; margin: 0px; padding: 0px;">加强API接口的安全防护刻不容缓。</strong></p><section><section><section><p style="box-sizing: border-box; margin-top: 0px; margin-bottom: 0px; padding: 0px;"> </p><p style="box-sizing: border-box; margin-top: 0px; margin-bottom: 0px; padding: 0px;"><img src="https://img.4hou.com/uploads/ueditor/php/upload/image/20241029/1730168564472607.png"/></p><p style="box-sizing: border-box; margin-top: 0px; margin-bottom: 0px; padding: 0px;"><strong style="box-sizing: border-box; margin: 0px; padding: 0px;">✦ </strong><strong style="box-sizing: border-box; margin: 0px; padding: 0px;">防护建议</strong></p><p style="box-sizing: border-box; margin-top: 0px; margin-bottom: 0px; padding: 0px;"> </p></section></section><section><section></section></section></section><section><p style="box-sizing: border-box; margin-top: 0px; margin-bottom: 0px; padding: 0px;">针对此类事件,<strong style="box-sizing: border-box; margin: 0px; padding: 0px;">盛邦安全推出面向短信业务平台的API安全治理方案</strong><strong style="box-sizing: border-box; margin: 0px; padding: 0px;">,</strong>结合API安全当前面临的典型问题,覆盖<strong style="box-sizing: border-box; margin: 0px; padding: 0px;">API学习、API画像、攻击防护、权限保护、API审计和应急响应</strong>等各个阶段,以业务风险识别与防护控制为核心目标,通过对业务流量的识别分析来梳理API接口,在此基础上通过数据建模、行为建模和算法分析等技术,实现<strong style="box-sizing: border-box; margin: 0px; padding: 0px;">API接口识别与梳理、
|
|||
|
pubDate: 2024-11-28 13:30:48
|
|||
|
author: 盛邦安全
|
|||
|
|
|||
|
name: articles
|
|||
|
seq: 480
|
|||
|
|
|||
|
id: 361
|
|||
|
title: 开放银行中的 API 安全:平衡创新与风险管理
|
|||
|
guid: https://www.anquanke.com/post/id/302508
|
|||
|
source: hackread
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-06 16:51:03
|
|||
|
author: 安全客
|
|||
|
|
|||
|
id: 362
|
|||
|
title: 非洲执法部门抓获1,000多名网络犯罪嫌疑人
|
|||
|
guid: https://www.anquanke.com/post/id/302505
|
|||
|
source: darkreading
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-06 16:50:19
|
|||
|
author: 安全客
|
|||
|
|
|||
|
id: 363
|
|||
|
title: NCA的破坏行动:瓦解全球洗钱网络
|
|||
|
guid: https://www.anquanke.com/post/id/302502
|
|||
|
source: securityonline
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-06 16:49:32
|
|||
|
author: 安全客
|
|||
|
|
|||
|
id: 364
|
|||
|
title: FBI 警告犯罪分子利用生成式人工智能进行欺诈活动
|
|||
|
guid: https://www.anquanke.com/post/id/302499
|
|||
|
source: securityonline
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-06 16:48:36
|
|||
|
author: 安全客
|
|||
|
|
|||
|
id: 365
|
|||
|
title: 印度尼西亚富士电机遭受勒索软件攻击: 业务合作伙伴数据可能泄露
|
|||
|
guid: https://www.anquanke.com/post/id/302465
|
|||
|
source: securityonline
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-06 15:41:27
|
|||
|
author: 安全客
|
|||
|
|
|||
|
id: 366
|
|||
|
title: Lorex 2K安全摄像头的五个缺陷使黑客能够完全控制,警告发布
|
|||
|
guid: https://www.anquanke.com/post/id/302496
|
|||
|
source: securityonline
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-06 15:17:22
|
|||
|
author: 安全客
|
|||
|
|
|||
|
id: 367
|
|||
|
title: Veeam 备份与复制漏洞曝光: 高严重性漏洞使数据面临风险
|
|||
|
guid: https://www.anquanke.com/post/id/302459
|
|||
|
source: securityonline
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-06 15:16:35
|
|||
|
author: 安全客
|
|||
|
|
|||
|
id: 368
|
|||
|
title: 360数字安全集团携手上海东海职业技术学院,共育实战型网络安全人才队伍
|
|||
|
guid: https://www.anquanke.com/post/id/302511
|
|||
|
source: 微信
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-06 15:16:11
|
|||
|
author: 安全客
|
|||
|
|
|||
|
id: 369
|
|||
|
title: 网络钓鱼狂潮:Cloudflare 域在最新攻击中被利用
|
|||
|
guid: https://www.anquanke.com/post/id/302493
|
|||
|
source: securityonline
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-05 16:14:12
|
|||
|
author: 安全客
|
|||
|
|
|||
|
id: 370
|
|||
|
title: 可用的漏洞利用代码:在 WhatsUp Gold 中发现严重缺陷 - CVE-2024-8785 (CVSS 9.8)
|
|||
|
guid: https://www.anquanke.com/post/id/302490
|
|||
|
source: securityonline
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-05 16:06:53
|
|||
|
author: 安全客
|
|||
|
|
|||
|
id: 371
|
|||
|
title: 最高级!360获评NVDB通用网络产品安全漏洞专业库“三星级技术支撑单位”称号
|
|||
|
guid: https://www.anquanke.com/post/id/302485
|
|||
|
source: 微信
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-05 15:51:37
|
|||
|
author: 安全客
|
|||
|
|
|||
|
id: 372
|
|||
|
title: Crypto.com 与 HackerOne 一起推出 200 万美元的漏洞赏金计划
|
|||
|
guid: https://www.anquanke.com/post/id/302482
|
|||
|
source: securityonline
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-05 15:44:08
|
|||
|
author: 安全客
|
|||
|
|
|||
|
id: 373
|
|||
|
title: FSB 黑客攻破巴基斯坦的 APT 风暴-0156
|
|||
|
guid: https://www.anquanke.com/post/id/302479
|
|||
|
source: darkreading
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-05 15:31:48
|
|||
|
author: 安全客
|
|||
|
|
|||
|
id: 374
|
|||
|
title: Veeam 解决了关键的服务提供商控制台 (VSPC) 错误
|
|||
|
guid: https://www.anquanke.com/post/id/302476
|
|||
|
source: securityaffairs
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-05 15:20:49
|
|||
|
author: 安全客
|
|||
|
|
|||
|
id: 375
|
|||
|
title: 软件供应链攻击导致 Solana 的 web3.js 库在 npm 注册表上出现恶意版本
|
|||
|
guid: https://www.anquanke.com/post/id/302473
|
|||
|
source: helpnetsecurity
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-05 15:11:15
|
|||
|
author: 安全客
|
|||
|
|
|||
|
id: 376
|
|||
|
title: CVE-2024-51378 (CVSS 10):CISA 警告称,严重 Cyber Panel 缺陷受到主动攻击
|
|||
|
guid: https://www.anquanke.com/post/id/302468
|
|||
|
source: securityonline
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-05 15:03:45
|
|||
|
author: 安全客
|
|||
|
|
|||
|
id: 377
|
|||
|
title: CVE-2024-10905 (CVSS 10): SailPoint IdentityIQ 中的严重漏洞会暴露敏感数据
|
|||
|
guid: https://www.anquanke.com/post/id/302462
|
|||
|
source: securityonline
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-05 14:37:48
|
|||
|
author: 安全客
|
|||
|
|
|||
|
id: 378
|
|||
|
title: 当心 Celestial Stealer:新的 MaaS 针对浏览器和加密钱包
|
|||
|
guid: https://www.anquanke.com/post/id/302456
|
|||
|
source: securityonline
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-05 11:24:53
|
|||
|
author: 安全客
|
|||
|
|
|||
|
id: 379
|
|||
|
title: Akira v2 出现: 基于 Rust 的勒索软件提高了风险
|
|||
|
guid: https://www.anquanke.com/post/id/302453
|
|||
|
source: securityonline
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-05 11:12:32
|
|||
|
author: 安全客
|
|||
|
|
|||
|
id: 380
|
|||
|
title: 新的 Andromeda/Gamarue 命令和控制集群以亚太地区为目标
|
|||
|
guid: https://www.anquanke.com/post/id/302450
|
|||
|
source: securityonline
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-05 11:02:51
|
|||
|
author: 安全客
|
|||
|
|
|||
|
name: articles
|
|||
|
seq: 380
|
|||
|
|
|||
|
id: 2401
|
|||
|
title: Windows 7 至 Windows 11 中存在新的 0 Day NTLM 哈希泄露漏洞
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzkxNDM4OTM3OQ==&mid=2247504999&idx=3&sn=860de968b5da5269ea0ec755cd3e8392
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-07 18:02:01
|
|||
|
author: 网络研究观
|
|||
|
|
|||
|
id: 2402
|
|||
|
title: WEB前端逆向拦截页面跳转
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzUzMjQyMDE3Ng==&mid=2247487787&idx=1&sn=c9f78157d67619339c84a9681a33dbba
|
|||
|
description: 从网上求助学来的知识,都会写清楚原作者
|
|||
|
pubDate: 2024-12-07 17:24:27
|
|||
|
author: 青衣十三楼飞花堂
|
|||
|
|
|||
|
id: 2403
|
|||
|
title: 攻防|记一次溯源真实案例
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzkxMzMyNzMyMA==&mid=2247568203&idx=1&sn=2fdb04a880e088fc0b8f232f5adfd9f4
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-07 17:00:24
|
|||
|
author: 马哥网络安全
|
|||
|
|
|||
|
id: 2404
|
|||
|
title: TCP连接,是否是新开端口号和客户端进行交互?
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzIxNTM3NDE2Nw==&mid=2247490258&idx=1&sn=db89cb9898e851c734a0830cf1f677fd
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-07 16:51:29
|
|||
|
author: 车小胖谈网络
|
|||
|
|
|||
|
id: 2405
|
|||
|
title: Spring Properties 远程代码执行
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzAxODM5ODQzNQ==&mid=2247485622&idx=1&sn=c6b1a76d598054eb86efa917775f6188
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-07 15:54:26
|
|||
|
author: securitainment
|
|||
|
|
|||
|
id: 2406
|
|||
|
title: Windows 中存在严重0day,可导致用户凭据泄露
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzkzNDIzNDUxOQ==&mid=2247492906&idx=1&sn=bcccbff213bc1e74461cb25625f86307
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-07 14:15:15
|
|||
|
author: 独眼情报
|
|||
|
|
|||
|
id: 2407
|
|||
|
title: 制作一个可以绕过 Defender 的 Powershell Shellcode 下载器(无需绕过 Amsi)
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzAxMjYyMzkwOA==&mid=2247525456&idx=1&sn=1ff51ea83820483d2912dc91da0c103e
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-07 13:09:10
|
|||
|
author: Ots安全
|
|||
|
|
|||
|
id: 2408
|
|||
|
title: 新的 Windows 零日漏洞暴露 NTLM 凭据,已获得非官方补丁
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzAxMjYyMzkwOA==&mid=2247525456&idx=2&sn=36ccd1ade2da7b7093c538a25b09dc4a
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-07 13:09:10
|
|||
|
author: Ots安全
|
|||
|
|
|||
|
id: 2409
|
|||
|
title: 记一次简单的代码审计项目案例
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzkyOTUxMzk2NQ==&mid=2247485642&idx=1&sn=afcc7c4a8330cefeed2195326b87685f
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-07 12:07:52
|
|||
|
author: 安全君呀
|
|||
|
|
|||
|
id: 2410
|
|||
|
title: 记一次JAVA代码审计过程
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=Mzg2NDg2MDIxNQ==&mid=2247485194&idx=1&sn=47071e2c86a784f6eeca99def55e03ef
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-07 11:15:35
|
|||
|
author: Jie安全
|
|||
|
|
|||
|
id: 2411
|
|||
|
title: 移动安全框架 (MobSF) 存在存储型XSS漏洞 | CVE-2024-53999
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzAxMjE3ODU3MQ==&mid=2650604682&idx=3&sn=66e331213aaa69ebd6e06ba539c6cbae
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-07 10:24:59
|
|||
|
author: 黑白之道
|
|||
|
|
|||
|
id: 2412
|
|||
|
title: sqlmap被动代理小工具
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzAxMjE3ODU3MQ==&mid=2650604682&idx=4&sn=b00a4b26e07c7fbcb487eb3616ea6456
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-07 10:24:59
|
|||
|
author: 黑白之道
|
|||
|
|
|||
|
id: 2413
|
|||
|
title: 记一次JAVA代码审计过程
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzkyMjM5NDM3NQ==&mid=2247486169&idx=1&sn=06e49fd2f6cf2dbdca4eb3c550ed86cf
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-07 10:20:28
|
|||
|
author: 进击安全
|
|||
|
|
|||
|
id: 2414
|
|||
|
title: 无补丁,I-O Data路由器0Day漏洞被利用
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MjM5NjA0NjgyMA==&mid=2651309095&idx=1&sn=c6dd464702642072510bbb85c37cb402
|
|||
|
description: 补丁预计将在12月18日发布,因此在此之前用户将面临比较严重的风险。
|
|||
|
pubDate: 2024-12-07 10:04:20
|
|||
|
author: FreeBuf
|
|||
|
|
|||
|
id: 2415
|
|||
|
title: 深度解析GoldenEyeDog APT组织最新攻击技术动向
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MjM5OTk4MDE2MA==&mid=2655261379&idx=1&sn=ee9f64fe9cbad33d1a141c69151701d7
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-07 09:57:20
|
|||
|
author: 计算机与网络安全
|
|||
|
|
|||
|
id: 2416
|
|||
|
title: Mitre Att&ck框架T1036.006(文件名后面的空格)技术的简单实现
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzI0NTI4NjEwOQ==&mid=2247484920&idx=1&sn=2bada6774d9702240e6f8d840640f4dc
|
|||
|
description: Mitre Att\\x26amp;ck框架T1036.006(文件名后面的空格)技术的简单实现
|
|||
|
pubDate: 2024-12-07 09:04:06
|
|||
|
author: 新蜂网络安全实验室
|
|||
|
|
|||
|
id: 2417
|
|||
|
title: 俄黑客利用Cloudflare Tunnels和 DNS Fast-Flux 隐藏恶意软件针对乌克兰
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzI2NzAwOTg4NQ==&mid=2649793408&idx=2&sn=62e5b7cce0750160459330d1cb527daf
|
|||
|
description: 研究人员发现俄罗斯黑客组织利用Cloudflare Tunnels和 DNS Fast-Flux隐藏恶意软件的托管设施。
|
|||
|
pubDate: 2024-12-07 09:01:41
|
|||
|
author: 军哥网络安全读报
|
|||
|
|
|||
|
id: 2418
|
|||
|
title: 新的Windows 0day漏洞:攻击者几乎无需用户交互即可窃取 NTLM 凭据
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzI2NzAwOTg4NQ==&mid=2649793408&idx=3&sn=07c14519c7e26f4483bd662559941c89
|
|||
|
description: 从win7到最新的win11 24h2均存在的新0day漏洞,打开文件夹就能触发。
|
|||
|
pubDate: 2024-12-07 09:01:41
|
|||
|
author: 军哥网络安全读报
|
|||
|
|
|||
|
id: 2419
|
|||
|
title: 漏洞预警 | Zabbix SQL注入漏洞
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzkwMTQ0NDA1NQ==&mid=2247491663&idx=1&sn=13f8337d2c5b035b77d6655b19c9fc53
|
|||
|
description: Zabbix前端的CUser类中的addRelatedObjects函数未对输入数据进行充分验证和转义,导致具有API访问权限的恶意用户可以通过user.get API传递特制输入触发SQL注入攻击。
|
|||
|
pubDate: 2024-12-07 08:30:49
|
|||
|
author: 浅安安全
|
|||
|
|
|||
|
id: 2420
|
|||
|
title: 【PWN】堆溢出2.23 Off-By-One
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=Mzk0NDYwOTcxNg==&mid=2247485038&idx=1&sn=2d307c01f15498c12c5bcad97233f8ab
|
|||
|
description: 2.23堆溢出Off-By-One,unsortedbin泄露libc配置fastbin attack + realloc_hook调栈。
|
|||
|
pubDate: 2024-12-07 08:30:49
|
|||
|
author: 智佳网络安全
|
|||
|
|
|||
|
id: 2421
|
|||
|
title: 浅谈利用PDF钓鱼攻击
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzkxMzIwNTY1OA==&mid=2247509598&idx=1&sn=be74c502c8b0cd301e12048e894f9257
|
|||
|
description: 利用PDF文件,诱导用户点击文件,即可获取系统权限。
|
|||
|
pubDate: 2024-12-07 08:00:57
|
|||
|
author: kali笔记
|
|||
|
|
|||
|
id: 2422
|
|||
|
title: 云安全学习-密钥泄露与CF利用框架
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzkxNjMwNDUxNg==&mid=2247486945&idx=2&sn=beee676ac80e94387272c03affb7e5cb
|
|||
|
description: u200b首先认识下阿里云官方解释的什么是AccessKey:在调用阿里云API时您需要使用AccessKey完成身份验证。AccessKey包括AccessKey ID和AccessKey Secret,需要一起使用。
|
|||
|
pubDate: 2024-12-07 07:56:26
|
|||
|
author: 进击的HACK
|
|||
|
|
|||
|
id: 2423
|
|||
|
title: 【SDL实践指南】Foritify结构化规则定义
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=Mzg4MTU4NTc2Nw==&mid=2247493770&idx=2&sn=d76331319fa028f0f4379b0f87c23020
|
|||
|
description: 基本介绍结构分析器匹配源代码中的任意程序结构,它的设计目的不是为了发现由执行流或数据流引起的问题,相反它通过
|
|||
|
pubDate: 2024-12-07 07:00:42
|
|||
|
author: 七芒星实验室
|
|||
|
|
|||
|
id: 2424
|
|||
|
title: 实战红蓝:谈一谈NSmartProxy流量特征在实战中的表现
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=Mzg2NTk4MTE1MQ==&mid=2247486222&idx=1&sn=f1b43263c2fab0c92dd05ae1bcc4c16d
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-07 00:01:07
|
|||
|
author: TtTeam
|
|||
|
|
|||
|
id: 2425
|
|||
|
title: PC逆向 -- 用户APC执行
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzA4MzgzNTU5MA==&mid=2652037147&idx=2&sn=2980166e539b9fecaf3f664831f7a1ae
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-07 00:00:15
|
|||
|
author: 逆向有你
|
|||
|
|
|||
|
id: 2426
|
|||
|
title: 【免杀干货】杀毒软件检测详解
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzI1Mjc3NTUwMQ==&mid=2247537058&idx=1&sn=e1aa16a7450e6eb919e87021ac20192a
|
|||
|
description: 收藏学习
|
|||
|
pubDate: 2024-12-06 23:59:45
|
|||
|
author: 教父爱分享
|
|||
|
|
|||
|
id: 2427
|
|||
|
title: 【漏洞预警】SonicWall SMA100 SSL-VPN缓冲区溢出漏洞CVE-2024-45318
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzI3NzMzNzE5Ng==&mid=2247489275&idx=1&sn=31722ca4a5e3edc74c5e218e4bfedbdf
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-06 23:49:32
|
|||
|
author: 飓风网络安全
|
|||
|
|
|||
|
id: 2428
|
|||
|
title: HTB-Vintage笔记
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=Mzk0MTQxOTA3Ng==&mid=2247489250&idx=1&sn=e244c73804185afe5f0cf4752865bdbc
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-06 23:17:24
|
|||
|
author: Jiyou too beautiful
|
|||
|
|
|||
|
id: 2429
|
|||
|
title: 网安瞭望台第9期:0day 情报,OAuth 2.0授权流程学习
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=Mzg2NTkwODU3Ng==&mid=2247514008&idx=1&sn=5c670c62b4c5fa4a355f424e56645be1
|
|||
|
description: 网安资讯分享\\x0d\\x0aDAILY NEWS AND KNOWLEDGE
|
|||
|
pubDate: 2024-12-06 21:54:51
|
|||
|
author: 东方隐侠安全团队
|
|||
|
|
|||
|
id: 2430
|
|||
|
title: 从JS代码审计到GraphQL利用的管理账户接管
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzIzMTIzNTM0MA==&mid=2247496534&idx=1&sn=493cff035c6dde66c5b31d96de6f3834
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-06 21:38:57
|
|||
|
author: 迪哥讲事
|
|||
|
|
|||
|
id: 2431
|
|||
|
title: CVE-2024-42327 Zabbix SQL注入 POC
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzAwMjQ2NTQ4Mg==&mid=2247495970&idx=1&sn=ff9a5f04745abfade7cb4ca85fc55840
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-06 19:50:37
|
|||
|
author: Khan安全攻防实验室
|
|||
|
|
|||
|
id: 2432
|
|||
|
title: 【安全圈】I-O Data路由器0Day漏洞被利用,无修复补丁
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzIzMzE4NDU1OQ==&mid=2652066435&idx=3&sn=bbca90f744a9f08fd2d2e9d95bb190e2
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-06 19:00:27
|
|||
|
author: 安全圈
|
|||
|
|
|||
|
id: 2433
|
|||
|
title: 混淆 Office 宏以逃避 Defender
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzAxMjYyMzkwOA==&mid=2247525341&idx=3&sn=197b8217ce933acb3c06e016737a1e79
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-06 18:09:22
|
|||
|
author: Ots安全
|
|||
|
|
|||
|
id: 2434
|
|||
|
title: 实战!一次超简单的网站后门利用体验
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzIwMzc3NTkxMA==&mid=2247491233&idx=3&sn=cb494f72f9e49b7d0b8bc8158dbd176c
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-06 18:01:43
|
|||
|
author: 电信云堤
|
|||
|
|
|||
|
id: 2435
|
|||
|
title: 未然威胁追踪 | 深度解析GoldenEyeDog APT组织最新攻击技术动向
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzAwODU5NzYxOA==&mid=2247505657&idx=1&sn=22625bef15dad3040d367c97fb602c7e
|
|||
|
description: GoldenEyeDogAPT组织伪装常用软件诱导安装恶意程序,实现远程控制。
|
|||
|
pubDate: 2024-12-06 17:30:32
|
|||
|
author: 华为安全
|
|||
|
|
|||
|
id: 2436
|
|||
|
title: CNNVD 关于SonicWall SMA100 安全漏洞的通报
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzAxODY1OTM5OQ==&mid=2651461968&idx=1&sn=0a6663b04895b46371bd12da4468b547
|
|||
|
description: 近日,国家信息安全漏洞库(CNNVD)收到关于SonicWall SMA100 安全漏洞(CNNVD-202412-487、CVE-2024-45318)情况的报送。
|
|||
|
pubDate: 2024-12-06 17:10:06
|
|||
|
author: CNNVD安全动态
|
|||
|
|
|||
|
id: 2437
|
|||
|
title: 恶意软件分析-代码注入
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=Mzg5MDg3OTc0OA==&mid=2247488896&idx=1&sn=68a8307a5264347a644d93378ae6d367
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-06 17:09:18
|
|||
|
author: Relay学安全
|
|||
|
|
|||
|
id: 2438
|
|||
|
title: 新一代Webshell管理器
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzkxMzMyNzMyMA==&mid=2247568143&idx=2&sn=d5a6df73e38793ccfdecd67ecae32403
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-06 17:00:34
|
|||
|
author: 马哥网络安全
|
|||
|
|
|||
|
id: 2439
|
|||
|
title: SonicWall SMA100 SSLVPN 多个高危漏洞安全风险通告
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzU5NDgxODU1MQ==&mid=2247502571&idx=1&sn=c30e1d47ae1059542d59b52c7c4ddfd5
|
|||
|
description: 致力于第一时间为企业级用户提供权威漏洞情报和有效解决方案。
|
|||
|
pubDate: 2024-12-06 15:55:21
|
|||
|
author: 奇安信 CERT
|
|||
|
|
|||
|
id: 2440
|
|||
|
title: 一文学会shiro反序列化
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=Mzk0NTY5Nzc1OA==&mid=2247484171&idx=1&sn=1a340e6c0983e249883ffa49c67206d3
|
|||
|
description: shiro反序列化漏洞
|
|||
|
pubDate: 2024-12-06 15:43:51
|
|||
|
author: simple学安全
|
|||
|
|
|||
|
id: 2441
|
|||
|
title: 金眼狗APT后门处置
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MjM5ODkxMTEzOA==&mid=2247484375&idx=1&sn=1f76fc8d445edfc4387c1d3e501f79dd
|
|||
|
description: 金眼狗APT后门处置,作者:雁过留痕@深信服MSS专家部。
|
|||
|
pubDate: 2024-12-06 15:09:14
|
|||
|
author: 安服仔的救赎
|
|||
|
|
|||
|
id: 2442
|
|||
|
title: 组策略安全噩梦 第二部分
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzAxODM5ODQzNQ==&mid=2247485618&idx=2&sn=f01a6dd1559a75dd2631663c6b18d3e5
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-06 14:56:20
|
|||
|
author: securitainment
|
|||
|
|
|||
|
id: 2443
|
|||
|
title: Apache-HertzBeat开源实时监控系统存在默认口令漏洞【漏洞复现|附nuclei-POC】
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzkyOTcwOTMwMQ==&mid=2247484585&idx=1&sn=5454bc75cdf44fafbb3e5e8027140664
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-06 14:40:57
|
|||
|
author: 脚本小子
|
|||
|
|
|||
|
id: 2444
|
|||
|
title: 【免杀】单文件一键击溃windows defender进程 v1.1发布!
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=Mzg4Mzg4OTIyMA==&mid=2247485851&idx=1&sn=a1db0833cfab8195b3301d922d7b0538
|
|||
|
description: 单文件一键击溃windows defender\\x0d\\x0a使用资源文件嵌入驱动,避免直接依赖外部文件\\x0d\\x0a替换旧版本驱动文件,旧版本驱动证书已过期
|
|||
|
pubDate: 2024-12-06 13:30:33
|
|||
|
author: 威零安全实验室
|
|||
|
|
|||
|
id: 2445
|
|||
|
title: 接口测试二三事
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzUyODkwNDIyMg==&mid=2247545690&idx=1&sn=3d45ecc2dd5998e9a91906e5ceaa5e69
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-06 12:00:16
|
|||
|
author: 掌控安全EDU
|
|||
|
|
|||
|
id: 2446
|
|||
|
title: 干货|一文搞懂加密流量检测的解决方法和技术细节
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzI1OTA1MzQzNA==&mid=2651247124&idx=2&sn=8e23579cb82d06948bf7f91642d24e49
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-06 11:26:50
|
|||
|
author: e安在线
|
|||
|
|
|||
|
id: 2447
|
|||
|
title: 中国科学院信工所 | Snowflake代理请求的隐蔽性分析
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzU5MTM5MTQ2MA==&mid=2247491417&idx=1&sn=948790356cdbfb890e36824bd672ac2d
|
|||
|
description: 采用机器学习模型对Snowflake代理请求进行精准检测。
|
|||
|
pubDate: 2024-12-06 10:26:45
|
|||
|
author: 安全学术圈
|
|||
|
|
|||
|
id: 2448
|
|||
|
title: 攻防|记一次溯源真实案例
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzAxMjE3ODU3MQ==&mid=2650604658&idx=3&sn=d0065fbf3c181a1e7c9cdac026f2895a
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-06 10:03:46
|
|||
|
author: 黑白之道
|
|||
|
|
|||
|
id: 2449
|
|||
|
title: 一个绕过 EDR 的dumplsass免杀工具
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzAxMjE3ODU3MQ==&mid=2650604658&idx=4&sn=01d4146012efc924fe7b8f0d366f971a
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-06 10:03:46
|
|||
|
author: 黑白之道
|
|||
|
|
|||
|
id: 2450
|
|||
|
title: 工具集:BurpSuite-collections【burp插件合集】
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=Mzk0MjY1ODE5Mg==&mid=2247484779&idx=1&sn=7b4c268d7c7db35eaad297a0fb50dcb9
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-06 09:08:46
|
|||
|
author: 风铃Sec
|
|||
|
|
|||
|
id: 2451
|
|||
|
title: 黑客利用 MOONSHINE 漏洞和 DarkNimbus 后门攻击
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzI2NzAwOTg4NQ==&mid=2649793394&idx=2&sn=06277be44ef38c9683d24a9ef2472d1c
|
|||
|
description: 趋势科技发的新报告。
|
|||
|
pubDate: 2024-12-06 09:00:59
|
|||
|
author: 军哥网络安全读报
|
|||
|
|
|||
|
id: 2452
|
|||
|
title: Mitre_Att&ck框架T1574.001技术(劫持Dll搜索顺序)的简单实现
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzI0NTI4NjEwOQ==&mid=2247484913&idx=1&sn=38c952a43bd8d00d7d0251d15f3463c1
|
|||
|
description: Mitre_Att\\x26amp;ck框架T1574.001技术(劫持Dll搜索顺序)的简单实现
|
|||
|
pubDate: 2024-12-06 09:00:25
|
|||
|
author: 新蜂网络安全实验室
|
|||
|
|
|||
|
id: 2453
|
|||
|
title: 渗透测试人员的 Nmap:漏洞扫描
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzU1NjczNjA0Nw==&mid=2247485821&idx=1&sn=b98633172a515bdd2cbbfed5efdc3e30
|
|||
|
description: Nmap 脚本引擎 (NSE) 是 Nmap 最有效的功能之一,它允许用户准备和共享脚本,以自动执行涉及网络的众多任务。
|
|||
|
pubDate: 2024-12-06 09:00:25
|
|||
|
author: 三沐数安
|
|||
|
|
|||
|
id: 2454
|
|||
|
title: 利用伪装$Version Cookie绕过WAF防火墙
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzkxOTUyOTc0NQ==&mid=2247492726&idx=1&sn=9e6c4dc27f3599ad2ca6487f320cf05c
|
|||
|
description: 通过使用伪装的 $Version 属性,可以有效地绕过许多 Web 应用防火墙 (WAF)。此技术利用了许多 WAF 对 Cookie 标头解析的不一致性。
|
|||
|
pubDate: 2024-12-06 08:55:58
|
|||
|
author: 二进制空间安全
|
|||
|
|
|||
|
id: 2455
|
|||
|
title: Jolokia logback JNDI RCE漏洞复现
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=Mzk0MjY3MTM4Nw==&mid=2247484054&idx=1&sn=8a23efc97b5ae0c014ad74d391dd5717
|
|||
|
description: JNDI是 Java 命名与目录接口(Java Naming and Directory Interface),在J2EE规范中是重要的规范之一
|
|||
|
pubDate: 2024-12-06 08:31:47
|
|||
|
author: 浩凯信安
|
|||
|
|
|||
|
id: 2456
|
|||
|
title: 实战|记一次溯源真实案例
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzIwMzIyMjYzNA==&mid=2247517178&idx=1&sn=0970bac0e2ec58b8d9669c8556dd6001
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-06 08:04:41
|
|||
|
author: HACK之道
|
|||
|
|
|||
|
id: 2457
|
|||
|
title: POC集合,框架nday漏洞利用
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=Mzk0ODM0NDIxNQ==&mid=2247492910&idx=1&sn=09a010c00e7b570a4044e87718fd1ea4
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-06 08:02:20
|
|||
|
author: 夜组安全
|
|||
|
|
|||
|
id: 2458
|
|||
|
title: 某订货系统文件上传漏洞分析
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzkwMzMwODg2Mw==&mid=2247509663&idx=1&sn=36790b3290209381053ccbb1036f3b23
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-06 08:01:05
|
|||
|
author: 李白你好
|
|||
|
|
|||
|
id: 2459
|
|||
|
title: 漏洞预警 | WordPress Elementor PDF生成器任意文件下载漏洞
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzkwMTQ0NDA1NQ==&mid=2247491646&idx=1&sn=e2735658a6d4f6f895d5a79139c28b03
|
|||
|
description: WordPress Elementor页面生成器插件PDF生成器的/elementor-84接口存在任意文件下载漏洞,未经身份验证的攻击者可以通过该漏洞下载服务器任意文件,从而获取大量敏感信息。
|
|||
|
pubDate: 2024-12-06 08:00:57
|
|||
|
author: 浅安安全
|
|||
|
|
|||
|
id: 2460
|
|||
|
title: 漏洞预警 | 用友U8CRM SQL注入漏洞
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzkwMTQ0NDA1NQ==&mid=2247491646&idx=2&sn=146ed161d1ca3fb154097be23b43a507
|
|||
|
description: 用友U8CRM客户关系管理系统存在SQL注入漏洞,未经身份验证的攻击者通过漏洞执行任意SQL语句,调用xp_cmdshell写入后门文件,执行任意代码,从而获取到服务器权限。
|
|||
|
pubDate: 2024-12-06 08:00:57
|
|||
|
author: 浅安安全
|
|||
|
|
|||
|
id: 2461
|
|||
|
title: 新型网络钓鱼服务“Rockstar 2FA”来袭,微软 365 用户面临攻击威胁
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzA4NTY4MjAyMQ==&mid=2447899703&idx=1&sn=f8913402ae49952d0b206b8e65d7434a
|
|||
|
description: 网络安全研究人员警告称,一种名为“Rockstar 2FA”的网络钓鱼即服务(PhaaS)工具包正被用于恶意邮件活动,旨在窃取微软 365 帐户凭据。
|
|||
|
pubDate: 2024-12-06 08:00:48
|
|||
|
author: 技术修道场
|
|||
|
|
|||
|
id: 2462
|
|||
|
title: [04]恶意文档分析-工具篇-OleTools(一)
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzI4MDcxODc4MQ==&mid=2247485099&idx=1&sn=82a1499793e45c47eac7f2cb8af73806
|
|||
|
description: 恶意文档分析,一学就会!
|
|||
|
pubDate: 2024-12-06 08:00:44
|
|||
|
author: Y1X1n安全
|
|||
|
|
|||
|
id: 2463
|
|||
|
title: 浅谈红队中那些常见的场景和问题
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzkxNjMwNDUxNg==&mid=2247486926&idx=2&sn=ea58246c8cfed147506b4764e57aaaa2
|
|||
|
description: 浅谈红队中那些常见的场景和问题。
|
|||
|
pubDate: 2024-12-06 07:57:01
|
|||
|
author: 进击的HACK
|
|||
|
|
|||
|
id: 2464
|
|||
|
title: Villain C2
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzkwOTE5MDY5NA==&mid=2247503763&idx=1&sn=1b457900f24b3fe2e8c7f054f7f9a200
|
|||
|
description: 乘坐 C2 快速前往 Revershell Lane 最近,除了 Cobalt Strike 之外,我一直在摆弄其他 C2,因为
|
|||
|
pubDate: 2024-12-06 07:11:46
|
|||
|
author: 安全狗的自我修养
|
|||
|
|
|||
|
id: 2465
|
|||
|
title: CVE-2024-22399 - SwingLazyValue利用链构造分析
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzU2NDY2OTU4Nw==&mid=2247517492&idx=1&sn=f586d9016d9592f6f6dffa36d64a2eda
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-06 02:00:41
|
|||
|
author: 船山信安
|
|||
|
|
|||
|
id: 2466
|
|||
|
title: ATT&CK红队评估实战靶场二
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzkxMzY5NDUyMQ==&mid=2247484853&idx=1&sn=9b889d07c5e333da0d5f5657dbb81ec6
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-06 00:29:49
|
|||
|
author: flowers-boy
|
|||
|
|
|||
|
id: 2467
|
|||
|
title: WAF自动化绕过工具 -- x-waf
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzI4MDQ5MjY1Mg==&mid=2247515071&idx=1&sn=214be935ebb249a12f64fd88a876dc30
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-06 00:01:13
|
|||
|
author: Web安全工具库
|
|||
|
|
|||
|
id: 2468
|
|||
|
title: 安卓逆向 -- 某定位软件分析
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzA4MzgzNTU5MA==&mid=2652037129&idx=1&sn=9f23954b167130ade615e71c326c9f4a
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-06 00:00:49
|
|||
|
author: 逆向有你
|
|||
|
|
|||
|
id: 2469
|
|||
|
title: PC逆向 -- 内核APC执行
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzA4MzgzNTU5MA==&mid=2652037129&idx=2&sn=48a950a51b0bb5f95804cd7fea6d5a97
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-06 00:00:49
|
|||
|
author: 逆向有你
|
|||
|
|
|||
|
id: 2470
|
|||
|
title: 端口存活扫描工具 -- x-pscan(12月4日更新)
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzU3NzY3MzYzMw==&mid=2247498834&idx=1&sn=de1e00a45bbc8c8e115645394496821f
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-06 00:00:48
|
|||
|
author: 网络安全者
|
|||
|
|
|||
|
id: 2471
|
|||
|
title: 【免杀】单文件一键击溃windows defender进程 v1.1发布!
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzkwNjczOTQwOA==&mid=2247491607&idx=1&sn=803fe3abf2c407e54b3d4ec1545abeb0
|
|||
|
description: 单文件一键击溃windows defender\\x0d\\x0a使用资源文件嵌入驱动,避免直接依赖外部文件\\x0d\\x0a替换旧版本驱动文件,旧版本驱动证书已过期
|
|||
|
pubDate: 2024-12-06 00:00:16
|
|||
|
author: 星落安全团队
|
|||
|
|
|||
|
id: 2472
|
|||
|
title: 立即修复,微软驱动程序关键漏洞已被APT组织利用
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzkzNjIzMjM5Ng==&mid=2247490066&idx=1&sn=19f10acfb4432ac39d26b9c846eece40
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-05 20:24:32
|
|||
|
author: 信息安全大事件
|
|||
|
|
|||
|
id: 2473
|
|||
|
title: SMB 中继:攻击、缓解、策略和有效的解决方案
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzkxNDM4OTM3OQ==&mid=2247504962&idx=1&sn=dae7a03ab07cc04acc999dbe7a920e9a
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-05 19:17:18
|
|||
|
author: 网络研究观
|
|||
|
|
|||
|
id: 2474
|
|||
|
title: 【安全圈】立即修复,微软驱动程序关键漏洞已被APT组织利用
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzIzMzE4NDU1OQ==&mid=2652066421&idx=2&sn=c856137ec845bc74a8a86abc23c1eb69
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-05 19:01:01
|
|||
|
author: 安全圈
|
|||
|
|
|||
|
id: 2475
|
|||
|
title: 大模型的反序列化导致的RCE漏洞
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzU0MzkzOTYzOQ==&mid=2247489539&idx=1&sn=69e2563458072584247038ace3c47897
|
|||
|
description: 大模型RCE漏洞!!
|
|||
|
pubDate: 2024-12-05 18:04:31
|
|||
|
author: 黑伞安全
|
|||
|
|
|||
|
id: 2476
|
|||
|
title: 新型网络钓鱼活动利用损坏的 Word 文档来逃避安全保护
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzAxMjYyMzkwOA==&mid=2247525328&idx=1&sn=aa4690f683a66fd805db9c7b4ebb5d2f
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-05 17:53:47
|
|||
|
author: Ots安全
|
|||
|
|
|||
|
id: 2477
|
|||
|
title: CVE-2024-42448 (CVSS 9.9):Veeam VSPC 中的严重 RCE 漏洞
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzAxMjYyMzkwOA==&mid=2247525328&idx=2&sn=9359464472ac9ce0e09e7e04e80d874f
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-05 17:53:47
|
|||
|
author: Ots安全
|
|||
|
|
|||
|
id: 2478
|
|||
|
title: 一种可绕过MFA认证的邻近入侵技术
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzkxOTUyOTc0NQ==&mid=2247492683&idx=1&sn=9a95dbd2eb123c7bf3d9634288a7de32
|
|||
|
description: “邻近攻击”本质上是一种近距离访问操作,但避免了攻击者被物理识别或拘留的风险。这种攻击方式既具备近距离接触的所有好处,又允许幕后操作者远在千里之外。
|
|||
|
pubDate: 2024-12-05 17:52:16
|
|||
|
author: 二进制空间安全
|
|||
|
|
|||
|
id: 2479
|
|||
|
title: 日本CERT提醒:IO-Data 路由器中的多个0day已遭利用
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzI2NTg4OTc5Nw==&mid=2247521692&idx=2&sn=adb3ff5ba3ff65807012edd28d90be20
|
|||
|
description: 其它两个0day的补丁将于12月18日推出
|
|||
|
pubDate: 2024-12-05 17:46:29
|
|||
|
author: 代码卫士
|
|||
|
|
|||
|
id: 2480
|
|||
|
title: Nessus扫描报告自动化生成工具
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzkxMzMyNzMyMA==&mid=2247568045&idx=1&sn=733899809ca7843908e3295aae3111f4
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-05 17:01:04
|
|||
|
author: 马哥网络安全
|
|||
|
|
|||
|
id: 2481
|
|||
|
title: 某OA 11.10 未授权任意文件上传
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzkyNTY3Nzc3Mg==&mid=2247487839&idx=1&sn=c7739038fa14d38c3ffb3e3fd0f46786
|
|||
|
description: 前几天看到通达 OA 11.10 存在未授权任意文件上传漏洞,于是也打算对此进行复现和分析。
|
|||
|
pubDate: 2024-12-05 16:30:26
|
|||
|
author: 蚁景网安
|
|||
|
|
|||
|
id: 2482
|
|||
|
title: Yakit针对流量加密APP的Frida rpc解决方案
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzU0MTc2NTExNg==&mid=2247491126&idx=1&sn=8a07cf454033234da27ea3525f5cd616
|
|||
|
description: 本文只要讲述针对复杂流量加密的APP,如何在Yakit工具下采用Frida rpc的方式进行流量解密测试。
|
|||
|
pubDate: 2024-12-05 15:29:44
|
|||
|
author: 实战安全研究
|
|||
|
|
|||
|
id: 2483
|
|||
|
title: 攻防的较量,杀毒软件的致命缺陷
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=Mzg2ODE5OTM5Nw==&mid=2247486613&idx=1&sn=ff6a075a665310c9459d711c4e78ce18
|
|||
|
description: 根据云查杀引擎设计原理,我们发现基于黑白名单的检测机制存在时间绕过的缺陷,这意味着在下一次同步(一般是2-4小时)云规则前,文件仍处于灰名单期间它将绕过。
|
|||
|
pubDate: 2024-12-05 14:22:48
|
|||
|
author: 白帽子安全笔记
|
|||
|
|
|||
|
id: 2484
|
|||
|
title: 干货|一文搞懂加密流量检测的解决方法和技术细节
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzI1OTA1MzQzNA==&mid=2651247117&idx=2&sn=4cfb96c5877794de29c638e7e3154263
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-05 13:52:08
|
|||
|
author: e安在线
|
|||
|
|
|||
|
id: 2485
|
|||
|
title: Mitre Att&ck框架T1205.001(端口敲击)和T1205.002(套接字过滤)技术的简单实现
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzI0NTI4NjEwOQ==&mid=2247484898&idx=1&sn=0b8fe71a5d54db4c3434020ad198578e
|
|||
|
description: Mitre Att\\x26amp;ck框架T1205.001(端口敲击)和T1205.002(套接字过滤)技术的简单实现
|
|||
|
pubDate: 2024-12-05 13:05:08
|
|||
|
author: 新蜂网络安全实验室
|
|||
|
|
|||
|
id: 2486
|
|||
|
title: js逆向案例-cookie反爬之akamai_2.0-上
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzU5NTcyMDc1Ng==&mid=2247493337&idx=1&sn=b903406edf42dde48c2b0ad2721eafef
|
|||
|
description: js逆向案例-cookie反爬之akamai_2.0-上
|
|||
|
pubDate: 2024-12-05 12:55:42
|
|||
|
author: 逆向OneByOne
|
|||
|
|
|||
|
id: 2487
|
|||
|
title: 9个超级实用BurpSuite插件,SRC漏洞挖掘利器打包推荐
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=Mzg4MTkwMTI5Mw==&mid=2247487695&idx=1&sn=65d7e7419f8d11a5cd05a191525939d6
|
|||
|
description: 前段时间自己在做项目的时候,需要用到一些漏洞扫描工具,以及一些被动扫描的工具,其中BurpSuite中的几个插件起到了关键性的作用,其实在实际攻防演练,或者渗透中一些漏洞出现的概率还是挺高的。
|
|||
|
pubDate: 2024-12-05 12:52:14
|
|||
|
author: 星悦安全
|
|||
|
|
|||
|
id: 2488
|
|||
|
title: 从JS代码审计到GraphQL利用的管理账户接管
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MjM5Mzc4MzUzMQ==&mid=2650260223&idx=1&sn=31a7ee28fac382ef469e173b0bcfa32e
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-05 12:20:18
|
|||
|
author: 骨哥说事
|
|||
|
|
|||
|
id: 2489
|
|||
|
title: CVE-2024-31317 复现
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzIxMDYyNTk3Nw==&mid=2247515004&idx=1&sn=49ef9432fd64ba81064c5af61066efee
|
|||
|
description: 最近做一个测试的项目刚好是安卓车机于是想起来了这篇写一半的博客,赶紧趁着还能想起一点东西赶紧记录了下来。
|
|||
|
pubDate: 2024-12-05 11:30:33
|
|||
|
author: 白帽100安全攻防实验室
|
|||
|
|
|||
|
id: 2490
|
|||
|
title: APT 组织之间的对抗:俄罗斯 APT Turla 窃取了巴基斯坦 APT 组织的数据
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzkzNDIzNDUxOQ==&mid=2247492849&idx=2&sn=a268b43ec7ef3072d0da2c731b8c43a9
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-05 11:11:06
|
|||
|
author: 独眼情报
|
|||
|
|
|||
|
id: 2491
|
|||
|
title: Zabbix 漏洞CVE-2024-42327 (CVSS 9.9)的 PoC 发布
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzkzNDIzNDUxOQ==&mid=2247492849&idx=4&sn=a3441c1ca8c3aba877ceebd7454b594c
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-05 11:11:06
|
|||
|
author: 独眼情报
|
|||
|
|
|||
|
id: 2492
|
|||
|
title: 从赛门铁克管理代理(又名 Altiris)中提取账户连接凭据(ACCs)
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzAxODM5ODQzNQ==&mid=2247485607&idx=1&sn=6686b6ca661897c4b5d84f044d0095b8
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-05 10:24:37
|
|||
|
author: securitainment
|
|||
|
|
|||
|
id: 2493
|
|||
|
title: 【免杀】向日葵密码、todesk密码命令行版本一键提取工具
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzkwOTIzODg0MA==&mid=2247491260&idx=1&sn=d2998f3b46a506b8711bf523b7733a50
|
|||
|
description: 向日葵、todesk提取工具\\x0d\\x0a基于fscan二开的xlscan\\x0d\\x0a过360、火绒等杀软
|
|||
|
pubDate: 2024-12-05 10:06:33
|
|||
|
author: 爱喝酒烫头的曹操
|
|||
|
|
|||
|
id: 2494
|
|||
|
title: 版本更新 | 单文件一键击溃火绒进程 v1.1发布!
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=Mzg4Mzg4OTIyMA==&mid=2247485849&idx=1&sn=951f8f326995324daa476fe117c2b15e
|
|||
|
description: 单文件一键击溃火绒进程 v1.1发布!\\x0d\\x0a使用资源文件嵌入驱动,避免直接依赖外部文件\\x0d\\x0a替换旧版本驱动文件,旧版本驱动证书已过期
|
|||
|
pubDate: 2024-12-05 10:04:27
|
|||
|
author: 威零安全实验室
|
|||
|
|
|||
|
id: 2495
|
|||
|
title: 微信4.0聊天记录数据库文件解密分析
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzAxMjE3ODU3MQ==&mid=2650604505&idx=4&sn=e59a2078c09bc1db7d2094cf014dfd4a
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-05 10:03:19
|
|||
|
author: 黑白之道
|
|||
|
|
|||
|
id: 2496
|
|||
|
title: 安卓逆向之第二代:函数抽取型壳
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzkyODY3NjkyNQ==&mid=2247484355&idx=1&sn=a0fd336b796484a0e7abf6d02f246b06
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-05 10:01:18
|
|||
|
author: Ting的安全笔记
|
|||
|
|
|||
|
id: 2497
|
|||
|
title: 【翻译】CORS - 错误配置和绕过
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=Mzg4NzgzMjUzOA==&mid=2247485324&idx=1&sn=edbf22ad696def57e27f4d38b81d689d
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-05 09:56:43
|
|||
|
author: 安全视安
|
|||
|
|
|||
|
id: 2498
|
|||
|
title: 【Linux运维】宝塔环境升级HTTP/3
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzkxMzIwNTY1OA==&mid=2247509575&idx=1&sn=94ea87716de2777f60f8187050014cfb
|
|||
|
description: 本文简单的为大家分享,如何在宝塔环境中如何升级http/3协议。
|
|||
|
pubDate: 2024-12-05 09:12:03
|
|||
|
author: kali笔记
|
|||
|
|
|||
|
id: 2499
|
|||
|
title: 资产收集常用工具以及思路总结
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzkzMjIxNjExNg==&mid=2247485972&idx=1&sn=bd5d2a38ea67d7ed891e03e356d17c52
|
|||
|
description: 这些常用的资产收集工具和思路你都了解并经常使用么?
|
|||
|
pubDate: 2024-12-05 09:03:47
|
|||
|
author: 沃克学安全
|
|||
|
|
|||
|
id: 2500
|
|||
|
title: CISA 警告 Zyxel 防火墙漏洞可能被利用进行攻击
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzI2NzAwOTg4NQ==&mid=2649793379&idx=3&sn=62ee6dd06f47c5b1777c48cd0a47a9fa
|
|||
|
description: CISA 警告多款 Zyxel 防火墙设备中的路径遍历漏洞被积极利用。
|
|||
|
pubDate: 2024-12-05 09:00:58
|
|||
|
author: 军哥网络安全读报
|
|||
|
|
|||
|
id: 2501
|
|||
|
title: 记两次内网入侵溯源的真实案例
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzkxMTUyMjUxMw==&mid=2247523029&idx=1&sn=2f33efd5da4783fc615dbbb96086cd73
|
|||
|
description: 记两次内网入侵溯源的真实案例
|
|||
|
pubDate: 2024-12-05 09:00:09
|
|||
|
author: 猫蛋儿安全
|
|||
|
|
|||
|
id: 2502
|
|||
|
title: 实战红蓝:谈一谈NSmartProxy流量特征在实战中的表现
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=Mzk0Mzc1MTI2Nw==&mid=2247485956&idx=1&sn=3471aaf7c173b144ec8beee719616a67
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-05 08:32:38
|
|||
|
author: 神农Sec
|
|||
|
|
|||
|
id: 2503
|
|||
|
title: Linux应急响应检查工具【单机终极版】
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=Mzk0ODM0NDIxNQ==&mid=2247492906&idx=1&sn=1bac25e1425fc528f71e7ed0ab1e3485
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-05 08:04:28
|
|||
|
author: 夜组安全
|
|||
|
|
|||
|
id: 2504
|
|||
|
title: 漏洞预警 | GitLab权限提升漏洞
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzkwMTQ0NDA1NQ==&mid=2247491639&idx=1&sn=39e40ca6d804352e6d20235db2217c6f
|
|||
|
description: GitLab存在权限提升漏洞,由于GitLab中对LFS令牌的权限管理不当,当攻击者获取目标用户的个人访问令牌后,可以进一步滥用该PAT生成的LFS令牌,利用该漏洞实现权限提升,从而可能导致敏感信息泄露或执行未授权操作。
|
|||
|
pubDate: 2024-12-05 08:03:24
|
|||
|
author: 浅安安全
|
|||
|
|
|||
|
id: 2505
|
|||
|
title: 漏洞预警 | 用友NC SQL注入漏洞
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzkwMTQ0NDA1NQ==&mid=2247491639&idx=2&sn=ef0f15d92963fe62bd06df07429f9bce
|
|||
|
description: 用友NC的/portal/pt/task/process接口存在SQL注入漏洞,攻击者通过利用SQL注入漏洞配合数据库xp cmdshel可以执行任意命令,从而控制服务器。
|
|||
|
pubDate: 2024-12-05 08:03:24
|
|||
|
author: 浅安安全
|
|||
|
|
|||
|
id: 2506
|
|||
|
title: 移动安全框架 (MobSF) 存在存储型XSS漏洞 | CVE-2024-53999
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzkwMzMwODg2Mw==&mid=2247509613&idx=1&sn=3d46d512c0ea527fdba9869e770416e8
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-05 08:01:27
|
|||
|
author: 李白你好
|
|||
|
|
|||
|
id: 2507
|
|||
|
title: API安全漏洞靶场crapi漏洞复现
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzkxNjMwNDUxNg==&mid=2247486893&idx=1&sn=4910174c4a8925e18aae62644f0d7dec
|
|||
|
description: 通过该靶场学习以及分析当前常用的API技术以及该技术中存在的安全问题。
|
|||
|
pubDate: 2024-12-05 07:55:38
|
|||
|
author: 进击的HACK
|
|||
|
|
|||
|
id: 2508
|
|||
|
title: Kubelet端口未授权深入利用
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=Mzg4MTU4NTc2Nw==&mid=2247493754&idx=2&sn=fdfca15ecb8b98bcd7d1e97201b26bdd
|
|||
|
description: 漏洞描述K8s Node对外开启10250(Kubelet API)和10255端口(readonly AP
|
|||
|
pubDate: 2024-12-05 07:02:55
|
|||
|
author: 七芒星实验室
|
|||
|
|
|||
|
id: 2509
|
|||
|
title: 思科ASA漏洞CVE-2014-2120当前正在被利用攻击
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=Mzg3OTc0NDcyNQ==&mid=2247492872&idx=1&sn=63eff1dd884f77fb706066595cc12e75
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-05 07:01:27
|
|||
|
author: 黑猫安全
|
|||
|
|
|||
|
id: 2510
|
|||
|
title: 浅谈常见中间人攻击
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=Mzg2MzkwNDU1Mw==&mid=2247485363&idx=1&sn=3724a1da9ae81f364c92137a4175198a
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-05 07:00:44
|
|||
|
author: 信安路漫漫
|
|||
|
|
|||
|
id: 2511
|
|||
|
title: 哥斯拉源码解读+如何绕过waf检测
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzU2NDY2OTU4Nw==&mid=2247517466&idx=1&sn=925493f67805f6648aa9d36a4185c46b
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-05 02:00:55
|
|||
|
author: 船山信安
|
|||
|
|
|||
|
id: 2512
|
|||
|
title: 版本更新 | 单文件一键击溃火绒进程 v1.1发布!
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzkwNjczOTQwOA==&mid=2247491559&idx=1&sn=80e7f6359e4fb08a364c31e2ccd5c59a
|
|||
|
description: 单文件一键击溃火绒进程 v1.1发布!\\x0d\\x0a使用资源文件嵌入驱动,避免直接依赖外部文件\\x0d\\x0a替换旧版本驱动文件,旧版本驱动证书已过期
|
|||
|
pubDate: 2024-12-05 00:00:59
|
|||
|
author: 星落安全团队
|
|||
|
|
|||
|
id: 2513
|
|||
|
title: 红蓝队病毒木马监控辅助工具(12月3日更新)
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzU3NzY3MzYzMw==&mid=2247498820&idx=1&sn=2725bb5cbcb5e76e638a7e1c8836a0c7
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-05 00:00:13
|
|||
|
author: 网络安全者
|
|||
|
|
|||
|
id: 2514
|
|||
|
title: 最新Nessus2024.12.04版本主机漏洞扫描/探测工具下载|近期漏洞合集更新
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=Mzg3ODE2MjkxMQ==&mid=2247489275&idx=1&sn=363d8f9e531b932bd18c27d845f83a21
|
|||
|
description: Nessus号称是世界上最流行的漏洞扫描程序,全世界有超过75000个组织在使用它。该工具提供完整的电脑漏洞扫描服务,并随时更新其漏洞数据库。Nessus不同于传统的漏洞扫描软件,Nessus可同时在本机或远端上遥控,进行系统的漏洞分析扫描
|
|||
|
pubDate: 2024-12-05 00:00:12
|
|||
|
author: 渗透安全HackTwo
|
|||
|
|
|||
|
id: 2515
|
|||
|
title: 新型 Android 恶意软件 DroidBot 瞄准欧洲银行用户
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzkxNDM4OTM3OQ==&mid=2247504934&idx=3&sn=09e44a53225b47183d331f0328fab9e4
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-04 23:48:33
|
|||
|
author: 网络研究观
|
|||
|
|
|||
|
id: 2516
|
|||
|
title: Zabbix api_jsonrpc.php接口存在SQL注入漏洞CVE-2024-42327 附POC
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzIxMjEzMDkyMA==&mid=2247487930&idx=1&sn=589b3837a2dc8ff72e861b99f6947f5d
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-04 23:08:58
|
|||
|
author: 南风漏洞复现文库
|
|||
|
|
|||
|
id: 2517
|
|||
|
title: 工具集:HeavenlyBypassAV(免杀工具)
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=Mzk0MjY1ODE5Mg==&mid=2247484771&idx=1&sn=edb658df8647f36d20266189ef2f35e3
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-04 22:15:59
|
|||
|
author: 风铃Sec
|
|||
|
|
|||
|
id: 2518
|
|||
|
title: 一种巧妙内核级可绕过EDR的入侵手段
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzkxOTUyOTc0NQ==&mid=2247492675&idx=1&sn=2976f9793011ea7dacce961cadd32530
|
|||
|
description: 这种攻击方式被称为BYOVD攻击, BYOVD 攻击的核心是攻击者将一个已知存在漏洞的内核驱动程序写入磁盘并加载,然后利用该漏洞执行特权操作。这些操作可能包括终止安全产品、绕过 EDR 防篡改保护、提取特权进程信息。
|
|||
|
pubDate: 2024-12-04 21:45:51
|
|||
|
author: 二进制空间安全
|
|||
|
|
|||
|
id: 2519
|
|||
|
title: 钓鱼网页散播银狐木马,远控后门威胁终端安全
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzI3NjYzMDM1Mg==&mid=2247520783&idx=1&sn=e6d18857c2b21d1bc8b80636051ff403
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-04 21:44:58
|
|||
|
author: 火绒安全
|
|||
|
|
|||
|
id: 2520
|
|||
|
title: 微软驱动程序关键漏洞已被APT组织利用
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzI5NTM4OTQ5Mg==&mid=2247632689&idx=3&sn=3c9e08e5af95f26a73913ce6e7ded2bc
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-04 20:25:28
|
|||
|
author: 商密君
|
|||
|
|
|||
|
id: 2521
|
|||
|
title: 微软驱动程序关键漏洞已被APT组织利用
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MjM5NjA0NjgyMA==&mid=2651308802&idx=1&sn=ed99bbd47f1003dc1db38fa05309efca
|
|||
|
description: 漏洞允许攻击者远程接管整个系统。
|
|||
|
pubDate: 2024-12-04 19:03:41
|
|||
|
author: FreeBuf
|
|||
|
|
|||
|
id: 2522
|
|||
|
title: 网安瞭望台第9期:0day 情报,OAuth 2.0授权流程学习
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=Mzg2NTkwODU3Ng==&mid=2247513696&idx=1&sn=7c88b6b634b4ac1e28b987f2a9615627
|
|||
|
description: 网安资讯分享\\x0d\\x0aDAILY NEWS AND KNOWLEDGE
|
|||
|
pubDate: 2024-12-04 19:00:32
|
|||
|
author: 东方隐侠安全团队
|
|||
|
|
|||
|
id: 2523
|
|||
|
title: APT-C-53(Gamaredon)组织广泛攻击活动分析
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzUyMjk4NzExMA==&mid=2247505004&idx=1&sn=903d7e5ba2a23d6ecfbd81a1871a112c
|
|||
|
description: 360高级威胁研究院对Gamaredon组织的几种常见攻击手段进行了深入分析,发现该组织持续采用各种复杂的技术和策略,包括使用恶意LNK文件、XHTML文件以及复杂的网络钓鱼活动
|
|||
|
pubDate: 2024-12-04 18:30:26
|
|||
|
author: 360威胁情报中心
|
|||
|
|
|||
|
id: 2524
|
|||
|
title: 代码审计之XX系统二次注入到RCE
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=Mzg2ODg3NzExNw==&mid=2247488383&idx=1&sn=b60391877f30cdcc8a9c845ab2954999
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-04 18:00:52
|
|||
|
author: WK安全
|
|||
|
|
|||
|
id: 2525
|
|||
|
title: 【Windbg】学习及在CTF中解题
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzkxNTIwNTkyNg==&mid=2247551822&idx=1&sn=eac87a1389d7471aeaea09a7880d41b2
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-04 17:35:34
|
|||
|
author: 蚁景网络安全
|
|||
|
|
|||
|
id: 2526
|
|||
|
title: 攻防|记一次溯源真实案例
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=Mzk0MTIzNTgzMQ==&mid=2247518549&idx=1&sn=ff36cee17cf0dfe0f89bfe2646611f16
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-04 17:30:44
|
|||
|
author: 亿人安全
|
|||
|
|
|||
|
id: 2527
|
|||
|
title: 用友NC workflowService SQL注入1day代码分析
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=Mzk0MTUxNzAxMg==&mid=2247484141&idx=1&sn=ab52db7afb078dc0594ae666b550a7e6
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-04 17:17:45
|
|||
|
author: 深白网安
|
|||
|
|
|||
|
id: 2528
|
|||
|
title: 无文件攻击一览:利用 Powershell 和 Microsoft 合法应用程序进行攻击
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzAxMjYyMzkwOA==&mid=2247525324&idx=1&sn=d646d82ca9b9ae36275b2e08032383f8
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-04 17:16:13
|
|||
|
author: Ots安全
|
|||
|
|
|||
|
id: 2529
|
|||
|
title: 剖析 JA4H 以改进 Sliver C2 检测
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzAxMjYyMzkwOA==&mid=2247525324&idx=2&sn=6f8406f5c586e98597fce64b18cf8037
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-04 17:16:13
|
|||
|
author: Ots安全
|
|||
|
|
|||
|
id: 2530
|
|||
|
title: Linux 恶意软件开发:使用 Python 构建基于 TLS/SSL 的反向 shell
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzAxMjYyMzkwOA==&mid=2247525324&idx=3&sn=c7f548eaca5b4c86c66a4551d0e0c465
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-04 17:16:13
|
|||
|
author: Ots安全
|
|||
|
|
|||
|
id: 2531
|
|||
|
title: 【漏洞预警】ProFTPD权限管理不当漏洞可导致权限提升
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzI3NzMzNzE5Ng==&mid=2247489265&idx=1&sn=bfa7c936f79c9a65dfda98c9b44c5c6c
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-04 16:48:38
|
|||
|
author: 飓风网络安全
|
|||
|
|
|||
|
id: 2532
|
|||
|
title: 安卓逆向之第一代:整体型壳的工作原理
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzkyODY3NjkyNQ==&mid=2247484348&idx=1&sn=853d0b9ffba606adede67a3dceb926d6
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-04 16:47:09
|
|||
|
author: Ting丶的安全笔记
|
|||
|
|
|||
|
id: 2533
|
|||
|
title: Java 反序列化之 XStream 反序列化
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzkyNTY3Nzc3Mg==&mid=2247487830&idx=1&sn=c73070283e1b24b768e04165b08c1289
|
|||
|
description: XStream 是一个简单的基于 Java 库,Java 对象序列化到 XML,反之亦然。
|
|||
|
pubDate: 2024-12-04 16:30:42
|
|||
|
author: 蚁景网安
|
|||
|
|
|||
|
id: 2534
|
|||
|
title: 第71篇:某银行外网打点到内网核心区红队评估复盘
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzIzMjg0MjM5OQ==&mid=2247487941&idx=1&sn=9b320e074613a6b014ac1246d69e96e9
|
|||
|
description: 本期复盘一次银行的红队评估项目,基本上涵盖了外网打点、内网横向、社工钓鱼、供应链攻击、物理渗透、的方方面面,未知攻、焉知防,希望对红蓝双方都有借鉴意义。
|
|||
|
pubDate: 2024-12-04 15:55:10
|
|||
|
author: 嗨嗨安全
|
|||
|
|
|||
|
id: 2535
|
|||
|
title: 某企业SRC的两次WAF的对抗
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzkxMDY3MzQyNQ==&mid=2247484734&idx=1&sn=8078a45842d6aa07b585f6791ec565ad
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-04 14:58:35
|
|||
|
author: OneTS安全团队
|
|||
|
|
|||
|
id: 2536
|
|||
|
title: 【开源工具】-无害化钓鱼平台pfish
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzA5OTI3MTE5MQ==&mid=2247485434&idx=1&sn=bf59cc92588b5bc09d84d8122325ed0c
|
|||
|
description: 无害化钓鱼平台pfish
|
|||
|
pubDate: 2024-12-04 14:46:08
|
|||
|
author: 埋藏酱油瓶
|
|||
|
|
|||
|
id: 2537
|
|||
|
title: 黑客利用 macOS 扩展文件属性隐藏恶意代码
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzI0MDY1MDU4MQ==&mid=2247580067&idx=1&sn=1b4cd406b7ac4ce6e199711f557c7808
|
|||
|
description: 威胁分子将恶意代码隐藏在自定义文件元数据中,并使用诱饵 PDF 文档来帮助逃避检测。
|
|||
|
pubDate: 2024-12-04 14:00:36
|
|||
|
author: 嘶吼专业版
|
|||
|
|
|||
|
id: 2538
|
|||
|
title: 新型漏洞攻击利用服务器进行恶意更新
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzI0MDY1MDU4MQ==&mid=2247580067&idx=2&sn=d10b2e801f0d756e658e21558ddff8d7
|
|||
|
description: AmberWolf 披露了有关这两个漏洞的更多详细信息,并发布了一个名为 NachoVPN 的开源工具,该工具模拟可以利用这些漏洞的流氓 VPN 服务器。
|
|||
|
pubDate: 2024-12-04 14:00:36
|
|||
|
author: 嘶吼专业版
|
|||
|
|
|||
|
id: 2539
|
|||
|
title: 浅谈红队中那些常见的场景和问题
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzkzMzI3OTczNA==&mid=2247487440&idx=1&sn=0ae9cb74e601015c38b1b58c5d6498d5
|
|||
|
description: 浅谈红队中那些常见的场景和问题。
|
|||
|
pubDate: 2024-12-04 14:00:28
|
|||
|
author: 千寻安服
|
|||
|
|
|||
|
id: 2540
|
|||
|
title: 支持自定义密码 | 哥斯拉免杀 过360、火绒、D盾 XlByPassGodzilla v1.3已更新!
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=Mzg4Mzg4OTIyMA==&mid=2247485847&idx=1&sn=74982dff5ea606b9f1082ede4deb0f6c
|
|||
|
description: 哥斯拉免杀XlByPassGodzilla v1.3已更新\\x0d\\x0a过360、火绒、D盾(部分过)
|
|||
|
pubDate: 2024-12-04 13:48:46
|
|||
|
author: 威零安全实验室
|
|||
|
|
|||
|
id: 2541
|
|||
|
title: 【免杀思路】某60 SHELLCODE注入探测
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=Mzk0OTY3OTc5Mw==&mid=2247484856&idx=1&sn=c30863a5525a3ed62f00fc83647e9d90
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-04 13:46:16
|
|||
|
author: 网安鲲为帝
|
|||
|
|
|||
|
id: 2542
|
|||
|
title: Zabbix SQL 注入 CVE-2024-42327 POC已公开
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzkyOTQzNjIwNw==&mid=2247490461&idx=2&sn=08cc776019baf385a479ee02ed9635ae
|
|||
|
description: CVE-2024-42327 的 PoC 发布
|
|||
|
pubDate: 2024-12-04 13:30:05
|
|||
|
author: 棉花糖fans
|
|||
|
|
|||
|
id: 2543
|
|||
|
title: Web狗的近源渗透记录
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=Mzg5MDA5NzUzNA==&mid=2247488520&idx=1&sn=0cb39ed4c4a6827600805a5c1b3683b9
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-04 12:41:09
|
|||
|
author: 藏剑安全
|
|||
|
|
|||
|
id: 2544
|
|||
|
title: linux系统中常见的几种文件传输方式
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzI3NjA4MjMyMw==&mid=2647789820&idx=1&sn=3fc71504ae514f9af5355d447cfdc75f
|
|||
|
description: 本文的几种传输方法针对的是在渗透中常遇到的情况。
|
|||
|
pubDate: 2024-12-04 12:17:48
|
|||
|
author: 乌鸦安全
|
|||
|
|
|||
|
id: 2545
|
|||
|
title: Mitre Att&ck框架T1059.008技术(Network Device CLI)的简单实现
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzI0NTI4NjEwOQ==&mid=2247484883&idx=1&sn=ce52009dc757f7c57bb6bccd059a69b8
|
|||
|
description: Mitre Att\\x26amp;ck框架T1059.008技术(Network Device CLI)的简单实现
|
|||
|
pubDate: 2024-12-04 12:10:26
|
|||
|
author: 新蜂网络安全实验室
|
|||
|
|
|||
|
id: 2546
|
|||
|
title: 一次ASP.NET站点文件上传bypass
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzI4NTcxMjQ1MA==&mid=2247614522&idx=1&sn=a80a20b412ee8bd03f82dc6277244e99
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-04 12:02:44
|
|||
|
author: 白帽子左一
|
|||
|
|
|||
|
id: 2547
|
|||
|
title: 干货|一文搞懂加密流量检测的解决方法和技术细节
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzI1OTA1MzQzNA==&mid=2651247107&idx=2&sn=14422cc225f026b33245b6fe143ea536
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-04 11:32:47
|
|||
|
author: e安在线
|
|||
|
|
|||
|
id: 2548
|
|||
|
title: 系统文件管理行为漏洞导致本地提权
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=Mzk0OTU2ODQ4Mw==&mid=2247486517&idx=1&sn=388de17165c44f34a9aa9f95be1ac96f
|
|||
|
description: 文章从两个C语言底层函数出发,分析在处理文件时,缺少对符号链接的严格检测,导致macOS的隐私绕过与本地提权及缓解方案。
|
|||
|
pubDate: 2024-12-04 11:30:51
|
|||
|
author: 奇安信天工实验室
|
|||
|
|
|||
|
id: 2549
|
|||
|
title: 一文学会fastjson漏洞
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=Mzk0NTY5Nzc1OA==&mid=2247484160&idx=1&sn=768fc0310477001e491b83ee2ccdbd59
|
|||
|
description: fastjson漏洞
|
|||
|
pubDate: 2024-12-04 10:55:30
|
|||
|
author: simple学安全
|
|||
|
|
|||
|
id: 2550
|
|||
|
title: 【重新架构】基于frp 过卡巴斯基、360核晶、defender、火绒的xlfrc v1.2发布!
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzkzNjM5NDU0OA==&mid=2247486211&idx=3&sn=563d506f54cfa08428c80bc707e9bbdb
|
|||
|
description: 分离客户端与服务器端源码,减少程序静态特征\\x0d\\x0a过卡巴斯基、360、defender、火绒\\x0d\\x0a支持linux、windows平台
|
|||
|
pubDate: 2024-12-04 10:43:53
|
|||
|
author: 钟毓安全
|
|||
|
|
|||
|
id: 2551
|
|||
|
title: EDR Silencers 与阻止 EDR 通信方法探索u200a-u200a第 2 部分
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzAxODM5ODQzNQ==&mid=2247485566&idx=1&sn=da384849804c481aefcad9f835e65683
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-04 10:30:23
|
|||
|
author: securitainment
|
|||
|
|
|||
|
id: 2552
|
|||
|
title: 【全国职业技能大赛“信息安全与评估”赛项】Linux系统入侵排查与应急响应技术
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=Mzk0Mzc1MTI2Nw==&mid=2247485913&idx=1&sn=d11bcfbb72d32f8f9a4808c0b6ba001f
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-04 10:11:41
|
|||
|
author: 神农Sec
|
|||
|
|
|||
|
id: 2553
|
|||
|
title: CVE-2017-7504 JBOSS反序列化漏洞复现
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=Mzg2Mzg1MTA5MQ==&mid=2247484544&idx=1&sn=edccc83fdc6c490a2e6fea3dca97653f
|
|||
|
description: JBoss AS 4.x JbossMQ实现过程的JMS over HTTP Invocation Layer的HTTPServerILServlet.java文件存在反序列化漏洞,远程攻击者可借助特制的序列化数据利用该漏洞执行任意代码。
|
|||
|
pubDate: 2024-12-04 10:00:45
|
|||
|
author: 网安知识库
|
|||
|
|
|||
|
id: 2554
|
|||
|
title: Venom Spider 为 MaaS 平台制造新型恶意软件
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzI2NzAwOTg4NQ==&mid=2649793364&idx=3&sn=da0de415c1527aad4f9a58dd47947c23
|
|||
|
description: “Venom Spider”威胁组织升级攻击工具。
|
|||
|
pubDate: 2024-12-04 09:00:54
|
|||
|
author: 军哥网络安全读报
|
|||
|
|
|||
|
id: 2555
|
|||
|
title: 【实战小技巧系列】前端 JS 解密:一次简单高危漏洞案例
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzU0MTc2NTExNg==&mid=2247491124&idx=1&sn=a0b37e5980727d2306c23e85b77a4db1
|
|||
|
description: 前端 JS 解密:一次简单高危漏洞案例
|
|||
|
pubDate: 2024-12-04 09:00:23
|
|||
|
author: 实战安全研究
|
|||
|
|
|||
|
id: 2556
|
|||
|
title: 从JS到内网横向
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzUyNjk0Njg5Nw==&mid=2247484185&idx=1&sn=a9f95d93cc287d18e2541bb17a5e4c1e
|
|||
|
description: 前段时间参加了一场攻防演练,使用常规漏洞尝试未果后,想到不少师傅分享过从JS中寻找突破的文章,于是硬着头皮刚起了JS,最终打开了内网入口获取了靶标权限和个人信息。在此分享一下过程。
|
|||
|
pubDate: 2024-12-04 08:41:16
|
|||
|
author: 左逆安全攻防
|
|||
|
|
|||
|
id: 2557
|
|||
|
title: 银狐黑产最新加载器利用破解版VPN为诱饵进行传播
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzA4ODEyODA3MQ==&mid=2247489624&idx=1&sn=d79b623b062721f4270af7e991894bf1
|
|||
|
description: 银狐黑产最新加载器利用破解版VPN为诱饵进行传播
|
|||
|
pubDate: 2024-12-04 08:41:01
|
|||
|
author: 安全分析与研究
|
|||
|
|
|||
|
id: 2558
|
|||
|
title: Windows漏洞:MS08-067远程代码执行漏洞复现及深度防御
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzkyOTUxMzk2NQ==&mid=2247485627&idx=1&sn=22b7126319128dc90cd1fb3659a2c5c8
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-04 08:10:39
|
|||
|
author: 安全君呀
|
|||
|
|
|||
|
id: 2559
|
|||
|
title: 漏洞预警 | 致翔OA SQL注入漏洞
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzkwMTQ0NDA1NQ==&mid=2247491636&idx=2&sn=2d7f1f2bbdc233543e7c316a9a7d4297
|
|||
|
description: 致翔OA的/OpenWindows/open_juese.aspx接口存在SQL注入漏洞,未经身份验证的攻击者可以通过该漏洞获取数据库敏感信息。
|
|||
|
pubDate: 2024-12-04 08:00:41
|
|||
|
author: 浅安安全
|
|||
|
|
|||
|
id: 2560
|
|||
|
title: 漏洞预警 | Eking管理易任意文件上传漏洞
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzkwMTQ0NDA1NQ==&mid=2247491636&idx=3&sn=b01fdd9d4755ed5068d97d6a493c81fb
|
|||
|
description: EKing管理易的/Base64Upload.ihtm接口处存在任意文件上传漏洞,未经身份验证的远程攻击者可利用此漏洞上传任意文件,在服务器端任意执行代码获取服务器权限,进而控制整个web服务器。
|
|||
|
pubDate: 2024-12-04 08:00:41
|
|||
|
author: 浅安安全
|
|||
|
|
|||
|
id: 2561
|
|||
|
title: 记一次回显利用接管学校财务系统
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzkxNjMwNDUxNg==&mid=2247486891&idx=2&sn=7a470fde8eb7457c56e395fbdeea2652
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-04 07:50:56
|
|||
|
author: 进击的HACK
|
|||
|
|
|||
|
id: 2562
|
|||
|
title: OsCommerce v4 RCE:揭开文件上传绕过威胁
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzkwOTE5MDY5NA==&mid=2247503761&idx=1&sn=6967ccadb1a4a56080ed1cdec5bd6cfd
|
|||
|
description: 在我最近的渗透测试中,我在 osCommerce v4 中发现了一个关键漏洞,特别
|
|||
|
pubDate: 2024-12-04 07:42:26
|
|||
|
author: 安全狗的自我修养
|
|||
|
|
|||
|
id: 2563
|
|||
|
title: Docker Privileged特权逃逸
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=Mzg4MTU4NTc2Nw==&mid=2247493740&idx=2&sn=ee345278088902534badddef929a7a62
|
|||
|
description: 文章前言在Docker中Privileged是一种特殊的权限模式,它允许Docker容器在启动时获取到与宿主
|
|||
|
pubDate: 2024-12-04 07:05:51
|
|||
|
author: 七芒星实验室
|
|||
|
|
|||
|
id: 2564
|
|||
|
title: 基于动态Agent挖掘更多的反序列化入口
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzU2NDY2OTU4Nw==&mid=2247517445&idx=1&sn=d6495be48e8a001ccb846c382c5a2336
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-04 02:02:46
|
|||
|
author: 船山信安
|
|||
|
|
|||
|
id: 2565
|
|||
|
title: 文末获取 | 一款替代SNETCracker支持多协议弱口令爆破工具
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzkwNjczOTQwOA==&mid=2247491543&idx=1&sn=91387096fc0e7cc0f34c0e842513435f
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-04 00:03:46
|
|||
|
author: 星落安全团队
|
|||
|
|
|||
|
id: 2566
|
|||
|
title: CVE-2024-42327 Zabbix 严重漏洞POC已公开!
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzkwODI1ODgzOA==&mid=2247506250&idx=1&sn=65c3600e701ae88d87981315807f4d12
|
|||
|
description: CVE-2024-42327 Zabbix 严重漏洞POC已公开!请及时修复
|
|||
|
pubDate: 2024-12-04 00:01:00
|
|||
|
author: 一个不正经的黑客
|
|||
|
|
|||
|
id: 2567
|
|||
|
title: 一款能快速探测可能存在SQL注入的Burpsuite插件 提高 SQL 注入测试效率|渗透测试
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=Mzg3ODE2MjkxMQ==&mid=2247489248&idx=1&sn=28b8aa1e0b877a8d712468bd82d26459
|
|||
|
description: DetSql是基于 BurpSuite Java 插件 API 开发的 SQL 注入探测插件,主要作用为快速从 http 流量中筛选出可能存在 SQL 注入的请求,在尽可能减少拦截的情况下提高 SQL 注入测试效率。
|
|||
|
pubDate: 2024-12-04 00:00:53
|
|||
|
author: 渗透安全HackTwo
|
|||
|
|
|||
|
id: 2568
|
|||
|
title: 【揭秘】打印机痕迹取证
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzAwNDcwMDgzMA==&mid=2651048065&idx=2&sn=c2b79081f1e540ebe55d37898c8f3900
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-04 00:00:53
|
|||
|
author: 电子物证
|
|||
|
|
|||
|
id: 2569
|
|||
|
title: sign加密小程序漏洞挖掘
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzU3NzY3MzYzMw==&mid=2247498804&idx=1&sn=7b4841d81ea301d1b204b069ffc9250b
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-04 00:00:14
|
|||
|
author: 网络安全者
|
|||
|
|
|||
|
id: 2570
|
|||
|
title: 【漏洞预警】Dell NetWorker权限提升漏洞(CVE-2024-42422)
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzI3NzMzNzE5Ng==&mid=2247489258&idx=1&sn=37b588ec3a46cd041f49cdc24390fdd6
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-03 23:20:53
|
|||
|
author: 飓风网络安全
|
|||
|
|
|||
|
id: 2571
|
|||
|
title: searchsploit漏洞辅助利用工具
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzA3NTc0MTA1Mg==&mid=2664712099&idx=1&sn=61a72f188755066a11d2bbfb63a06708
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-03 23:04:58
|
|||
|
author: 小兵搞安全
|
|||
|
|
|||
|
id: 2572
|
|||
|
title: GitLab漏洞汇总
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzU0MTc2NTExNg==&mid=2247491122&idx=1&sn=bb9371663020caf90ea8432d73756f63
|
|||
|
description: 本文汇总了gitlab从2016到2023年的一些常见漏洞。
|
|||
|
pubDate: 2024-12-03 22:37:34
|
|||
|
author: 实战安全研究
|
|||
|
|
|||
|
id: 2573
|
|||
|
title: 剖析JA4H指纹:提升Sliver C2检测能力
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzkyMjM0ODAwNg==&mid=2247488274&idx=1&sn=d31b4691a249e96a6e60836c9b2d3317
|
|||
|
description: happy hunting
|
|||
|
pubDate: 2024-12-03 20:30:33
|
|||
|
author: TIPFactory情报工厂
|
|||
|
|
|||
|
id: 2574
|
|||
|
title: 动态逃逸杀软
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzkzNTYwMTk4Mw==&mid=2247488075&idx=1&sn=30866fcd85c0b1a1f1d5fef6f8f2cde1
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-03 20:03:50
|
|||
|
author: 网安探索员
|
|||
|
|
|||
|
id: 2575
|
|||
|
title: 应急响应 - Windows基础篇
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=Mzg3NTU3NTY0Nw==&mid=2247489400&idx=1&sn=1b9208a83d4719f03c7e5582703f8236
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-03 20:00:20
|
|||
|
author: 网络安全与取证研究
|
|||
|
|
|||
|
id: 2576
|
|||
|
title: 两个影响WPS Office的任意代码执行漏洞分析
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=Mzg5OTQzNTI4Nw==&mid=2247488921&idx=1&sn=796d00590260af7c745e20f4cb082c0b
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-03 19:17:41
|
|||
|
author: 黑客街安全团队
|
|||
|
|
|||
|
id: 2577
|
|||
|
title: 新型恶意软件能利用LogoFAIL漏洞感染Linux系统
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MjM5NjA0NjgyMA==&mid=2651308739&idx=2&sn=9f511acdd37389f627c4dd8e2667b338
|
|||
|
description: 许多厂商产品会受到 LogoFAIL 漏洞的一种或多种变体的影响。
|
|||
|
pubDate: 2024-12-03 19:02:32
|
|||
|
author: FreeBuf
|
|||
|
|
|||
|
id: 2578
|
|||
|
title: 分析运行APP内存中的敏感信息
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzAwOTQzMjMwOQ==&mid=2247483897&idx=1&sn=9b153c1f54e112bd43648e47809200ea
|
|||
|
description: 众所不知在OSS中,使用HTTP请求的Authorization Header来携带签名信息是进行身份验证的最常见方法。除了使用POST签名和URL签名之外,所有的OSS操作都需要通过Authorization Header来进行身份验证。
|
|||
|
pubDate: 2024-12-03 19:01:07
|
|||
|
author: 思极安全实验室
|
|||
|
|
|||
|
id: 2579
|
|||
|
title: 【安全圈】新型恶意软件能利用LogoFAIL漏洞感染Linux系统
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzIzMzE4NDU1OQ==&mid=2652066393&idx=4&sn=b1e7b15689fa221569f9a1cad7eff071
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-03 19:00:52
|
|||
|
author: 安全圈
|
|||
|
|
|||
|
id: 2580
|
|||
|
title: 安卓逆向之Android-Intent介绍
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzkyODY3NjkyNQ==&mid=2247484333&idx=1&sn=d634f8d7c16848236b8763cb07390347
|
|||
|
description: 安卓逆向之Android-Intent介绍
|
|||
|
pubDate: 2024-12-03 18:59:24
|
|||
|
author: Ting丶的安全笔记
|
|||
|
|
|||
|
id: 2581
|
|||
|
title: 11月漏洞快报 | Apache OFBiz 表达式注入漏洞、Oracle 文件泄露漏洞...
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MjM5NzE0NTIxMg==&mid=2651134656&idx=2&sn=64e0a5818023dfe7a4f9a1c5e1101a01
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-03 17:54:30
|
|||
|
author: 梆梆安全
|
|||
|
|
|||
|
id: 2582
|
|||
|
title: 无文件攻击的恶意软件加载器:PSLoramyra技术分析
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzI0MTE4ODY3Nw==&mid=2247492450&idx=1&sn=e25fe33cdbf7b2905dddbe3f503934ad
|
|||
|
description: 近日,一起大规模的数据泄露事件震动了网络安全界。名为“HikkI-Chan”的黑客在臭名昭著的Breach Forums上泄露了超过3.9亿VK用户的个人信息。
|
|||
|
pubDate: 2024-12-03 17:47:30
|
|||
|
author: 白泽安全实验室
|
|||
|
|
|||
|
id: 2583
|
|||
|
title: 利用断开的域管理员rdp会话提权
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzkxNTIwNTkyNg==&mid=2247551774&idx=1&sn=27b225e1a3c8cb15734b6e39c2e3ba68
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-03 17:30:35
|
|||
|
author: 蚁景网络安全
|
|||
|
|
|||
|
id: 2584
|
|||
|
title: Windows 工具被武器化:Wevtutil.exe 在新型攻击中被利用
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzAxMjYyMzkwOA==&mid=2247525251&idx=1&sn=8cf9d612a0fa98c133236ace9572e8f5
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-03 17:30:13
|
|||
|
author: Ots安全
|
|||
|
|
|||
|
id: 2585
|
|||
|
title: 从 Base64 到反向 Shell:从 Word 文档中解压恶意软件
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzAxMjYyMzkwOA==&mid=2247525251&idx=2&sn=70d91929eb7adde3106da6b8a73946dd
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-03 17:30:13
|
|||
|
author: Ots安全
|
|||
|
|
|||
|
id: 2586
|
|||
|
title: 【技术分享】从网站搭建到木马免杀捆绑与拿shell全过程
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzIyNTIxNDA1Ng==&mid=2659211256&idx=1&sn=7be75392df645155a215faa354d98e14
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-03 17:20:54
|
|||
|
author: 暗影网安实验室
|
|||
|
|
|||
|
id: 2587
|
|||
|
title: 【免杀+钓鱼】钓鱼页面搭建+免杀捆绑拿shell
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzkxMDc0MTc5Mw==&mid=2247483778&idx=1&sn=617673eea861e0f39c1b0c1f5e976558
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-03 17:20:24
|
|||
|
author: 红岸基地网络安全
|
|||
|
|
|||
|
id: 2588
|
|||
|
title: Nmap 结果也能可视化?效果还真不错!
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzU0MDUxMDEzNQ==&mid=2247489676&idx=1&sn=a76a9b21c54c717195a7cb1ef7c87630
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-03 16:30:24
|
|||
|
author: 黑客仓库
|
|||
|
|
|||
|
id: 2589
|
|||
|
title: 免杀对抗从0开始(六)
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=Mzk0MzU5NTg1Ng==&mid=2247484842&idx=1&sn=e686677da6362fd1f51d39052c58adae
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-03 15:29:09
|
|||
|
author: 泾弦安全
|
|||
|
|
|||
|
id: 2590
|
|||
|
title: EDR Silencers 与阻止 EDR 通信的方法探索 - 第一部分
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzAxODM5ODQzNQ==&mid=2247485552&idx=1&sn=8b6b477f2189c031b7faab345ea9f6a2
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-03 13:37:36
|
|||
|
author: securitainment
|
|||
|
|
|||
|
id: 2591
|
|||
|
title: 未探索的 LOLBAS 技术 Wevtutil
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzAxODM5ODQzNQ==&mid=2247485552&idx=2&sn=f82bc68e8d2c879cb6e4744b550ede6a
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-03 13:37:36
|
|||
|
author: securitainment
|
|||
|
|
|||
|
id: 2592
|
|||
|
title: 损坏的 Word 文件助长复杂的网络钓鱼活动
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzU1NjczNjA0Nw==&mid=2247485795&idx=1&sn=ad88754e71bbff268358d0567838de6c
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-03 12:31:38
|
|||
|
author: 三沐数安
|
|||
|
|
|||
|
id: 2593
|
|||
|
title: 云安全红队渗透测试详解【案例实操】
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzI1Mjc3NTUwMQ==&mid=2247536949&idx=1&sn=ae9c6716667e57e6f8d66a034befdaac
|
|||
|
description: 内容较多,可收藏观看
|
|||
|
pubDate: 2024-12-03 12:03:06
|
|||
|
author: 教父爱分享
|
|||
|
|
|||
|
id: 2594
|
|||
|
title: 如何使用 Shodan狩猎C2
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzI4NTcxMjQ1MA==&mid=2247614505&idx=1&sn=2fe91456fc059ab8a4c0588c08160f9a
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-03 12:01:26
|
|||
|
author: 白帽子左一
|
|||
|
|
|||
|
id: 2595
|
|||
|
title: 记一次回显利用接管学校财务系统
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzUyODkwNDIyMg==&mid=2247545624&idx=1&sn=88f0278c64118fc4e169de395776a9c5
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-03 12:01:18
|
|||
|
author: 掌控安全EDU
|
|||
|
|
|||
|
id: 2596
|
|||
|
title: 【护网蓝队应急系列1】Windows入侵排查
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzkyOTUxMzk2NQ==&mid=2247485605&idx=1&sn=8d6e9cc10aee02d296cc2d99807c4889
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-03 11:54:01
|
|||
|
author: 安全君呀
|
|||
|
|
|||
|
id: 2597
|
|||
|
title: 第101篇:一个绕过5层权限校验的0day漏洞的代码审计分析
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=Mzg2NDg2MDIxNQ==&mid=2247485183&idx=1&sn=10c23306ea0a57295373eb38828c61cf
|
|||
|
description: None
|
|||
|
pubDate: 2024-12-03 11:49:23
|
|||
|
author: Jie安全
|
|||
|
|
|||
|
id: 2598
|
|||
|
title: Nighthawk 正在推翻 Cobalt Strike
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=Mzg4MzA4NTM0OA==&mid=2247492953&idx=1&sn=d9a55365e49765779b01df8d48c5f943
|
|||
|
description: MDSec 团队通过此新版本加强了内存规避技术。借助新的 Python API 和注册自定义命令的能力,Nighthawk 正成为推翻 Cobalt Strike 的有力竞争者。
|
|||
|
pubDate: 2024-12-03 11:45:06
|
|||
|
author: OSINT研习社
|
|||
|
|
|||
|
id: 2599
|
|||
|
title: Burpsuite存储桶配置不当漏洞检测插件
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=Mzg2MTg2NzI5OA==&mid=2247484752&idx=1&sn=11f717a42e8b1e332a6e68aa76a479fd
|
|||
|
description: 自动化检测存储桶漏洞工具
|
|||
|
pubDate: 2024-12-03 11:30:03
|
|||
|
author: 黑熊安全
|
|||
|
|
|||
|
id: 2600
|
|||
|
title: 【重新架构】基于frp 过卡巴斯基、360核晶、defender、火绒的xlfrc v1.2发布!
|
|||
|
link: https://mp.weixin.qq.com/s?__biz=MzkwOTIzODg0MA==&mid=2247491258&idx=1&sn=20bfef1278649f270b44f8e6fbd998c1
|
|||
|
description: 分离客户端与服务器端源码,减少程序静态特征\\x0d\\x0a过卡巴斯基、360、defender、火绒\\x0d\\x0a支持linux、windows平台
|
|||
|
pubDate: 2024-12-03 11:10:03
|
|||
|
author: 爱喝酒烫头的曹操
|
|||
|
|
|||
|
name: articles
|
|||
|
seq: 2600
|
|||
|
|
|||
|
id: 181
|
|||
|
title: 关键的联发科芯片组漏洞影响15亿手机用户
|
|||
|
link: https://www.freebuf.com/news/417104.html
|
|||
|
description: 联发科已经承认了这些安全漏洞,并强烈敦促相关组织立即更新受影响的系统以防范潜在风险。
|
|||
|
pubDate: 2024-12-06 19:01:01
|
|||
|
category: 资讯
|
|||
|
|
|||
|
id: 182
|
|||
|
title: FreeBuf周报 | AWS密钥泄露即可被利用;新型钓鱼工具包能让“菜鸟”轻松发动攻击
|
|||
|
link: https://www.freebuf.com/news/417080.html
|
|||
|
description: 总结推荐本周的热点资讯、安全事件、一周好文和省心工具,保证大家不错过本周的每一个重点!
|
|||
|
pubDate: 2024-12-06 15:44:07
|
|||
|
category: 资讯
|
|||
|
|
|||
|
id: 183
|
|||
|
title: 最强大的Android间谍软件曝光,可提取信息、密码和执行shell命令
|
|||
|
link: https://www.freebuf.com/news/417070.html
|
|||
|
description: Monokle 间谍软件功能十分完善,曾号称是最强的间谍软件之一。
|
|||
|
pubDate: 2024-12-06 15:22:13
|
|||
|
category: 资讯
|
|||
|
|
|||
|
id: 184
|
|||
|
title: 混淆还原的几种方式实践
|
|||
|
link: https://www.freebuf.com/articles/mobile/417063.html
|
|||
|
description: 下面都是使用goron的混淆进行符号执行以及模拟执行处理的结果
|
|||
|
pubDate: 2024-12-06 14:55:36
|
|||
|
category: 移动安全
|
|||
|
|
|||
|
id: 185
|
|||
|
title: 德勤遭勒索攻击,被窃取机密数据超1TB
|
|||
|
link: https://www.freebuf.com/news/417056.html
|
|||
|
description: 勒索软件组织 Brain Cipher 近日声称入侵了世界四大会计师事务所之一德勤,并从中窃取了1TB的压缩数据。
|
|||
|
pubDate: 2024-12-06 14:38:41
|
|||
|
category: 资讯
|
|||
|
|
|||
|
id: 186
|
|||
|
title: 新型安卓系统银行恶意软件能窃取77家金融机构的账户凭证
|
|||
|
link: https://www.freebuf.com/news/417038.html
|
|||
|
description: 名为DroidBot的新型安卓银行恶意软件试图窃取77家加密货币交易所和银行应用程序的凭证,涉及英国、意大利、法国、等多个国家。
|
|||
|
pubDate: 2024-12-06 13:47:34
|
|||
|
category: 资讯
|
|||
|
|
|||
|
id: 187
|
|||
|
title: 漏洞挖掘与复现
|
|||
|
link: https://www.freebuf.com/articles/web/414845.html
|
|||
|
description: 漏洞复现与挖掘
|
|||
|
pubDate: 2024-12-06 12:03:12
|
|||
|
category: Web安全
|
|||
|
|
|||
|
id: 188
|
|||
|
title: freebuf快速同步语雀文章
|
|||
|
link: https://www.freebuf.com/sectool/417015.html
|
|||
|
description: 把时间花在重要的事情上,减少浪费时间在重复动作上
|
|||
|
pubDate: 2024-12-06 11:03:02
|
|||
|
category: 工具
|
|||
|
|
|||
|
id: 189
|
|||
|
title: I-O Data路由器0Day漏洞被利用,无修复补丁
|
|||
|
link: https://www.freebuf.com/news/417010.html
|
|||
|
description: 日本CERT发布公告称,黑客正在利用I-O Data路由器设备中的零日漏洞来修改设备设置、执行命令,甚至关闭防火墙。
|
|||
|
pubDate: 2024-12-06 10:48:56
|
|||
|
category: 资讯
|
|||
|
|
|||
|
id: 190
|
|||
|
title: FreeBuf早报 | 数万台卫星接收器预装DDoS攻击工具;美国检方起诉 19 岁少年黑客
|
|||
|
link: https://www.freebuf.com/news/416954.html
|
|||
|
description: 真主党对讲机爆炸案后,韩国再次曝出大规模“恶意硬件”案件,数十万台销往全球市场的卫星接收器中暗藏DDoS攻击工具。
|
|||
|
pubDate: 2024-12-05 16:53:55
|
|||
|
category: 资讯
|
|||
|
|
|||
|
id: 191
|
|||
|
title: 知名伏特加品牌因勒索攻击而倒闭
|
|||
|
link: https://www.freebuf.com/news/416924.html
|
|||
|
description: Stoli集团在美国的子公司因8月份遭受的勒索软件攻击,以及俄罗斯当局没收其在俄剩余酿酒厂而不得不申请破产保护。
|
|||
|
pubDate: 2024-12-05 13:56:42
|
|||
|
category: 资讯
|
|||
|
|
|||
|
id: 192
|
|||
|
title: 谷歌浏览器类型混淆漏洞让攻击者能够执行远程代码
|
|||
|
link: https://www.freebuf.com/news/416908.html
|
|||
|
description: 攻击者可能利用此漏洞在受影响的系统上执行远程代码,从而导致系统受损和数据盗窃。
|
|||
|
pubDate: 2024-12-05 11:29:27
|
|||
|
category: 资讯
|
|||
|
|
|||
|
id: 193
|
|||
|
title: 利用断开的域管理员RDP会话提权
|
|||
|
link: https://www.freebuf.com/vuls/416904.html
|
|||
|
description: 当域内管理员登录过攻击者可控的域内普通机器运维或者排查结束后,退出3389时没有退出账号而是直接关掉了远程桌面,那么会产生哪些风险呢?
|
|||
|
pubDate: 2024-12-05 11:10:43
|
|||
|
category: 漏洞
|
|||
|
|
|||
|
id: 194
|
|||
|
title: 警惕这类黑产,近百万老年机被远程控制,每月莫名扣费……
|
|||
|
link: https://www.freebuf.com/news/416899.html
|
|||
|
description: 初步统计显示,全国竟有98万部手机遭遇莫名扣费情况,金额高达500多万元。不法分子如何盯上老人机?
|
|||
|
pubDate: 2024-12-05 10:46:34
|
|||
|
category: 资讯
|
|||
|
|
|||
|
id: 195
|
|||
|
title: 安全研究年终总结-分享2024年RCE类的CVE漏洞高危EXP集合!
|
|||
|
link: https://www.freebuf.com/articles/web/416887.html
|
|||
|
description: 网络安全漏洞不断变化且威胁日益严重,及时了解和修复这些漏洞至关重要。本文介绍的多个CVE漏洞,涉及常见的企业级软件和硬件,黑客可以利用这些漏洞远程控制系统、窃取敏感数据甚至完全破坏服务。
|
|||
|
pubDate: 2024-12-05 09:42:13
|
|||
|
category: Web安全
|
|||
|
|
|||
|
id: 196
|
|||
|
title: 信息安全管 | 企业端点与主机安全
|
|||
|
link: https://www.freebuf.com/articles/endpoint/400836.html
|
|||
|
description: 本文主要探讨企业在管理和强化端点与主机安全方面所面临的挑战,并介绍一些最佳实践和策略,帮助企业构建一个坚固的安全防线。
|
|||
|
pubDate: 2024-12-05 08:46:32
|
|||
|
category: 终端安全
|
|||
|
|
|||
|
id: 197
|
|||
|
title: 企业从0到1如何配置 | 工控操作系统标准基线
|
|||
|
link: https://www.freebuf.com/articles/ics-articles/402959.html
|
|||
|
description: 合理的安全配置基线可以有效降低工控系统受到恶意攻击的风险,提升系统的稳定性和可靠性。
|
|||
|
pubDate: 2024-12-05 08:43:15
|
|||
|
category: 工控安全
|
|||
|
|
|||
|
id: 198
|
|||
|
title: 钓鱼网页散播银狐木马,远控后门威胁终端安全
|
|||
|
link: https://www.freebuf.com/news/416880.html
|
|||
|
description: 在当今网络环境下,许多人都有通过搜索引擎下载应用程序的习惯,虽然这种方式简单又迅速,但这也可能被不法分子所利用,通过设置钓鱼网站来欺骗用户。这些钓鱼网站可能会通过各种方式吸引用户点击,从而进行病毒的传
|
|||
|
pubDate: 2024-12-04 21:28:45
|
|||
|
category: 资讯
|
|||
|
|
|||
|
id: 199
|
|||
|
title: FreeBuf早报 | 今年黑客已窃取 14.9 亿美元加密货币;Cloudflare开发人员域正被滥用
|
|||
|
link: https://www.freebuf.com/news/416863.html
|
|||
|
description: Web3 漏洞赏金平台 Immunefi 的一份新报告显示,2024 年迄今已记录了近 14.9 亿美元的加密货币损失,主要是由于黑客事件。
|
|||
|
pubDate: 2024-12-04 17:35:23
|
|||
|
category: 资讯
|
|||
|
|
|||
|
id: 200
|
|||
|
title: JNDI绕过高版本注入限制那些事
|
|||
|
link: https://www.freebuf.com/vuls/416862.html
|
|||
|
description: JNDI高版本注入可以说是java安全大集合了。涉及了许多框架漏洞的组合使用,当分析完JNDI高版本时,我认为也算是正式入门JAVA安全了
|
|||
|
pubDate: 2024-12-04 17:25:46
|
|||
|
category: 漏洞
|
|||
|
|
|||
|
name: articles
|
|||
|
seq: 200
|
|||
|
|
|||
|
id: 81
|
|||
|
title: GPU 驱动漏洞:窥探驱动漏洞利用的技术奥秘
|
|||
|
guid: https://forum.butian.net/share/3924
|
|||
|
source: subject
|
|||
|
description: 本文尝试以 GPU 漏洞为引介绍围绕 GPU 驱动这一攻击面,安全研究人员对内核漏洞利用技术做的一些探索。
|
|||
|
背景介绍
|
|||
|
目前移动 SOC 平台上由多个硬件模块组成,常见的硬件模块有:CPU、GPU、Modem基...
|
|||
|
pubDate: 2024-12-06 09:00:00
|
|||
|
|
|||
|
id: 82
|
|||
|
title: qemu逃逸入门及例题复现
|
|||
|
guid: https://forum.butian.net/share/3913
|
|||
|
source: subject
|
|||
|
description: 本文章详细记录了笔者对qemu逃逸的理解,同时复现了两个经典的CTF中的qemu逃逸的题目,详细记录了复现的过程,希望对你学习qemu逃逸有所帮助
|
|||
|
pubDate: 2024-12-05 09:36:56
|
|||
|
|
|||
|
id: 83
|
|||
|
title: 基于ptrace的沙箱绕过
|
|||
|
guid: https://forum.butian.net/share/3912
|
|||
|
source: subject
|
|||
|
description: 本文记录复现羊城杯hard-sandbox这道题的过程,并在途中学习了基于ptrace的沙箱绕过
|
|||
|
pubDate: 2024-12-04 10:00:01
|
|||
|
|
|||
|
id: 84
|
|||
|
title: 多轮对话越狱大模型
|
|||
|
guid: https://forum.butian.net/share/3952
|
|||
|
source: subject
|
|||
|
description: 最近奇安信办的datacon有个AI安全赛道,其中的挑战之一就是与越狱相关的,不同的地方在于它关注的是多轮越狱
|
|||
|
pubDate: 2024-12-04 09:00:02
|
|||
|
|
|||
|
id: 85
|
|||
|
title: Web Pwn常见利用方式总结
|
|||
|
guid: https://forum.butian.net/share/3911
|
|||
|
source: subject
|
|||
|
description: 本篇文章总结了web pwn常见的利用方式
|
|||
|
pubDate: 2024-12-03 09:31:45
|
|||
|
|
|||
|
id: 86
|
|||
|
title: HKCERT24 Rev bashed 和 MBTI Radar WP
|
|||
|
guid: https://forum.butian.net/share/3916
|
|||
|
source: subject
|
|||
|
description: 周末的时候,打了hkcert24的比赛,里面很多题目设置很有趣,这里挑选其中rev方向的的bashed和MBTI Radar 记录一下wp
|
|||
|
pubDate: 2024-12-02 10:05:50
|
|||
|
|
|||
|
id: 87
|
|||
|
title: 【2024补天白帽城市沙龙-广州站】终端对抗的评估与验证实践
|
|||
|
guid: https://forum.butian.net/share/3965
|
|||
|
source: subject
|
|||
|
description: 演讲议题:终端对抗的评估与验证实践
|
|||
|
pubDate: 2024-11-28 18:28:54
|
|||
|
|
|||
|
id: 88
|
|||
|
title: 【2024补天白帽城市沙龙-广州站】蓝牙漏洞敞开大门:无需密码的致命安全隐患
|
|||
|
guid: https://forum.butian.net/share/3964
|
|||
|
source: subject
|
|||
|
description: 演讲议题:蓝牙漏洞敞开大门:无需密码的致命安全隐患
|
|||
|
pubDate: 2024-11-28 18:21:29
|
|||
|
|
|||
|
id: 89
|
|||
|
title: 【2024补天白帽城市沙龙-广州站】大模型Cos 与越狱框架探索
|
|||
|
guid: https://forum.butian.net/share/3963
|
|||
|
source: subject
|
|||
|
description: 演讲议题:大模型Cos 与越狱框架探索
|
|||
|
pubDate: 2024-11-28 18:19:30
|
|||
|
|
|||
|
id: 90
|
|||
|
title: XCTF分站赛SCTF2024Pwn方向题解
|
|||
|
guid: https://forum.butian.net/share/3910
|
|||
|
source: subject
|
|||
|
description: 本文详细记录了笔者做SCTF2024Pwn方向题目的过程,希望对打Pwn的你有所启发
|
|||
|
pubDate: 2024-11-28 09:33:40
|
|||
|
|
|||
|
name: articles
|
|||
|
seq: 90
|
|||
|
|
|||
|
id: 136
|
|||
|
title: 基于 InternLM 和 LangChain 搭建私人知识库
|
|||
|
|
|||
|
link: https://paper.seebug.org/3247/
|
|||
|
category: AI安全
|
|||
|
description: 作者:Jinzhong Xu
|
|||
|
原文链接:https://xujinzh.github.io/2024/01/08/ai-Interlm-langchain-RAG/index.html
|
|||
|
本篇介绍基于 InternLM 和 LangChain 搭建私人知识库。
|
|||
|
python!conda create --name internlm_langchain --clone=/root/share/c...
|
|||
|
|
|||
|
pubDate: 2024-12-05 11:34:00
|
|||
|
|
|||
|
id: 137
|
|||
|
title: 书生·浦语大模型使用
|
|||
|
|
|||
|
link: https://paper.seebug.org/3246/
|
|||
|
category: AI安全
|
|||
|
description: 作者:Jinzhong Xu
|
|||
|
原文链接:https://xujinzh.github.io/2024/01/06/ai-internlm-useage/
|
|||
|
本篇介绍书生·浦语大模型的使用,包括智能对话、智能体工具调用和图文理解创作等。
|
|||
|
环境配置
|
|||
|
python!conda create --name internlm-chat --clone=/root/share/conda_envs/int...
|
|||
|
|
|||
|
pubDate: 2024-12-05 10:27:00
|
|||
|
|
|||
|
id: 138
|
|||
|
title: Uncontrolled PCDN: Observation and Case Analysis of the Current State of PCDN Technology
|
|||
|
|
|||
|
link: https://paper.seebug.org/3245/
|
|||
|
category: 情报分析
|
|||
|
description: Author: Knownsec 404 Active Defense Team
|
|||
|
Date: November 22, 2024
|
|||
|
中文版:https://paper.seebug.org/3242
|
|||
|
Background Introduction
|
|||
|
In October 2024, Knownsec 404 Active Defense Team detected abnormal traffi...
|
|||
|
|
|||
|
pubDate: 2024-12-02 06:13:00
|
|||
|
|
|||
|
id: 139
|
|||
|
title: Android 恶意软件混淆与对抗技术专题
|
|||
|
|
|||
|
link: https://paper.seebug.org/3244/
|
|||
|
category: 移动安全
|
|||
|
description: 作者:启明星辰ADLab
|
|||
|
原文链接:https://mp.weixin.qq.com/s/LIAkPLZ_vVOUGjFymdEH-w
|
|||
|
第一章 概 述
|
|||
|
近年来,Android恶意软件数量不断攀升,其采用的攻击和对抗技术也变得越来越复杂。为了对抗安全分析,绕过安全检测,窃取敏感数据或破坏系统安全,恶意软件利用各种对抗技术来伪装和隐藏其恶意行为和代码逻辑。这些对抗技术中,针对资源、文件、字节码指...
|
|||
|
|
|||
|
pubDate: 2024-11-27 08:10:00
|
|||
|
|
|||
|
id: 140
|
|||
|
title: Prompt 越狱手册
|
|||
|
|
|||
|
link: https://paper.seebug.org/3243/
|
|||
|
category: AI安全
|
|||
|
description: 作者:洺熙
|
|||
|
本文为作者投稿,Seebug Paper 期待你的分享,凡经采用即有礼品相送! 投稿邮箱:paper@seebug.org
|
|||
|
以下皆为作者洺熙个人观点或洺熙认同的看法,本文一切也只用于技术交流,切勿用于不法目的,一切纷争与作者本人无关
|
|||
|
由于书写本文的时候是从0到1开始写的,所以根据受益人群的不同,可以自行选择对应目录进行观看,同步开源至:https://github.com/Acm...
|
|||
|
|
|||
|
pubDate: 2024-11-27 03:32:00
|
|||
|
|
|||
|
id: 141
|
|||
|
title: 失控的PCDN:观察PCDN技术现状与案例分析
|
|||
|
|
|||
|
link: https://paper.seebug.org/3242/
|
|||
|
category: 情报分析
|
|||
|
description: 作者:知道创宇404积极防御实验室
|
|||
|
日期:2024年11月22日
|
|||
|
English Version: https://paper.seebug.org/3245/
|
|||
|
背景介绍
|
|||
|
2024年10月,知道创宇404积极防御实验室监测到某客户网站流量异常,疑似遭到CC攻击。经过分析,本次CC攻击疑似为PCDN厂商为了平衡上下行流量对客户网站视频文件进行的盗刷流量行为。
|
|||
|
在调查分析的过程中,我们发现PCD...
|
|||
|
|
|||
|
pubDate: 2024-11-22 12:38:00
|
|||
|
|
|||
|
id: 142
|
|||
|
title: APT-K-47 武器披露之 Asyncshell 的前世今生
|
|||
|
|
|||
|
link: https://paper.seebug.org/3240/
|
|||
|
category: 威胁情报
|
|||
|
description: 作者:知道创宇404高级威胁情报团队
|
|||
|
日期:2024年11月22日
|
|||
|
English version: https://paper.seebug.org/3241/
|
|||
|
1. 事件背景
|
|||
|
近期,知道创宇404高级威胁情报团队在日常跟踪APT过程中发现了APT-K-47组织利用“朝觐”话题发起的攻击活动,攻击者利用CHM文件执行相同目录下的恶意载荷。最终载荷功能比较简单,仅支持cmd shell,且使...
|
|||
|
|
|||
|
pubDate: 2024-11-22 05:22:00
|
|||
|
|
|||
|
id: 143
|
|||
|
title: Unveiling the Past and Present of APT-K-47 Weapon: Asyncshell
|
|||
|
|
|||
|
link: https://paper.seebug.org/3241/
|
|||
|
category: 威胁情报
|
|||
|
description: Author:Knownsec 404 Advanced Threat Intelligence team
|
|||
|
date:November 22, 2024
|
|||
|
中文版:https://paper.seebug.org/3240
|
|||
|
1. Background of the incident
|
|||
|
Recently, in the course of daily APT tracking,the Knowns...
|
|||
|
|
|||
|
pubDate: 2024-11-22 05:10:00
|
|||
|
|
|||
|
id: 144
|
|||
|
title: 使用 ZoomEye 增强新语法拓线 LockBit 3.0 勒索软件联盟基础设施
|
|||
|
|
|||
|
link: https://paper.seebug.org/3238/
|
|||
|
category: 专题报告
|
|||
|
description: 作者:知道创宇404实验室
|
|||
|
日期:2024年11月21日
|
|||
|
English version: https://paper.seebug.org/3239/
|
|||
|
一.摘要
|
|||
|
LockBit 3.0 是一种知名的勒索软件,由网络犯罪组织通过“勒索软件即服务”(RaaS)模式运作。LockBit 3.0勒索软件联盟是使用该恶意软件进行攻击的独立黑客,他们以分成方式合作。这些成员利用 LockBit 提供的...
|
|||
|
|
|||
|
pubDate: 2024-11-21 02:19:00
|
|||
|
|
|||
|
id: 145
|
|||
|
title: Identify Infrastructure Linked To LockBit 3.0 Ransomware Affiliates By ZoomEye Enhanced New Syntax
|
|||
|
|
|||
|
link: https://paper.seebug.org/3239/
|
|||
|
category: 404 English Paper
|
|||
|
description: Author: Knownsec 404 team
|
|||
|
Date: November 20, 2024
|
|||
|
中文版:https://paper.seebug.org/3238/
|
|||
|
1. Abstract
|
|||
|
LockBit 3.0 is a well-known ransomware operated through a "Ransomware-as-a-Service" (RaaS) model. Th...
|
|||
|
|
|||
|
pubDate: 2024-11-19 03:20:00
|
|||
|
|
|||
|
id: 146
|
|||
|
title: CVE-2022-20474分析——LazyValue下的Self-changed Bundle
|
|||
|
|
|||
|
link: https://paper.seebug.org/3237/
|
|||
|
category: 漏洞分析
|
|||
|
description: 作者:Cxxsheng
|
|||
|
本文为作者投稿,Seebug Paper 期待你的分享,凡经采用即有礼品相送! 投稿邮箱:paper@seebug.org
|
|||
|
前言
|
|||
|
温馨提示,阅读本文前,应当对Bundle Mismatch相关漏洞有初步了解,以下参考资料假如您还没有读过,建议先阅读一下:
|
|||
|
|
|||
|
Bundle风水——Android序列化与反序列化不匹配漏洞详解:经典的入门级别教程。
|
|||
|
Android 反序列化...
|
|||
|
|
|||
|
pubDate: 2024-11-15 08:36:00
|
|||
|
|
|||
|
id: 147
|
|||
|
title: LedgerHQ 软件供应链安全事件
|
|||
|
|
|||
|
link: https://paper.seebug.org/3236/
|
|||
|
category: 区块链
|
|||
|
description: 作者:维一零
|
|||
|
原文链接:https://weiyiling.cn/one/ledgerhq_npmjs_hijack_review
|
|||
|
0x00 前言
|
|||
|
写这篇的文章的原因如下:
|
|||
|
1、 去年有及时关注到这起供应链攻击事件,但由于不熟悉区块链安全以及对关键代码的解密困难未能深入分析,就先收藏留存;
|
|||
|
2、 对区块链安全的兴趣日益加深,以及职业发展需求驱动下开始尝试学习储备相关知识技能;
|
|||
|
3、 最近突然...
|
|||
|
|
|||
|
pubDate: 2024-11-14 04:21:00
|
|||
|
|
|||
|
id: 148
|
|||
|
title: N1CTF24 PHP Master Writeup
|
|||
|
|
|||
|
link: https://paper.seebug.org/3235/
|
|||
|
category: CTF
|
|||
|
description: 作者:m4p1e
|
|||
|
原文链接:https://m4p1e.com/2024/11/12/n1ctf24-php-master/
|
|||
|
0x01 介绍
|
|||
|
在刚刚过去的N1CTF24上,我出了一道关于PHP的pwn题,其中涉及到的漏洞[1]是真实存在的,并且目前依然没有被修复。非常遗憾,期待的PHP master并没有出现在这次的比赛中,让我们期待下次的PHP rising star xd。在这篇文章中我...
|
|||
|
|
|||
|
pubDate: 2024-11-14 02:12:00
|
|||
|
|
|||
|
id: 149
|
|||
|
title: Vigor3900 固件仿真及漏洞分析(CVE-2024-44844、CVE-2024-44845)
|
|||
|
|
|||
|
link: https://paper.seebug.org/3234/
|
|||
|
category: 404专栏
|
|||
|
description: 作者:fan@知道创宇404实验室
|
|||
|
时间:2024年11月13日
|
|||
|
1.前言
|
|||
|
我在日常跟踪漏洞情报的过程中,看到 Vigor3900 最新版本固件 1.5.1.6 存在多处后台命令注入漏洞(CVE-2024-44844/CVE-2024-44845)[1]。正好最近看到几个固件仿真小工具,我打算一并试试效果。
|
|||
|
2.产品介绍
|
|||
|
Vigor3900 是 DrayTek 推出的一款高性能、多功能的企业...
|
|||
|
|
|||
|
pubDate: 2024-11-13 04:23:00
|
|||
|
|
|||
|
id: 150
|
|||
|
title: CodeQL 入门和基本使用
|
|||
|
|
|||
|
link: https://paper.seebug.org/3233/
|
|||
|
category: 404专栏
|
|||
|
description: 作者:0x7F@知道创宇404实验室
|
|||
|
日期:2024年11月12日
|
|||
|
1.前言
|
|||
|
CodeQL 是 GitHub 推出的一种静态代码分析工具,用于查找和修复代码中的漏洞和安全问题。该工具最早由 Semmle 团队开发并命名为 Semmle QL,应用于自家的源代码分析平台 LGTM(Looks Good To Me) 上;2020年,Github 收购了 Semmle 团队并成立了 Securi...
|
|||
|
|
|||
|
pubDate: 2024-11-12 06:07:00
|
|||
|
|
|||
|
name: articles
|
|||
|
seq: 150
|
|||
|
|
|||
|
id: 701
|
|||
|
title: S8强网杯Final-thinkshopplus
|
|||
|
link: https://xz.aliyun.com/t/16581
|
|||
|
published: 2024-12-06 19:01:00
|
|||
|
|
|||
|
id: 702
|
|||
|
title: 伪装成ToDesk安装程序加载后门盗取数字货币
|
|||
|
link: https://xz.aliyun.com/t/16552
|
|||
|
published: 2024-12-04 20:00:59
|
|||
|
|
|||
|
id: 703
|
|||
|
title: Android逆向实战——以某APP跳过广告为例
|
|||
|
link: https://xz.aliyun.com/t/16550
|
|||
|
published: 2024-12-04 17:38:00
|
|||
|
|
|||
|
id: 704
|
|||
|
title: webpwn的一些总结
|
|||
|
link: https://xz.aliyun.com/t/16549
|
|||
|
published: 2024-12-04 17:20:50
|
|||
|
|
|||
|
id: 705
|
|||
|
title: Fastjson反序列化漏洞深度解析与利用和修复
|
|||
|
link: https://xz.aliyun.com/t/16547
|
|||
|
published: 2024-12-04 15:18:05
|
|||
|
|
|||
|
id: 706
|
|||
|
title: 2024金盾信安杯线上题目wp
|
|||
|
link: https://xz.aliyun.com/t/16546
|
|||
|
published: 2024-12-04 15:08:41
|
|||
|
|
|||
|
id: 707
|
|||
|
title: 高版本Fastjson反序列化Xtring新链和EventListenerList绕过
|
|||
|
link: https://xz.aliyun.com/t/16540
|
|||
|
published: 2024-12-04 13:59:43
|
|||
|
|
|||
|
id: 708
|
|||
|
title: 域渗透入门靶机之HTB-Cicada
|
|||
|
link: https://xz.aliyun.com/t/16539
|
|||
|
published: 2024-12-04 13:10:46
|
|||
|
|
|||
|
id: 709
|
|||
|
title: java加载动态链接库绕过一些限制的思考
|
|||
|
link: https://xz.aliyun.com/t/16538
|
|||
|
published: 2024-12-04 11:12:08
|
|||
|
|
|||
|
id: 710
|
|||
|
title: 从零构建:我的漏洞扫描器之旅
|
|||
|
link: https://xz.aliyun.com/t/16537
|
|||
|
published: 2024-12-04 10:38:46
|
|||
|
|
|||
|
id: 711
|
|||
|
title: CS代码审计配合Jdbc反序列化漏洞的利用
|
|||
|
link: https://xz.aliyun.com/t/16536
|
|||
|
published: 2024-12-03 23:58:20
|
|||
|
|
|||
|
id: 712
|
|||
|
title: 从案例中学习 IoT 固件仿真——D-Link DIR-605L(FW_113) 运行环境修复
|
|||
|
link: https://xz.aliyun.com/t/16535
|
|||
|
published: 2024-12-03 23:57:40
|
|||
|
|
|||
|
id: 713
|
|||
|
title: 某云音乐为例-反调试绕过,栈回溯,web算法逆向
|
|||
|
link: https://xz.aliyun.com/t/16534
|
|||
|
published: 2024-12-03 23:50:24
|
|||
|
|
|||
|
id: 714
|
|||
|
title: 2024睿抗网络安全初赛0解题——nopassword详解
|
|||
|
link: https://xz.aliyun.com/t/16533
|
|||
|
published: 2024-12-03 22:29:02
|
|||
|
|
|||
|
id: 715
|
|||
|
title: 某省移动网络安全技能竞赛决赛 个人赛第一名wp
|
|||
|
link: https://xz.aliyun.com/t/16532
|
|||
|
published: 2024-12-03 21:45:11
|
|||
|
|
|||
|
id: 716
|
|||
|
title: Apache NiFi 高版本命令执行利用
|
|||
|
link: https://xz.aliyun.com/t/16531
|
|||
|
published: 2024-12-03 20:44:14
|
|||
|
|
|||
|
id: 717
|
|||
|
title: WuCup 第一届“吾杯”网络安全技能大赛 WriteUp
|
|||
|
link: https://xz.aliyun.com/t/16529
|
|||
|
published: 2024-12-03 17:34:27
|
|||
|
|
|||
|
id: 718
|
|||
|
title: 记一次Go SSTI打SSRF到任意文件读
|
|||
|
link: https://xz.aliyun.com/t/16527
|
|||
|
published: 2024-12-03 16:52:38
|
|||
|
|
|||
|
id: 719
|
|||
|
title: 极客大挑战 web week3&week4
|
|||
|
link: https://xz.aliyun.com/t/16526
|
|||
|
published: 2024-12-03 16:48:02
|
|||
|
|
|||
|
id: 720
|
|||
|
title: jeepay v2.4.0反射型xss+存储型xss分析
|
|||
|
link: https://xz.aliyun.com/t/16524
|
|||
|
published: 2024-12-03 15:40:58
|
|||
|
|
|||
|
id: 721
|
|||
|
title: JDBC Attack漫谈
|
|||
|
link: https://xz.aliyun.com/t/16523
|
|||
|
published: 2024-12-03 14:51:00
|
|||
|
|
|||
|
id: 722
|
|||
|
title: 2024鹏城杯线下赛复现
|
|||
|
link: https://xz.aliyun.com/t/16522
|
|||
|
published: 2024-12-03 14:42:00
|
|||
|
|
|||
|
id: 723
|
|||
|
title: MemoryModule的远程反射dll加载与一些没有实现的想法
|
|||
|
link: https://xz.aliyun.com/t/16521
|
|||
|
published: 2024-12-03 11:58:34
|
|||
|
|
|||
|
id: 724
|
|||
|
title: 禅道18.x-20.x版本漏洞挖掘思路分析
|
|||
|
link: https://xz.aliyun.com/t/16520
|
|||
|
published: 2024-12-03 11:29:24
|
|||
|
|
|||
|
id: 725
|
|||
|
title: THM靶场-Lookup-通关WriteUp
|
|||
|
link: https://xz.aliyun.com/t/16517
|
|||
|
published: 2024-12-03 00:58:39
|
|||
|
|
|||
|
id: 726
|
|||
|
title: 哥斯拉源码解读+如何绕过waf检测
|
|||
|
link: https://xz.aliyun.com/t/16515
|
|||
|
published: 2024-12-02 22:23:11
|
|||
|
|
|||
|
id: 727
|
|||
|
title: 反沙盒?一文足以
|
|||
|
link: https://xz.aliyun.com/t/16514
|
|||
|
published: 2024-12-02 22:21:58
|
|||
|
|
|||
|
id: 728
|
|||
|
title: unicorn模拟执行在逆向中的妙用-以2024古剑山India Pale Ale为例
|
|||
|
link: https://xz.aliyun.com/t/16513
|
|||
|
published: 2024-12-02 21:16:53
|
|||
|
|
|||
|
id: 729
|
|||
|
title: IoT 安全从零到掌握:超详尽入门指南(实战篇)
|
|||
|
link: https://xz.aliyun.com/t/16511
|
|||
|
published: 2024-12-02 20:23:35
|
|||
|
|
|||
|
id: 730
|
|||
|
title: 记一次溯源真实案例
|
|||
|
link: https://xz.aliyun.com/t/16510
|
|||
|
published: 2024-12-02 19:29:36
|
|||
|
|
|||
|
id: 731
|
|||
|
title: IoT 安全从零到掌握:超详尽入门指南(基础篇)
|
|||
|
link: https://xz.aliyun.com/t/16512
|
|||
|
published: 2024-12-02 18:17:18
|
|||
|
|
|||
|
id: 732
|
|||
|
title: 2024 武数杯 RHG
|
|||
|
link: https://xz.aliyun.com/t/16475
|
|||
|
published: 2024-12-02 16:17:00
|
|||
|
|
|||
|
id: 733
|
|||
|
title: 2024年第一届吾杯解题writeup
|
|||
|
link: https://xz.aliyun.com/t/16503
|
|||
|
published: 2024-12-01 23:40:00
|
|||
|
|
|||
|
id: 734
|
|||
|
title: 记一次RAT的感染过程详细分析
|
|||
|
link: https://xz.aliyun.com/t/16502
|
|||
|
published: 2024-12-01 23:10:00
|
|||
|
|
|||
|
id: 735
|
|||
|
title: 2024古剑山初赛WP
|
|||
|
link: https://xz.aliyun.com/t/16501
|
|||
|
published: 2024-12-01 20:34:07
|
|||
|
|
|||
|
id: 736
|
|||
|
title: 2024吾杯网络安全技能大赛ctf-web方向
|
|||
|
link: https://xz.aliyun.com/t/16500
|
|||
|
published: 2024-12-01 19:49:39
|
|||
|
|
|||
|
id: 737
|
|||
|
title: 记某次金融小程序数据加密及签名逆向
|
|||
|
link: https://xz.aliyun.com/t/16497
|
|||
|
published: 2024-12-01 17:20:00
|
|||
|
|
|||
|
id: 738
|
|||
|
title: 2024网鼎杯初赛和半决赛部分题解---PWN
|
|||
|
link: https://xz.aliyun.com/t/16495
|
|||
|
published: 2024-12-01 16:43:53
|
|||
|
|
|||
|
id: 739
|
|||
|
title: 2024 强网拟态决赛web 部分wp
|
|||
|
link: https://xz.aliyun.com/t/16489
|
|||
|
published: 2024-12-01 14:49:39
|
|||
|
|
|||
|
id: 740
|
|||
|
title: 动态逃逸杀软的艺术
|
|||
|
link: https://xz.aliyun.com/t/16486
|
|||
|
published: 2024-12-01 10:12:00
|
|||
|
|
|||
|
id: 741
|
|||
|
title: 样本分析-DarkComet远控木马
|
|||
|
link: https://xz.aliyun.com/t/16485
|
|||
|
published: 2024-11-30 23:44:00
|
|||
|
|
|||
|
id: 742
|
|||
|
title: 某省移动竞赛决赛个人赛 部分wp
|
|||
|
link: https://xz.aliyun.com/t/16484
|
|||
|
published: 2024-11-30 23:13:25
|
|||
|
|
|||
|
id: 743
|
|||
|
title: NtUserInjectKeyboardInput函数绕过杀软屏幕锁定模拟键鼠
|
|||
|
link: https://xz.aliyun.com/t/16483
|
|||
|
published: 2024-11-30 21:33:34
|
|||
|
|
|||
|
id: 744
|
|||
|
title: 2024“中华武数杯” 全国网络攻防精英赛
|
|||
|
link: https://xz.aliyun.com/t/16482
|
|||
|
published: 2024-11-30 19:10:43
|
|||
|
|
|||
|
id: 745
|
|||
|
title: 2024河南省第六届“金盾信安杯”网络与数据安全大赛 线上挑战赛re&misc&crypto
|
|||
|
link: https://xz.aliyun.com/t/16480
|
|||
|
published: 2024-11-30 18:55:48
|
|||
|
|
|||
|
id: 746
|
|||
|
title: 2024 金盾杯 wp
|
|||
|
link: https://xz.aliyun.com/t/16478
|
|||
|
published: 2024-11-30 18:13:31
|
|||
|
|
|||
|
id: 747
|
|||
|
title: 2024古剑山Pwn方向全部题解
|
|||
|
link: https://xz.aliyun.com/t/16474
|
|||
|
published: 2024-11-30 15:48:05
|
|||
|
|
|||
|
id: 748
|
|||
|
title: 江苏移动“建材赋能”线下个人决赛crypto三道0解题
|
|||
|
link: https://xz.aliyun.com/t/16473
|
|||
|
published: 2024-11-30 14:12:46
|
|||
|
|
|||
|
id: 749
|
|||
|
title: 2024古剑山 pwn 详解
|
|||
|
link: https://xz.aliyun.com/t/16471
|
|||
|
published: 2024-11-30 13:52:46
|
|||
|
|
|||
|
id: 750
|
|||
|
title: 提示词注入攻击
|
|||
|
link: https://xz.aliyun.com/t/16470
|
|||
|
published: 2024-11-30 13:42:51
|
|||
|
|
|||
|
id: 751
|
|||
|
title: 2024 古剑山web&pwn&re&misc wp
|
|||
|
link: https://xz.aliyun.com/t/16469
|
|||
|
published: 2024-11-30 13:06:00
|
|||
|
|
|||
|
id: 752
|
|||
|
title: codeql实战练习-micro_service_seclab
|
|||
|
link: https://xz.aliyun.com/t/16468
|
|||
|
published: 2024-11-30 12:31:46
|
|||
|
|
|||
|
id: 753
|
|||
|
title: 某某热点app登录sign值逆向分析
|
|||
|
link: https://xz.aliyun.com/t/16466
|
|||
|
published: 2024-11-30 11:09:28
|
|||
|
|
|||
|
id: 754
|
|||
|
title: 样本分析 基于 rust 的恶意软件 SSLoad
|
|||
|
link: https://xz.aliyun.com/t/16465
|
|||
|
published: 2024-11-30 02:54:12
|
|||
|
|
|||
|
id: 755
|
|||
|
title: 基于JavaSecLab 一款综合Java漏洞平台的学习思考(一)
|
|||
|
link: https://xz.aliyun.com/t/16464
|
|||
|
published: 2024-11-30 01:03:18
|
|||
|
|
|||
|
id: 756
|
|||
|
title: 某web应用远程代码执行漏洞-反序列化分析
|
|||
|
link: https://xz.aliyun.com/t/16463
|
|||
|
published: 2024-11-30 00:14:34
|
|||
|
|
|||
|
id: 757
|
|||
|
title: SpringMVC的URI解析和权限绕过
|
|||
|
link: https://xz.aliyun.com/t/16462
|
|||
|
published: 2024-11-29 21:48:43
|
|||
|
|
|||
|
id: 758
|
|||
|
title: 基于深度学习(TextCNN&XGBoost stacking融合)对恶意软件的检测算法设计与实现
|
|||
|
link: https://xz.aliyun.com/t/16461
|
|||
|
published: 2024-11-29 21:02:11
|
|||
|
|
|||
|
id: 759
|
|||
|
title: 银狐黑产最新加载器利用破解版VPN为诱饵进行传播
|
|||
|
link: https://xz.aliyun.com/t/16459
|
|||
|
published: 2024-11-29 19:51:21
|
|||
|
|
|||
|
id: 760
|
|||
|
title: "多引擎"的资产识别、信息收集工具
|
|||
|
link: https://xz.aliyun.com/t/16450
|
|||
|
published: 2024-11-29 09:52:11
|
|||
|
|
|||
|
id: 761
|
|||
|
title: Discuz!x——3.5版本漏洞复现&代码审计
|
|||
|
link: https://xz.aliyun.com/t/16445
|
|||
|
published: 2024-11-28 21:55:27
|
|||
|
|
|||
|
id: 762
|
|||
|
title: 堆学习之Tcache Stashing Unlink Attacke
|
|||
|
link: https://xz.aliyun.com/t/16444
|
|||
|
published: 2024-11-28 21:45:49
|
|||
|
|
|||
|
id: 763
|
|||
|
title: 脱离C2的自动路由,实战中如何将4以上层内网的穿透,4dnat+新版frp+proxifier使用
|
|||
|
link: https://xz.aliyun.com/t/16443
|
|||
|
published: 2024-11-28 20:01:00
|
|||
|
|
|||
|
id: 764
|
|||
|
title: Ubuntu needrestart权限提升漏洞(CVE-2024-48990)漏洞分析
|
|||
|
link: https://xz.aliyun.com/t/16442
|
|||
|
published: 2024-11-28 18:19:43
|
|||
|
|
|||
|
id: 765
|
|||
|
title: 大模型多轮越狱技术分析与实现
|
|||
|
link: https://xz.aliyun.com/t/16441
|
|||
|
published: 2024-11-28 17:22:22
|
|||
|
|
|||
|
id: 766
|
|||
|
title: 2024NewStarCTF Week5 Pwn方向复现
|
|||
|
link: https://xz.aliyun.com/t/16439
|
|||
|
published: 2024-11-28 16:51:11
|
|||
|
|
|||
|
id: 767
|
|||
|
title: CVE-2024-22399 - SwingLazyValue利用链构造分析
|
|||
|
link: https://xz.aliyun.com/t/16436
|
|||
|
published: 2024-11-28 14:53:03
|
|||
|
|
|||
|
id: 768
|
|||
|
title: 第七届浙江省大学生网络与信息安全竞赛决赛 Misc方向全解
|
|||
|
link: https://xz.aliyun.com/t/16435
|
|||
|
published: 2024-11-28 14:51:55
|
|||
|
|
|||
|
id: 769
|
|||
|
title: 网鼎杯玄武 crypto 0:解析变形的 Shamir 密钥分享机制
|
|||
|
link: https://xz.aliyun.com/t/16433
|
|||
|
published: 2024-11-28 13:53:57
|
|||
|
|
|||
|
id: 770
|
|||
|
title: 记一次SSTI长度限制绕过
|
|||
|
link: https://xz.aliyun.com/t/16432
|
|||
|
published: 2024-11-28 11:50:02
|
|||
|
|
|||
|
id: 771
|
|||
|
title: windows注入 r3级强制结束进程
|
|||
|
link: https://xz.aliyun.com/t/16427
|
|||
|
published: 2024-11-27 23:46:31
|
|||
|
|
|||
|
id: 772
|
|||
|
title: 2024网鼎杯 crypto(青龙朱雀白虎) wp
|
|||
|
link: https://xz.aliyun.com/t/16426
|
|||
|
published: 2024-11-27 21:27:21
|
|||
|
|
|||
|
id: 773
|
|||
|
title: 基于realloc函数的堆攻击
|
|||
|
link: https://xz.aliyun.com/t/16424
|
|||
|
published: 2024-11-27 21:02:00
|
|||
|
|
|||
|
id: 774
|
|||
|
title: Java反序列化攻击链:深入剖析与实战
|
|||
|
link: https://xz.aliyun.com/t/16423
|
|||
|
published: 2024-11-27 20:14:00
|
|||
|
|
|||
|
id: 775
|
|||
|
title: 从DAS暑期挑战赛的一道题来理解largebinattack的攻击流程
|
|||
|
link: https://xz.aliyun.com/t/16422
|
|||
|
published: 2024-11-27 18:27:00
|
|||
|
|
|||
|
id: 776
|
|||
|
title: 验证码攻防问题总结分享
|
|||
|
link: https://xz.aliyun.com/t/16421
|
|||
|
published: 2024-11-27 17:17:43
|
|||
|
|
|||
|
id: 777
|
|||
|
title: Newstar Week5 WEB详细解析全
|
|||
|
link: https://xz.aliyun.com/t/16419
|
|||
|
published: 2024-11-27 15:11:46
|
|||
|
|
|||
|
id: 778
|
|||
|
title: ecology checkPassword 代码执行
|
|||
|
link: https://xz.aliyun.com/t/16418
|
|||
|
published: 2024-11-27 14:37:03
|
|||
|
|
|||
|
id: 779
|
|||
|
title: JAVA安全之JMX攻防研究分析
|
|||
|
link: https://xz.aliyun.com/t/16417
|
|||
|
published: 2024-11-27 14:21:00
|
|||
|
|
|||
|
id: 780
|
|||
|
title: 2024 强网杯qroute详细解析
|
|||
|
link: https://xz.aliyun.com/t/16416
|
|||
|
published: 2024-11-27 12:38:51
|
|||
|
|
|||
|
id: 781
|
|||
|
title: 第八届强网杯青少年专项赛线上选拔赛ctf题解
|
|||
|
link: https://xz.aliyun.com/t/16414
|
|||
|
published: 2024-11-27 11:36:27
|
|||
|
|
|||
|
id: 782
|
|||
|
title: 调用网页JS解决前端加密
|
|||
|
link: https://xz.aliyun.com/t/16413
|
|||
|
published: 2024-11-27 10:22:44
|
|||
|
|
|||
|
id: 783
|
|||
|
title: go的栈溢出详细解析
|
|||
|
link: https://xz.aliyun.com/t/16411
|
|||
|
published: 2024-11-27 00:26:47
|
|||
|
|
|||
|
id: 784
|
|||
|
title: pwn堆利用之unlink
|
|||
|
link: https://xz.aliyun.com/t/16409
|
|||
|
published: 2024-11-26 22:41:40
|
|||
|
|
|||
|
id: 785
|
|||
|
title: 第二届龙信杯服务器取证复现
|
|||
|
link: https://xz.aliyun.com/t/16408
|
|||
|
published: 2024-11-26 20:38:10
|
|||
|
|
|||
|
id: 786
|
|||
|
title: 条件竞争glibc堆的详细讲解
|
|||
|
link: https://xz.aliyun.com/t/16498
|
|||
|
published: 2024-11-26 18:24:00
|
|||
|
|
|||
|
id: 787
|
|||
|
title: 2024网鼎杯半决card_master详细分析
|
|||
|
link: https://xz.aliyun.com/t/16406
|
|||
|
published: 2024-11-26 18:04:17
|
|||
|
|
|||
|
id: 788
|
|||
|
title: Apache HertzBeat 漏洞复现三则
|
|||
|
link: https://xz.aliyun.com/t/16404
|
|||
|
published: 2024-11-26 16:22:00
|
|||
|
|
|||
|
id: 789
|
|||
|
title: Sharp4CompilerLoader:通过动态编译混淆代码执行Shellcode
|
|||
|
link: https://xz.aliyun.com/t/16401
|
|||
|
published: 2024-11-26 14:39:11
|
|||
|
|
|||
|
id: 790
|
|||
|
title: 2024网鼎杯半决赛RE全题解
|
|||
|
link: https://xz.aliyun.com/t/16400
|
|||
|
published: 2024-11-26 13:53:43
|
|||
|
|
|||
|
id: 791
|
|||
|
title: IOT安全的入门经典——DIR-815漏洞复现
|
|||
|
link: https://xz.aliyun.com/t/16399
|
|||
|
published: 2024-11-26 10:04:00
|
|||
|
|
|||
|
id: 792
|
|||
|
title: 强网青少年二进制和杂项wp
|
|||
|
link: https://xz.aliyun.com/t/16398
|
|||
|
published: 2024-11-26 02:29:47
|
|||
|
|
|||
|
id: 793
|
|||
|
title: 强网拟态2024白盒资格赛turn详解
|
|||
|
link: https://xz.aliyun.com/t/16397
|
|||
|
published: 2024-11-26 00:47:06
|
|||
|
|
|||
|
id: 794
|
|||
|
title: 对MSC文件再利用实现过父过流量免杀
|
|||
|
link: https://xz.aliyun.com/t/16394
|
|||
|
published: 2024-11-25 23:12:52
|
|||
|
|
|||
|
id: 795
|
|||
|
title: Patchwork(白象)APT组织Protego远控木马攻击场景复现
|
|||
|
link: https://xz.aliyun.com/t/16392
|
|||
|
published: 2024-11-25 22:38:00
|
|||
|
|
|||
|
id: 796
|
|||
|
title: 游戏漏洞挖掘思路分享
|
|||
|
link: https://xz.aliyun.com/t/16391
|
|||
|
published: 2024-11-25 22:37:00
|
|||
|
|
|||
|
id: 797
|
|||
|
title: glibc内存管理分析
|
|||
|
link: https://xz.aliyun.com/t/16390
|
|||
|
published: 2024-11-25 22:15:06
|
|||
|
|
|||
|
id: 798
|
|||
|
title: 某系统代码审计RCE
|
|||
|
link: https://xz.aliyun.com/t/16389
|
|||
|
published: 2024-11-25 21:02:20
|
|||
|
|
|||
|
id: 799
|
|||
|
title: 2024网鼎杯半决赛-pwn
|
|||
|
link: https://xz.aliyun.com/t/16386
|
|||
|
published: 2024-11-25 19:56:34
|
|||
|
|
|||
|
id: 800
|
|||
|
title: 第四届网鼎杯半决赛-安全运营挑战赛加固修复Part学习&分析
|
|||
|
link: https://xz.aliyun.com/t/16385
|
|||
|
published: 2024-11-25 18:06:00
|
|||
|
|
|||
|
name: articles
|
|||
|
seq: 800
|
|||
|
|