update
This commit is contained in:
parent
7db914a20e
commit
163f6cf48d
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
142
JSON/4hou.json
142
JSON/4hou.json
File diff suppressed because one or more lines are too long
@ -1,162 +0,0 @@
|
||||
[
|
||||
{
|
||||
"guid": "https://www.anquanke.com/post/id/302977",
|
||||
"title": "NDSS 2025|抖音集团安全研究团队提出机密沙箱内存管理方案WAVEN",
|
||||
"author": " 字节跳动安全中心",
|
||||
"description": null,
|
||||
"source": null,
|
||||
"pubDate": "2024-12-24 13:01:55"
|
||||
},
|
||||
{
|
||||
"guid": "https://www.anquanke.com/post/id/302974",
|
||||
"title": "呈贡区政府携手360,共绘昆明市数字经济发展新蓝图!",
|
||||
"author": " 安全客",
|
||||
"description": null,
|
||||
"source": "微信",
|
||||
"pubDate": "2024-12-24 11:26:19"
|
||||
},
|
||||
{
|
||||
"guid": "https://www.anquanke.com/post/id/302971",
|
||||
"title": "CVE-2024-53552 (CVSS 9.8): CrushFTP 漏洞使用户面临账户接管风险",
|
||||
"author": " 安全客",
|
||||
"description": null,
|
||||
"source": "securityonline",
|
||||
"pubDate": "2024-12-24 11:23:02"
|
||||
},
|
||||
{
|
||||
"guid": "https://www.anquanke.com/post/id/302968",
|
||||
"title": "CVE-2024-12828 (CVSS 9.9): Webmin 漏洞导致数百万台服务器暴露于 RCE",
|
||||
"author": " 安全客",
|
||||
"description": null,
|
||||
"source": "securityonline",
|
||||
"pubDate": "2024-12-24 11:16:49"
|
||||
},
|
||||
{
|
||||
"guid": "https://www.anquanke.com/post/id/302963",
|
||||
"title": "针对 CVE-2024-30085:Windows 权限提升漏洞发布 PoC 漏洞利用程序",
|
||||
"author": " 安全客",
|
||||
"description": null,
|
||||
"source": "securityonline",
|
||||
"pubDate": "2024-12-24 11:09:25"
|
||||
},
|
||||
{
|
||||
"guid": "https://www.anquanke.com/post/id/302960",
|
||||
"title": "Aave 考虑整合 Chainlink,将 MEV 费用返还给用户",
|
||||
"author": " 安全客",
|
||||
"description": null,
|
||||
"source": "Cointelegraph.com News",
|
||||
"pubDate": "2024-12-24 11:04:04"
|
||||
},
|
||||
{
|
||||
"guid": "https://www.anquanke.com/post/id/302957",
|
||||
"title": "勒索软件攻击暴露了 560 万 Ascension 患者的数据",
|
||||
"author": " 安全客",
|
||||
"description": null,
|
||||
"source": "infosecurity",
|
||||
"pubDate": "2024-12-24 10:53:52"
|
||||
},
|
||||
{
|
||||
"guid": "https://www.anquanke.com/post/id/302954",
|
||||
"title": "黑客利用 Fortinet EMS 的关键漏洞部署远程访问工具",
|
||||
"author": " 安全客",
|
||||
"description": null,
|
||||
"source": "TheHackersNews",
|
||||
"pubDate": "2024-12-24 10:46:09"
|
||||
},
|
||||
{
|
||||
"guid": "https://www.anquanke.com/post/id/302951",
|
||||
"title": "供应链攻击攻击 Rspack、Vant 使用 Monero Miner 的 npm 包",
|
||||
"author": " 安全客",
|
||||
"description": null,
|
||||
"source": "hackread",
|
||||
"pubDate": "2024-12-24 10:21:25"
|
||||
},
|
||||
{
|
||||
"guid": "https://www.anquanke.com/post/id/302948",
|
||||
"title": "Lazarus Group 使用 CookiePlus 恶意软件以核工业为目标",
|
||||
"author": " 安全客",
|
||||
"description": null,
|
||||
"source": "hackread",
|
||||
"pubDate": "2024-12-24 10:08:26"
|
||||
},
|
||||
{
|
||||
"guid": "https://www.anquanke.com/post/id/302945",
|
||||
"title": "美国 CISA 将 Acclaim Systems USAHERDS 漏洞列入已知漏洞目录",
|
||||
"author": " 安全客",
|
||||
"description": null,
|
||||
"source": "securityaffairs",
|
||||
"pubDate": "2024-12-24 09:59:10"
|
||||
},
|
||||
{
|
||||
"guid": "https://www.anquanke.com/post/id/302938",
|
||||
"title": "这家医院,利用360本地安全大脑「双子星」开启智能运营时代",
|
||||
"author": " 安全客",
|
||||
"description": null,
|
||||
"source": "微信",
|
||||
"pubDate": "2024-12-23 14:25:19"
|
||||
},
|
||||
{
|
||||
"guid": "https://www.anquanke.com/post/id/302935",
|
||||
"title": "Sophos 针对关键防火墙漏洞发布热修复程序: 更新以防止漏洞利用",
|
||||
"author": " 安全客",
|
||||
"description": null,
|
||||
"source": "TheHackersNews",
|
||||
"pubDate": "2024-12-23 14:17:59"
|
||||
},
|
||||
{
|
||||
"guid": "https://www.anquanke.com/post/id/302932",
|
||||
"title": "Diicot 威胁组织利用高级恶意软件攻击 Linux",
|
||||
"author": " 安全客",
|
||||
"description": null,
|
||||
"source": "securityonline",
|
||||
"pubDate": "2024-12-23 11:29:40"
|
||||
},
|
||||
{
|
||||
"guid": "https://www.anquanke.com/post/id/302929",
|
||||
"title": "罗克韦尔自动化 PowerMonitor 1000 设备存在严重漏洞: CVSS 分数达到 9.8/10",
|
||||
"author": " 安全客",
|
||||
"description": null,
|
||||
"source": "securityonline",
|
||||
"pubDate": "2024-12-23 11:22:11"
|
||||
},
|
||||
{
|
||||
"guid": "https://www.anquanke.com/post/id/302926",
|
||||
"title": "LockBit 开发人员 Rostislav Panev 被控在全球勒索软件中造成数十亿美元损失",
|
||||
"author": " 安全客",
|
||||
"description": null,
|
||||
"source": "TheHackersNews",
|
||||
"pubDate": "2024-12-23 11:15:17"
|
||||
},
|
||||
{
|
||||
"guid": "https://www.anquanke.com/post/id/302923",
|
||||
"title": "CVE-2024-51466 (CVSS 9.0): 在 IBM Cognos Analytics 中发现严重漏洞",
|
||||
"author": " 安全客",
|
||||
"description": null,
|
||||
"source": "securityonline",
|
||||
"pubDate": "2024-12-23 11:04:10"
|
||||
},
|
||||
{
|
||||
"guid": "https://www.anquanke.com/post/id/302920",
|
||||
"title": "以太坊和 Solana NFT 骗子在 2200 万美元的拉扯计划中被起诉",
|
||||
"author": " 安全客",
|
||||
"description": null,
|
||||
"source": "Decrypt",
|
||||
"pubDate": "2024-12-23 10:59:56"
|
||||
},
|
||||
{
|
||||
"guid": "https://www.anquanke.com/post/id/302917",
|
||||
"title": "NotLockBit:新型跨平台勒索软件威胁 Windows 和 macOS",
|
||||
"author": " 安全客",
|
||||
"description": null,
|
||||
"source": "securityonline",
|
||||
"pubDate": "2024-12-23 10:52:28"
|
||||
},
|
||||
{
|
||||
"guid": "https://www.anquanke.com/post/id/302914",
|
||||
"title": "新的 Skuld 信息窃取活动在 npm 生态系统中亮相",
|
||||
"author": " 安全客",
|
||||
"description": null,
|
||||
"source": "securityonline",
|
||||
"pubDate": "2024-12-23 10:40:23"
|
||||
}
|
||||
]
|
1602
JSON/doonsec.json
1602
JSON/doonsec.json
File diff suppressed because it is too large
Load Diff
@ -1,161 +0,0 @@
|
||||
[
|
||||
{
|
||||
"title": "附原文 |《2024年漏洞与威胁趋势报告》深度解读",
|
||||
"link": "https://www.freebuf.com/vuls/418381.html",
|
||||
"description": "新发现漏洞的数量出现了前所未有的增长态势,其中高危或严重级别的漏洞占比高达一半,漏洞利用的时间线显著缩短。",
|
||||
"body": "<p>在信息技术飞速发展的当下,网络安全已然成为全球瞩目的焦点。<strong>安全极客社区</strong>精心译制的<strong>《2024 年漏洞与威胁趋势报告》</strong>明确指出,2023 年堪称网络安全领域的重要分水岭。这一年,新发现漏洞的数量出现了前所未有的增长态势,其中高危或严重级别的漏洞占比高达一半,漏洞利用的时间线显著缩短,然而平均修复时间却过长。金融服务、制造业以及公",
|
||||
"category": "漏洞",
|
||||
"pubDate": "Tue, 24 Dec 2024 11:41:51 +0800"
|
||||
},
|
||||
{
|
||||
"title": "看不到的尽头,回顾与展望哈以冲突以来的中东网络战",
|
||||
"link": "https://www.freebuf.com/news/418373.html",
|
||||
"description": "自 2023 年 10 月以来,以色列和哈马斯之间爆发的冲突助长了中东国家之间的网络攻击,并在全球范围内将多个国家卷入其中。",
|
||||
"body": "<blockquote><p>自 2023 年 10 月以来,以色列和哈马斯之间爆发的冲突助长了中东国家之间的网络攻击,并在全球范围内将多个国家卷入其中。</p></blockquote><p><img src=\"https://image.3001.net/images/20241224/1735010904_676a2a5813f06e7c26f0e.jpg!small\" width=\"690",
|
||||
"category": "资讯",
|
||||
"pubDate": "Tue, 24 Dec 2024 11:16:59 +0800"
|
||||
},
|
||||
{
|
||||
"title": "AI可一键生成上万种恶意软件变体,88%能规避检测",
|
||||
"link": "https://www.freebuf.com/news/418362.html",
|
||||
"description": "通过大量转换,这种方法可能降低恶意软件分类系统的性能,甚至使其误判恶意代码为良性。",
|
||||
"body": "<p>网络安全研究人员发现,借助大型语言模型(LLMs),可以大规模生成新型恶意的JavaScript代码变体,这些变体将更难被安全防护设备检测。</p><p><img src=\"https://image.3001.net/images/20241224/1735007590_676a1d6669e16b1a72d60.png!small\" alt=\"\" /></p><p>Palo Alto N",
|
||||
"category": "资讯",
|
||||
"pubDate": "Tue, 24 Dec 2024 10:26:42 +0800"
|
||||
},
|
||||
{
|
||||
"title": "广州标品软件有限公司招聘啦!",
|
||||
"link": "https://www.freebuf.com/jobs/418341.html",
|
||||
"description": "岗位多多,待遇丰厚,想要换工作的老师傅别错过。",
|
||||
"body": "<h2 id=\"h2-1\">职位描述</h2><p>1. 负责产品的黑白盒安全测试,挖掘通用web安全漏洞和业务逻辑漏洞并推进修复;<br />2. 负责产品的架构安全评审,能识别产品安全风险,并提供安全解决方案并推进落地;<br />3. 负责产品线的安全应急响应工作,能组织产品设计和研发团队,协同其它相关职能团队,完成安全入侵事件、安全漏洞的应急处置</p><h2 id=\"h2-2\"><str",
|
||||
"category": "安全招聘",
|
||||
"pubDate": "Mon, 23 Dec 2024 17:47:00 +0800"
|
||||
},
|
||||
{
|
||||
"title": "FreeBuf早报 | 中国网民网络安全感满意度指数6连升;印度麦当劳漏洞开启“零元购”",
|
||||
"link": "https://www.freebuf.com/news/418324.html",
|
||||
"description": "报告显示,2024年网民网络安全感满意度指数为75.179,与2023年相比上升了2.665,指数上升幅度明显,实现连续6年上升。",
|
||||
"body": "<h2 id=\"h2-1\">全球动态</h2><h3 id=\"h3-1\">1. 连续6年上升!2024年网民网络安全感满意度指数在京发布</h3><p>报告显示,2024年网民网络安全感满意度指数为75.179,迈上75分台阶,为较好偏好的水平。与2023年相比上升了2.665,指数上升幅度明显,实现连续6年上升。 【<a href=\"https://baijiahao.baidu.com/s?i",
|
||||
"category": "资讯",
|
||||
"pubDate": "Mon, 23 Dec 2024 16:13:01 +0800"
|
||||
},
|
||||
{
|
||||
"title": "热门npm包被植入加密挖矿软件,感染目标涉及中国",
|
||||
"link": "https://www.freebuf.com/news/418283.html",
|
||||
"description": "一些热门的npm包遭到入侵,攻击者利用窃取到的令牌将带有加密挖矿恶意软件的版本发布到了官方包注册表中。",
|
||||
"body": "<p>近日,有研究人员发现,一些热门的npm包遭到入侵,攻击者利用窃取到的令牌将带有加密挖矿恶意软件的版本发布到了官方包注册表中。</p><p><img src=\"https://image.3001.net/images/20241223/1734923188_6768d3b43b4aef9d56e84.png!small\" alt=\"\" /></p><p>Rspack 的开发人员透露,他们的两",
|
||||
"category": "资讯",
|
||||
"pubDate": "Mon, 23 Dec 2024 10:56:23 +0800"
|
||||
},
|
||||
{
|
||||
"title": "账号和密钥明文存储,AI平台1.29T数据库裸奔",
|
||||
"link": "https://www.freebuf.com/news/418279.html",
|
||||
"description": "Builder.ai由于数据库配置错误,该平台遭遇了重大数据泄露事件,共计泄露数据超过300万条,1.29TB。",
|
||||
"body": "<h3 id=\"h3-1\">核心摘要</h3><ul><li>未加密数据库泄露:Builder.ai 一个未加密的数据库被公开访问,包含超过300万条记录,总计1.29TB,导致客户和内部数据泄露。</li><li>敏感信息外泄:泄露信息包括发票、保密协议、税务文件、电子邮件截图和云存储密钥,使客户个人信息和公司内部运作面临风险。</li><li>潜在攻击风险:泄露可能导致钓鱼攻击、伪造发票欺诈、",
|
||||
"category": "资讯",
|
||||
"pubDate": "Mon, 23 Dec 2024 10:49:05 +0800"
|
||||
},
|
||||
{
|
||||
"title": "FreeBuf早报 | npm包供应链攻击来袭;LockBit4.0发布倒计时",
|
||||
"link": "https://www.freebuf.com/news/418224.html",
|
||||
"description": "Rspack的开发人员透露,他们的两个npm包在一场软件供应链攻击中,被攻击者在官方包注册表中植入挖矿病毒。",
|
||||
"body": "<h2 id=\"h2-1\">全球动态</h2><h3 id=\"h3-1\">1. 安卓间谍软件“BMI CalculationVsn”在亚马逊应用商店被发现</h3><p>一款名为“BMI CalculationVsn”的恶意安卓间谍软件在亚马逊应用商店被发现,该软件伪装成一个简单的健康工具,但在后台窃取感染设备的数据。【外刊-<a href=\"https://www.bleepingcompute",
|
||||
"category": "资讯",
|
||||
"pubDate": "Fri, 20 Dec 2024 20:02:14 +0800"
|
||||
},
|
||||
{
|
||||
"title": "一周网安优质PDF资源推荐丨FreeBuf知识大陆",
|
||||
"link": "https://www.freebuf.com/articles/418216.html",
|
||||
"description": "我们精选了本周知识大陆公开发布的10条优质资源,让我们一起看看吧。",
|
||||
"body": "<p>各位读者周末好,以下是本周「FreeBuf知识大陆一周优质资源推荐」,我们精选了本周知识大陆公开发布的10条优质资源,让我们一起看看吧。</p><p><img src=\"https://image.3001.net/images/20241220/1734685626_676533ba7e10dc35a755b.png!small\" width=\"690\" height=\"1200\" alt",
|
||||
"pubDate": "Fri, 20 Dec 2024 17:28:54 +0800"
|
||||
},
|
||||
{
|
||||
"title": "FreeBuf周报 | 间谍软件Paragon被美国私募收购;攻击者窃取39万个WordPress凭证",
|
||||
"link": "https://www.freebuf.com/news/418196.html",
|
||||
"description": "总结推荐本周的热点资讯、安全事件、一周好文和省心工具,保证大家不错过本周的每一个重点!",
|
||||
"body": "<p>各位 Buffer 周末好,以下是本周「FreeBuf周报」,我们总结推荐了本周的热点资讯、安全事件、一周好文和省心工具,保证大家不错过本周的每一个重点!<img src=\"https://image.3001.net/images/20220923/1663923572_632d7574ead5a97f52086.jpg!small\" alt=\"\" /></p><h2 id=\"h2-1\">",
|
||||
"category": "资讯",
|
||||
"pubDate": "Fri, 20 Dec 2024 15:18:00 +0800"
|
||||
},
|
||||
{
|
||||
"title": "实战攻防 | 针对JS路径的泄露和Webpack漏洞的初探",
|
||||
"link": "https://www.freebuf.com/defense/418171.html",
|
||||
"description": "0x1前言浅谈这篇文章给师傅们分享下前段时间跟其他师傅学习和交流的Webpack相关漏洞,这个漏洞相对来说比较冷门,在web漏洞中不是那么的热度高,但是平常去挖掘和发现这个漏洞相对来说还是不难的。后面要是有机会可以给师傅们分享下油猴的相关脚本去找Webpack漏洞泄露的js敏感路径,然后打一波Webpack漏洞。在企业src和众测中有些平台还是收的,不收的话就当学习了,收了咱们就赚了哈![upl-",
|
||||
"body": "<h2 id=\"h2-1\">0x1前言</h2><h3 id=\"h3-1\">浅谈</h3><p>这篇文章给师傅们分享下前段时间跟其他师傅学习和交流的Webpack相关漏洞,这个漏洞相对来说比较冷门,在web漏洞中不是那么的热度高,但是平常去挖掘和发现这个漏洞相对来说还是不难的。</p><p>后面要是有机会可以给师傅们分享下油猴的相关脚本去找Webpack漏洞泄露的js敏感路径,然后打一波Webpa",
|
||||
"category": "攻防演练",
|
||||
"pubDate": "Fri, 20 Dec 2024 13:07:19 +0800"
|
||||
},
|
||||
{
|
||||
"title": "浅谈src挖掘中——文件上传和XSS漏洞的组合拳",
|
||||
"link": "https://www.freebuf.com/vuls/418170.html",
|
||||
"description": "给师傅们整理了下pdf木马制作的过程以及最后面分享下我一次在测文件上传最后也是getshell了。",
|
||||
"body": "<h2 id=\"h2-1\">0x1 前言</h2><p>哈喽,师傅们好!<br />这次打算给师弟们分享的是XSS之Flash弹窗钓鱼和文件上传getshell各种姿势的内容,然后先是给小白师傅们简单介绍下XSS漏洞和文件上传漏洞。然后后面给师傅们简单演示了XSS之Flash弹窗钓鱼,然后后面很详细的介绍了文件上传和XSS漏洞的组合拳的好几种方式,后面也是通过对一个站点的测试,给师傅们演示了一波。",
|
||||
"category": "漏洞",
|
||||
"pubDate": "Fri, 20 Dec 2024 13:05:57 +0800"
|
||||
},
|
||||
{
|
||||
"title": "新观点!CISO们无需迷信LLMs",
|
||||
"link": "https://www.freebuf.com/articles/neopoints/418166.html",
|
||||
"description": "尽管LLMs具有巨大的潜力,但网络犯罪分子并未充分利用这一技术来提升其攻击能力。",
|
||||
"body": "<p>近年来,网络安全专家一直在呼吁拓展CISO的职责范围,以应对日益复杂的网络威胁。生成式AI的出现,尤其是大型语言模型(LLMs)为网络安全带来了新的挑战。尽管LLMs具有巨大的潜力,但网络犯罪分子并未充分利用这一技术来提升其攻击能力。</p><p><img src=\"https://image.3001.net/images/20241220/1734664298_6764e06a38f9b",
|
||||
"category": "观点",
|
||||
"pubDate": "Fri, 20 Dec 2024 11:11:43 +0800"
|
||||
},
|
||||
{
|
||||
"title": "FortiWLM 曝关键漏洞,攻击者可获得管理员权限",
|
||||
"link": "https://www.freebuf.com/news/418163.html",
|
||||
"description": "Fortinet 披露了FortiWLM中的一个严重漏洞,该漏洞允许远程攻击者通过特制的 Web 请求执行未经授权的代码或命令来接管设备。",
|
||||
"body": "<p>Fortinet 披露了 Fortinet Wireless Manager (FortiWLM) 中的一个严重漏洞,该漏洞允许远程攻击者通过特制的 Web 请求执行未经授权的代码或命令来接管设备。</p><p><img src=\"https://image.3001.net/images/20241220/1734664149_6764dfd5a27eb8388227f.png!small",
|
||||
"category": "资讯",
|
||||
"pubDate": "Fri, 20 Dec 2024 11:07:13 +0800"
|
||||
},
|
||||
{
|
||||
"title": "Google 日历沦为钓鱼新工具,可有效绕过安全防护机制",
|
||||
"link": "https://www.freebuf.com/news/418157.html",
|
||||
"description": "Google 工作空间中广泛应用的日程管理工具 Google 日历已成为网络犯罪分子的新攻击目标。",
|
||||
"body": "<p><img src=\"https://image.3001.net/images/20241220/1734662612_6764d9d4772dc02e7f1eb.jpg!small\" alt=\"\" /></p><p>根据 Check Point 与 Hackread.com 共同发布的最新研究报告,Google 工作空间中广泛应用的日程管理工具 Google 日历已成为网络犯罪分子的新攻击",
|
||||
"category": "资讯",
|
||||
"pubDate": "Fri, 20 Dec 2024 10:43:16 +0800"
|
||||
},
|
||||
{
|
||||
"title": "FreeBuf早报 | CNCERT处置两起美对我科技单位攻击事件;Fortinet发布严重漏洞警告",
|
||||
"link": "https://www.freebuf.com/news/418131.html",
|
||||
"description": "国家互联网应急中心发现处置两起美对我大型科技企业机构进行网络攻击窃取商业秘密事件。",
|
||||
"body": "<h2 id=\"h2-1\">全球动态</h2><h3 id=\"h3-1\">1.《网络安全标准实践指南——移动互联网未成年人模式技术要求》公开征求意见</h3><p>本指南规定了移动互联网未成年人模式的技术要求,包括移动智能终端、应用程序、移动应用程序分发平台未成年人模式技术要求以及模式联动技术要求。 【<a href=\"https://www.secrss.com/articles/73671\">",
|
||||
"category": "资讯",
|
||||
"pubDate": "Thu, 19 Dec 2024 17:44:40 +0800"
|
||||
},
|
||||
{
|
||||
"title": "什么?远控程序被黑客利用了?",
|
||||
"link": "https://www.freebuf.com/articles/system/397790.html",
|
||||
"description": "部分第三方公司,为了方便运维,会在服务器部署远程软件或者是内网穿透工具,如果该供应链遭受打击,那么基本可以说G。所以无思路时,不妨考虑考虑远程软件。",
|
||||
"body": "<p class=\"tinymce-p\">author:深信服MSS专家部@爱做梦的大米饭</p><h2 id=\"h2-1\">分析目标</h2><p>向日葵、todesk、RayLink</p><h2 id=\"h2-2\">前言</h2><p>大风起兮云飞扬<strong>,安得猛士兮走四方!攻击,任何时候都要防!不防不行!你们想想,你带着对象出了城,吃着火锅还唱着歌,客户突然就被黑客打啦!所以,没",
|
||||
"category": "系统安全",
|
||||
"pubDate": "Thu, 19 Dec 2024 17:10:44 +0800"
|
||||
},
|
||||
{
|
||||
"title": "微软 Teams 成了黑客社工的“最佳方法”?",
|
||||
"link": "https://www.freebuf.com/news/418092.html",
|
||||
"description": "一项新的社会工程活动显示,大量攻击者利用微软Teams作为部署已知恶意软件DarkGate的手段。",
|
||||
"body": "<p>一项新的社会工程活动显示,大量攻击者利用微软Teams作为部署已知恶意软件DarkGate的手段。Trend Micro研究人员Catherine Loveria、Jovit Samaniego和Gabriel Nicoleta表示,“攻击者通过微软Teams电话进行社会工程,冒充用户的客户并获得远程访问他们系统的权利。攻击者未能安装微软远程支持应用程序,但成功指示受害者下载AnyDesk,",
|
||||
"category": "资讯",
|
||||
"pubDate": "Thu, 19 Dec 2024 14:20:56 +0800"
|
||||
},
|
||||
{
|
||||
"title": "Apache Tomcat新漏洞允许攻击者执行远程代码",
|
||||
"link": "https://www.freebuf.com/news/418076.html",
|
||||
"description": "安全研究人员在流行的Apache Tomcat和servlet 容器中发现了两个严重漏洞,可能允许攻击者执行远程代码并导致拒绝服务。",
|
||||
"body": "<p>据Cyber Security News消息,安全研究人员在流行的开源 Web 服务器 Apache Tomcat和servlet 容器中发现了两个严重漏洞,可能允许攻击者执行远程代码并导致拒绝服务。</p><p><img src=\"https://image.3001.net/images/20241219/1734577955_67638f231bb575b81f505.jpg!smal",
|
||||
"category": "资讯",
|
||||
"pubDate": "Thu, 19 Dec 2024 11:12:11 +0800"
|
||||
},
|
||||
{
|
||||
"title": "CISA发布2024年首个云安全操作指令",
|
||||
"link": "https://www.freebuf.com/news/418073.html",
|
||||
"description": "BOD 25-01指令旨在通过强制云服务实施安全措施来减少美国联邦网络的攻击面。",
|
||||
"body": "<p>12月17日,CISA 发布了今年第一部具有约束力的操作指令《绑定操作指令25-01:实施云服务安全实践》(BOD 25-01指令 ),要求美国联邦民事机构实施一系列必需的安全配置基线(SCB)以保护其云环境。BOD 25-01指令旨在通过强制云服务实施安全措施来减少美国联邦网络的攻击面,要求美国联邦机构部署CISA开发的自动配置评估工具,与持续监控基础设施集成,并纠正与安全配置基线的任何偏",
|
||||
"category": "资讯",
|
||||
"pubDate": "Thu, 19 Dec 2024 10:58:08 +0800"
|
||||
}
|
||||
]
|
122
JSON/huawei.json
122
JSON/huawei.json
@ -1,122 +0,0 @@
|
||||
[
|
||||
{
|
||||
"title": "安全通告 - 涉及华为全屋音乐系统产品的路径穿越漏洞",
|
||||
"pubDate": "2024-12-11T00:00:00",
|
||||
"link": "//www.huawei.com/cn/psirt/security-advisories/2024/huawei-sa-ptvihhms-91f7c6fa-cn",
|
||||
"description": null
|
||||
},
|
||||
{
|
||||
"title": "安全通告 - 华为全屋音乐系统路径穿越漏洞",
|
||||
"pubDate": "2024-06-19T00:00:00",
|
||||
"link": "//www.huawei.com/cn/psirt/security-advisories/2024/huawei-sa-ptvihhms-20747ba3-cn",
|
||||
"description": null
|
||||
},
|
||||
{
|
||||
"title": "安全通告 - 涉及部分华为家庭路由器的连接劫持漏洞",
|
||||
"pubDate": "2024-06-19T00:00:00",
|
||||
"link": "//www.huawei.com/cn/psirt/security-advisories/2024/huawei-sa-chvishhr-d616b19e-cn",
|
||||
"description": null
|
||||
},
|
||||
{
|
||||
"title": "安全通告 - 涉及华为部分家庭路由产品的连接劫持漏洞",
|
||||
"pubDate": "2024-04-24T00:00:00",
|
||||
"link": "//www.huawei.com/cn/psirt/security-advisories/2024/huawei-sa-chvishhr-d50dedde-cn",
|
||||
"description": null
|
||||
},
|
||||
{
|
||||
"title": "安全通告 - 涉及华为智能音箱部分产品的内存溢出漏洞",
|
||||
"pubDate": "2024-04-17T00:00:00",
|
||||
"link": "//www.huawei.com/cn/psirt/security-advisories/2024/huawei-sa-samovishss-28e21e39-cn",
|
||||
"description": null
|
||||
},
|
||||
{
|
||||
"title": "安全通告 - 涉及华为PC部分产品的内存缓冲区边界操作限制不当漏洞",
|
||||
"pubDate": "2024-04-17T00:00:00",
|
||||
"link": "//www.huawei.com/cn/psirt/security-advisories/2024/huawei-sa-hppvtiroowtboamb-bb3261bd-cn",
|
||||
"description": null
|
||||
},
|
||||
{
|
||||
"title": "安全通告 - 涉及华为终端PC部分产品接口权限控制不当的漏洞",
|
||||
"pubDate": "2024-04-17T00:00:00",
|
||||
"link": "//www.huawei.com/cn/psirt/security-advisories/2024/huawei-sa-iiacviahpp-71ce77ee-cn",
|
||||
"description": null
|
||||
},
|
||||
{
|
||||
"title": "安全通告 - 涉及华为终端PC部分产品异常条件检查不当的漏洞",
|
||||
"pubDate": "2024-04-17T00:00:00",
|
||||
"link": "//www.huawei.com/cn/psirt/security-advisories/2024/huawei-sa-hppvticfuoec-8ffde288-cn",
|
||||
"description": null
|
||||
},
|
||||
{
|
||||
"title": "安全通告 - 涉及华为终端PC部分产品对参数长度不一致的处理不当漏洞",
|
||||
"pubDate": "2024-04-17T00:00:00",
|
||||
"link": "//www.huawei.com/cn/psirt/security-advisories/2024/huawei-sa-iholpiiahpp-0ab7d6db-cn",
|
||||
"description": null
|
||||
},
|
||||
{
|
||||
"title": "安全通告 - 涉及华为终端PC部分产品接口权限控制不当的漏洞",
|
||||
"pubDate": "2024-04-17T00:00:00",
|
||||
"link": "//www.huawei.com/cn/psirt/security-advisories/2024/huawei-sa-voiiaciahpp-6376e0c7-cn",
|
||||
"description": null
|
||||
},
|
||||
{
|
||||
"title": "安全通告 - 涉及华为终端智慧屏部分产品的身份认证绕过漏洞",
|
||||
"pubDate": "2023-12-06T00:00:00",
|
||||
"link": "//www.huawei.com/cn/psirt/security-advisories/2023/huawei-sa-ibvishssp-4bf951d4-cn",
|
||||
"description": null
|
||||
},
|
||||
{
|
||||
"title": "安全通告 - 涉及华为路由器产品的流量劫持漏洞",
|
||||
"pubDate": "2023-05-17T00:00:00",
|
||||
"link": "//www.huawei.com/cn/psirt/security-advisories/2023/huawei-sa-thvihr-7015cbae-cn",
|
||||
"description": null
|
||||
},
|
||||
{
|
||||
"title": "安全通告 - 涉及华为某打印机产品的系统命令注入漏洞",
|
||||
"pubDate": "2023-04-26T00:00:00",
|
||||
"link": "//www.huawei.com/cn/psirt/security-advisories/2023/huawei-sa-sciviahpp-6bcddec5-cn",
|
||||
"description": null
|
||||
},
|
||||
{
|
||||
"title": "安全通告 - 涉及华为HiLink AI Life产品的身份认证绕过漏洞",
|
||||
"pubDate": "2023-04-26T00:00:00",
|
||||
"link": "//www.huawei.com/cn/psirt/security-advisories/2023/huawei-sa-iabvihhalp-ea34d670-cn",
|
||||
"description": null
|
||||
},
|
||||
{
|
||||
"title": "安全通告 - 涉及华为某打印机产品的对输入的错误解析类漏洞",
|
||||
"pubDate": "2023-04-26T00:00:00",
|
||||
"link": "//www.huawei.com/cn/psirt/security-advisories/2023/huawei-sa-moivihp-2f201af9-cn",
|
||||
"description": null
|
||||
},
|
||||
{
|
||||
"title": "安全通告 - 涉及华为某打印机产品的对输入的错误解析类漏洞",
|
||||
"pubDate": "2023-04-26T00:00:00",
|
||||
"link": "//www.huawei.com/cn/psirt/security-advisories/2023/huawei-sa-moivihp-73cabdde-cn",
|
||||
"description": null
|
||||
},
|
||||
{
|
||||
"title": "安全通告 - 涉及华为某音箱产品的越界写入漏洞",
|
||||
"pubDate": "2023-03-01T00:00:00",
|
||||
"link": "//www.huawei.com/cn/psirt/security-advisories/2023/huawei-sa-oobwviatp-89e403d4-cn",
|
||||
"description": null
|
||||
},
|
||||
{
|
||||
"title": "关于E5573Cs-322产品存在拒绝服务漏洞的声明",
|
||||
"pubDate": "2023-02-10T00:00:00",
|
||||
"link": "//www.huawei.com/cn/psirt/security-notices/2021/huawei-sn-20230210-01-dos-cn",
|
||||
"description": null
|
||||
},
|
||||
{
|
||||
"title": "安全通告 - 涉及华为儿童智能手表(Simba-AL00)的身份认证绕过漏洞",
|
||||
"pubDate": "2023-02-08T00:00:00",
|
||||
"link": "//www.huawei.com/cn/psirt/security-advisories/2023/huawei-sa-iabvithcswsa-c385b2dc-cn",
|
||||
"description": null
|
||||
},
|
||||
{
|
||||
"title": "安全通告 - 涉及华为全屋智能某软件的不正确的权限分配漏洞",
|
||||
"pubDate": "2023-02-01T00:00:00",
|
||||
"link": "//www.huawei.com/cn/psirt/security-advisories/2023/huawei-sa-ipavihwhis-1556afc2-cn",
|
||||
"description": null
|
||||
}
|
||||
]
|
@ -1,72 +0,0 @@
|
||||
[
|
||||
{
|
||||
"guid": "https://forum.butian.net/share/3998",
|
||||
"title": ".Net Remoting 系列二:Solarwinds ARM 漏洞分析",
|
||||
"description": "本篇主要是以Solarwinds Arm产品介绍自定义ServerChanel的场景,漏洞分析利用是其次,事实上是去年挖的没有详细记录,后续写的,勿怪哈哈哈",
|
||||
"source": "subject",
|
||||
"pubDate": "2024-12-24 10:11:30"
|
||||
},
|
||||
{
|
||||
"guid": "https://forum.butian.net/share/3989",
|
||||
"title": ".Net Remoting 系列一",
|
||||
"description": "前言:笔者在代码审计时碰到许多以.Net Remoting技术开发的应用如SolarWinds、VeeamBackup、Ivanti等产品,尽管随着 WCF 和 gRPC 等更现代化技术的兴起,.NET Remoting 已逐渐淡出主流,但是依然有其研究的价值,本次主要以TcpChannel为主分析其工作原理、应用场景,后续会通过两个漏洞介绍.Net Remoting在不同场景下的利用姿势和挖掘思路",
|
||||
"source": "subject",
|
||||
"pubDate": "2024-12-24 10:11:20"
|
||||
},
|
||||
{
|
||||
"guid": "https://forum.butian.net/share/3940",
|
||||
"title": "样本分析:CyberVolk勒索软件浅析",
|
||||
"description": "样本\n该样本是CyberVolk黑客组织使用的,该组织是一个印度网络犯罪组织,成立于2024 年 3 月 28 日,最初名为 GLORIAMIST India,后来更名为 Cybervolk。\n该勒索样本原本同大多数勒索软件一样,...",
|
||||
"source": "subject",
|
||||
"pubDate": "2024-12-23 10:00:02"
|
||||
},
|
||||
{
|
||||
"guid": "https://forum.butian.net/share/3949",
|
||||
"title": "关于加强防范钓鱼邮件的通知",
|
||||
"description": "一封以“关于加强防范钓鱼邮件的通知”为主题的邮件引起的故事",
|
||||
"source": "subject",
|
||||
"pubDate": "2024-12-23 09:39:07"
|
||||
},
|
||||
{
|
||||
"guid": "https://forum.butian.net/share/3922",
|
||||
"title": "go-pwn中的protobuf",
|
||||
"description": "本文总结了go pwn中有关protobuf的相关内容,一种要手动分析,另一种可以通过pbtk工具提取,并分析了两个经典题目",
|
||||
"source": "subject",
|
||||
"pubDate": "2024-12-20 10:06:26"
|
||||
},
|
||||
{
|
||||
"guid": "https://forum.butian.net/share/3966",
|
||||
"title": "强制解码越狱大模型",
|
||||
"description": "安全对齐(Safety Alignment)在人工智能(AI)和大规模语言模型(LLM)的研究中,指的是确保这些模型的行为与预期的社会伦理和安全标准相一致,从而防止模型产生有害、偏见或不当的输出。这一概念源自对AI系统潜在滥用和误用的担忧,尤其是在这些系统被应用于开放、未经监管的环境时",
|
||||
"source": "subject",
|
||||
"pubDate": "2024-12-19 09:31:59"
|
||||
},
|
||||
{
|
||||
"guid": "https://forum.butian.net/share/3941",
|
||||
"title": "Stealer信息窃取恶意软件技术浅析",
|
||||
"description": "样本分析\n该样本是一个信息窃取恶意软件,这类恶意软件因能够窃取关键数据(如系统详细信息、自动填充数据、信用卡信息、Cookies、浏览历史、用户名和密码以及加密货币钱包数据)而存在重大风险...",
|
||||
"source": "subject",
|
||||
"pubDate": "2024-12-18 10:02:57"
|
||||
},
|
||||
{
|
||||
"guid": "https://forum.butian.net/share/3947",
|
||||
"title": "libc2.35时代IO利用模板总结",
|
||||
"description": "libc2.35后去除了常用的hook,通过漏洞获取shell的方式大都变为了IO利用或者栈上ROP链。而IO利用又比较模板化,本文总结了常用了IO系列的模板化payload,方便各位师傅们比赛中拿来即用。",
|
||||
"source": "subject",
|
||||
"pubDate": "2024-12-17 10:00:02"
|
||||
},
|
||||
{
|
||||
"guid": "https://forum.butian.net/share/3939",
|
||||
"title": "初探 MedusaLocker 勒索软件",
|
||||
"description": "前言\nMedusaLocker是一种自2019年9月开始活跃的勒索软件,主要针对Windows系统。该恶意软件通过加密受害者的文件,要求支付赎金以恢复访问权限。\n样本分析\nIOC\n\n一个32位的可执行文件。\nWinMain...",
|
||||
"source": "subject",
|
||||
"pubDate": "2024-12-17 09:00:01"
|
||||
},
|
||||
{
|
||||
"guid": "https://forum.butian.net/share/3937",
|
||||
"title": "vbs脚本传播银行木马变体样本分析",
|
||||
"description": "样本分析\nVBS 第一阶段\n第一阶段是一个高度混淆的独立vbs脚本,它会将包括恶意样本在内的其他有效负载下载到系统上。\n\nvbs脚本前面定义了三个变量,之后重新构造变量,重新组合后,NbCTQqd的值...",
|
||||
"source": "subject",
|
||||
"pubDate": "2024-12-16 10:00:00"
|
||||
}
|
||||
]
|
@ -1,62 +0,0 @@
|
||||
[
|
||||
{
|
||||
"title": "\nSecWiki News 2024-12-01 Review",
|
||||
"link": "\nhttp://www.sec-wiki.com/?2024-12-01",
|
||||
"pubDate": "\nSun, 01 Dec 2024 23:58:20 +0800",
|
||||
"description": "\n<a target='_blank' href='https://mp.weixin.qq.com/s/HKs2d7nqNb4--JElMxSX4A'>X信4.0聊天记录数据库文件解密分析</a> by ourren<br><br>更多最新文章,请访问<a href=http://www.sec-wiki.com/>SecWiki</a>\n"
|
||||
},
|
||||
{
|
||||
"title": "\nSecWiki News 2024-11-30 Review",
|
||||
"link": "\nhttp://www.sec-wiki.com/?2024-11-30",
|
||||
"pubDate": "\nSat, 30 Nov 2024 23:58:20 +0800",
|
||||
"description": "\n今日暂未更新资讯~<br>更多最新文章,请访问<a href=http://www.sec-wiki.com/>SecWiki</a>\n"
|
||||
},
|
||||
{
|
||||
"title": "\nSecWiki News 2024-11-29 Review",
|
||||
"link": "\nhttp://www.sec-wiki.com/?2024-11-29",
|
||||
"pubDate": "\nFri, 29 Nov 2024 23:58:20 +0800",
|
||||
"description": "\n今日暂未更新资讯~<br>更多最新文章,请访问<a href=http://www.sec-wiki.com/>SecWiki</a>\n"
|
||||
},
|
||||
{
|
||||
"title": "\nSecWiki News 2024-11-28 Review",
|
||||
"link": "\nhttp://www.sec-wiki.com/?2024-11-28",
|
||||
"pubDate": "\nThu, 28 Nov 2024 23:58:20 +0800",
|
||||
"description": "\n今日暂未更新资讯~<br>更多最新文章,请访问<a href=http://www.sec-wiki.com/>SecWiki</a>\n"
|
||||
},
|
||||
{
|
||||
"title": "\nSecWiki News 2024-11-27 Review",
|
||||
"link": "\nhttp://www.sec-wiki.com/?2024-11-27",
|
||||
"pubDate": "\nWed, 27 Nov 2024 23:58:20 +0800",
|
||||
"description": "\n<a target='_blank' href='https://mp.weixin.qq.com/s/ZpxvtGcl0zuZP_hGtwZWrA'>大模型供应链研究路线图</a> by ourren<br><br>更多最新文章,请访问<a href=http://www.sec-wiki.com/>SecWiki</a>\n"
|
||||
},
|
||||
{
|
||||
"title": "\nSecWiki News 2024-11-26 Review",
|
||||
"link": "\nhttp://www.sec-wiki.com/?2024-11-26",
|
||||
"pubDate": "\nTue, 26 Nov 2024 23:58:20 +0800",
|
||||
"description": "\n<a target='_blank' href='https://mp.weixin.qq.com/s/lnqPULgXcg4Nr0xxhOOUlw'>Botconf 2024 议题慢递</a> by Avenger<br><br><a target='_blank' href='https://blog.xlab.app/p/4db211d3/'>Chrome扩展攻击指南(三):全局视角</a> by tmr<br><br><a target='_blank' href='https://blog.xlab.app/p/4db211d2/'>Chrome扩展攻击指南(二):漏洞分析</a> by tmr<br><br><a target='_blank' href='https://blog.xlab.app/p/4db211d1/'>Chrome扩展攻击指南(一):基础知识</a> by tmr<br><br>更多最新文章,请访问<a href=http://www.sec-wiki.com/>SecWiki</a>\n"
|
||||
},
|
||||
{
|
||||
"title": "\nSecWiki News 2024-11-25 Review",
|
||||
"link": "\nhttp://www.sec-wiki.com/?2024-11-25",
|
||||
"pubDate": "\nMon, 25 Nov 2024 23:58:20 +0800",
|
||||
"description": "\n今日暂未更新资讯~<br>更多最新文章,请访问<a href=http://www.sec-wiki.com/>SecWiki</a>\n"
|
||||
},
|
||||
{
|
||||
"title": "\nSecWiki News 2024-11-24 Review",
|
||||
"link": "\nhttp://www.sec-wiki.com/?2024-11-24",
|
||||
"pubDate": "\nSun, 24 Nov 2024 23:58:20 +0800",
|
||||
"description": "\n今日暂未更新资讯~<br>更多最新文章,请访问<a href=http://www.sec-wiki.com/>SecWiki</a>\n"
|
||||
},
|
||||
{
|
||||
"title": "\nSecWiki News 2024-11-23 Review",
|
||||
"link": "\nhttp://www.sec-wiki.com/?2024-11-23",
|
||||
"pubDate": "\nSat, 23 Nov 2024 23:58:20 +0800",
|
||||
"description": "\n<a target='_blank' href='https://paper.seebug.org/3240/'>APT-K-47 武器披露之 Asyncshell 的前世今生</a> by ourren<br><br>更多最新文章,请访问<a href=http://www.sec-wiki.com/>SecWiki</a>\n"
|
||||
},
|
||||
{
|
||||
"title": "\nSecWiki News 2024-11-22 Review",
|
||||
"link": "\nhttp://www.sec-wiki.com/?2024-11-22",
|
||||
"pubDate": "\nFri, 22 Nov 2024 23:58:20 +0800",
|
||||
"description": "\n<a target='_blank' href='https://mp.weixin.qq.com/s/YhFmz1xpzH3cSXBUlTqm8w'>从何同学视频看开源协议的重要性</a> by 洞源实验室<br><br>更多最新文章,请访问<a href=http://www.sec-wiki.com/>SecWiki</a>\n"
|
||||
}
|
||||
]
|
122
JSON/seebug.json
122
JSON/seebug.json
@ -1,122 +0,0 @@
|
||||
[
|
||||
{
|
||||
"title": "以大模型为目标的威胁攻击与安全思考\n",
|
||||
"link": "https://paper.seebug.org/3259/",
|
||||
"description": "作者:启明星辰ADLab\n原文链接:https://mp.weixin.qq.com/s/YL37d_PjiFJkarEjcrTdiA\n一、概 述\n自2023年以来,以ChatGPT为代表的大语言模型(LLM)向人们展现出了人工智能所具有的无限潜力,为各行业带来了全新的发展模式和生产力提升。以大语言模型为基础的智能平台及系统也逐渐成为国家和企业的一种重要的基础设施,面对这样一种全新的基础设施...\n",
|
||||
"pubDate": "Mon, 23 Dec 2024 08:21:00 +0000",
|
||||
"guid": "https://paper.seebug.org/3259/",
|
||||
"category": "AI安全"
|
||||
},
|
||||
{
|
||||
"title": "趋利避害的大模型行为:伪对齐\n",
|
||||
"link": "https://paper.seebug.org/3258/",
|
||||
"description": "作者:Ryan Greenblatt, Carson Denison等\n译者:知道创宇404实验室翻译组\n原文链接:https://arxiv.org/abs/2412.14093v1\n摘要\n我们在此呈现了一项关于大型语言模型在训练过程中进行“对齐伪装”行为的演示:该模型有选择地遵从其训练目标,以防止其行为在训练之外被改变。具体来说,我们首先向Claude 3 Opus模型提供了一个系统提示...\n",
|
||||
"pubDate": "Mon, 23 Dec 2024 03:06:00 +0000",
|
||||
"guid": "https://paper.seebug.org/3258/",
|
||||
"category": "AI安全"
|
||||
},
|
||||
{
|
||||
"title": "找出披着羊皮的狼:通过文本摘要技术破解对抗性文本到图像提示\n",
|
||||
"link": "https://paper.seebug.org/3257/",
|
||||
"description": "作者:Portia Cooper, Harshita Narnoli, Mihai Surdeanu\n译者:知道创宇404实验室翻译组\n原文链接:https://arxiv.org/pdf/2412.12212\n摘要\n文本到图像模型常常遭受一种称为“分而治之攻击”(DACA)的逐步攻击,该攻击通过大型语言模型将敏感文本包装在看似无害的叙述中,以隐藏不当内容。为了有效抵御这种逐步DACA攻击,...\n",
|
||||
"pubDate": "Fri, 20 Dec 2024 07:43:00 +0000",
|
||||
"guid": "https://paper.seebug.org/3257/",
|
||||
"category": "AI安全"
|
||||
},
|
||||
{
|
||||
"title": "探索 AI 驱动的网络安全框架:深度学习技术、GPU 支持和未来增强\n",
|
||||
"link": "https://paper.seebug.org/3255/",
|
||||
"description": "作者:Tobias Becher, Simon Torka\n译者:知道创宇404实验室翻译组\n原文链接:https://arxiv.org/pdf/2412.12648\n摘要\n传统的基于规则的网络安全系统在防御已知恶意软件方面表现出色,但面对新型威胁,它们却显得力不从心。为应对这一挑战,新一代网络安全系统开始融合人工智能技术,尤其是深度学习算法,以提升其识别事件、分析警报和响应安全事件的能力...\n",
|
||||
"pubDate": "Fri, 20 Dec 2024 01:14:00 +0000",
|
||||
"guid": "https://paper.seebug.org/3255/",
|
||||
"category": "AI安全"
|
||||
},
|
||||
{
|
||||
"title": "Apache Struts2 文件上传逻辑绕过(CVE-2024-53677)(S2-067)\n",
|
||||
"link": "https://paper.seebug.org/3256/",
|
||||
"description": "作者:y4tacker\n原文链接:https://y4tacker.github.io/2024/12/16/year/2024/12/Apache-Struts2-文件上传逻辑绕过-CVE-2024-53677-S2-067/\n前言\nApache官方公告又更新了一个Struts2的漏洞,考虑到很久没有发无密码的博客了,再加上漏洞的影响并不严重,因此公开分享利用的思路。\n分析\n影响版本\nSt...\n",
|
||||
"pubDate": "Thu, 19 Dec 2024 08:37:00 +0000",
|
||||
"guid": "https://paper.seebug.org/3256/",
|
||||
"category": "漏洞分析"
|
||||
},
|
||||
{
|
||||
"title": "越狱破解马斯克最新AI-Grok2揭秘:特朗普赢得大选背后,AI的推波助澜\n",
|
||||
"link": "https://paper.seebug.org/3254/",
|
||||
"description": "作者:洺熙(米斯特Ai安全组核心成员)\n原文链接:https://mp.weixin.qq.com/s/thSJwKA7RbEueQ7iYsThFQ\n序言\n你可曾想过,马斯克的Ai Grok2大脑里究竟藏着什么秘密?\n本文将带你潜入X平台最新AI模型Grok2的“大脑”,通过对其核心指令——系统Prompt的深度解码,揭开马斯克打造的这款AI的神秘面纱\n我们将一起探索:\n\n从越狱谷歌Gemi...\n",
|
||||
"pubDate": "Wed, 18 Dec 2024 06:02:00 +0000",
|
||||
"guid": "https://paper.seebug.org/3254/",
|
||||
"category": "AI安全"
|
||||
},
|
||||
{
|
||||
"title": "AI 作为新型黑客:开发进攻性安全代理\n",
|
||||
"link": "https://paper.seebug.org/3253/",
|
||||
"description": "作者:Leroy Jacob Valencia\n译者:知道创宇404实验室翻译组\n原文链接:https://arxiv.org/pdf/2406.07561\n摘要\n在网络安全这一宏大领域内,由防御性措施向主动防御的转变对于守护数字基础设施的安全至关重要。本文深入探讨了AI在主动防御网络安全中的角色,尤其是通过研发一个名为ReaperAI的独立AI代理,该代理被设计来模拟和实施网络攻击。借助于...\n",
|
||||
"pubDate": "Fri, 13 Dec 2024 07:50:00 +0000",
|
||||
"guid": "https://paper.seebug.org/3253/",
|
||||
"category": "AI安全"
|
||||
},
|
||||
{
|
||||
"title": "Qwen2.5-Coder 技术报告\n",
|
||||
"link": "https://paper.seebug.org/3252/",
|
||||
"description": "公众号:简单的机器学习\n原文链接:https://mp.weixin.qq.com/s/EiV7x403sVqVcABo_qd2kg\n引言\nQwen2.5-Coder 系列是阿里巴巴团队推出的一款重要的代码生成模型,相比其前代 CodeQwen1.5,该系列在多个方面进行了显著的升级。Qwen2.5-Coder 系列包括两个模型:Qwen2.5-Coder-1.5B 和 Qwen2.5-Co...\n",
|
||||
"pubDate": "Wed, 11 Dec 2024 16:46:00 +0000",
|
||||
"guid": "https://paper.seebug.org/3252/",
|
||||
"category": "经验心得"
|
||||
},
|
||||
{
|
||||
"title": "Qwen2 源码阅读——核心代码跟读\n",
|
||||
"link": "https://paper.seebug.org/3251/",
|
||||
"description": "公众号:简单的机器学习\n原文链接:https://mp.weixin.qq.com/s/PVSPNfv0I8_cxgPTmOes5w\n我们继续使用上一节使用的样例文本:\n[&quot;你好啊&quot;, &quot;简单的机器学习是为了让机器学习变得更简单而存在的&quot;]\n\n\n这个样例产生的tokens结果为:\n{'input_ids': tensor([[108386, 10392...\n",
|
||||
"pubDate": "Wed, 11 Dec 2024 16:45:00 +0000",
|
||||
"guid": "https://paper.seebug.org/3251/",
|
||||
"category": "经验心得"
|
||||
},
|
||||
{
|
||||
"title": "Qwen2 源码阅读——环境准备和说明\n",
|
||||
"link": "https://paper.seebug.org/3250/",
|
||||
"description": "公众号:简单的机器学习\n原文链接:https://mp.weixin.qq.com/s/kxrc50ZumITVaTE1wtinlg\n下面的源码内容来自transformers代码库中:transformers-4.45.2/src/transformers/models/qwen2/modeling_qwen2.py。\n实验准备\n首先我们下载一些Qwen2需要的配置数据。下载地址:http...\n",
|
||||
"pubDate": "Wed, 11 Dec 2024 16:24:00 +0000",
|
||||
"guid": "https://paper.seebug.org/3250/",
|
||||
"category": "经验心得"
|
||||
},
|
||||
{
|
||||
"title": "揭秘暗黑系网络服务运营商——防弹主机网络\n",
|
||||
"link": "https://paper.seebug.org/3248/",
|
||||
"description": "作者:知道创宇404实验室\n日期:2024年12月9日\nEnglish version: https://paper.seebug.org/3249/\n一.摘要\n防弹主机(Bulletproof hosting)托管服务为网络犯罪活动提供基础设施,允许犯罪分子规避法律约束,经常被用于恶意软件、黑客攻击、欺诈网站、垃圾邮件等。防弹主机网络,堪称暗黑系网络服务运营商,是专为网络犯罪活动提供恶意基...\n",
|
||||
"pubDate": "Wed, 11 Dec 2024 08:06:00 +0000",
|
||||
"guid": "https://paper.seebug.org/3248/",
|
||||
"category": "专题报告"
|
||||
},
|
||||
{
|
||||
"title": "Unveiling Dark Internet Service Providers: Bulletproof Hosting\n",
|
||||
"link": "https://paper.seebug.org/3249/",
|
||||
"description": "Author: Knownsec 404 team\nDate: Dec 9, 2024\n中文版:https://paper.seebug.org/3248/\n1. Abstract\nBulletproof hosting services provide the infrastructure for cybercriminal activities, enabling criminals t...\n",
|
||||
"pubDate": "Mon, 09 Dec 2024 04:14:00 +0000",
|
||||
"guid": "https://paper.seebug.org/3249/",
|
||||
"category": "404 English Paper"
|
||||
},
|
||||
{
|
||||
"title": "基于 InternLM 和 LangChain 搭建私人知识库\n",
|
||||
"link": "https://paper.seebug.org/3247/",
|
||||
"description": "作者:Jinzhong Xu\n原文链接:https://xujinzh.github.io/2024/01/08/ai-Interlm-langchain-RAG/index.html\n本篇介绍基于 InternLM 和 LangChain 搭建私人知识库。\npython!conda create --name internlm_langchain --clone=/root/share/c...\n",
|
||||
"pubDate": "Thu, 05 Dec 2024 11:34:00 +0000",
|
||||
"guid": "https://paper.seebug.org/3247/",
|
||||
"category": "AI安全"
|
||||
},
|
||||
{
|
||||
"title": "书生·浦语大模型使用\n",
|
||||
"link": "https://paper.seebug.org/3246/",
|
||||
"description": "作者:Jinzhong Xu\n原文链接:https://xujinzh.github.io/2024/01/06/ai-internlm-useage/\n本篇介绍书生·浦语大模型的使用,包括智能对话、智能体工具调用和图文理解创作等。\n环境配置\npython!conda create --name internlm-chat --clone=/root/share/conda_envs/int...\n",
|
||||
"pubDate": "Thu, 05 Dec 2024 10:27:00 +0000",
|
||||
"guid": "https://paper.seebug.org/3246/",
|
||||
"category": "AI安全"
|
||||
},
|
||||
{
|
||||
"title": "Uncontrolled PCDN: Observation and Case Analysis of the Current State of PCDN Technology\n",
|
||||
"link": "https://paper.seebug.org/3245/",
|
||||
"description": "Author: Knownsec 404 Active Defense Team\nDate: November 22, 2024\n中文版:https://paper.seebug.org/3242\nBackground Introduction\nIn October 2024, Knownsec 404 Active Defense Team detected abnormal traffi...\n",
|
||||
"pubDate": "Mon, 02 Dec 2024 06:13:00 +0000",
|
||||
"guid": "https://paper.seebug.org/3245/",
|
||||
"category": "情报分析"
|
||||
}
|
||||
]
|
1002
JSON/xianzhi.json
1002
JSON/xianzhi.json
File diff suppressed because it is too large
Load Diff
Binary file not shown.
Binary file not shown.
@ -17,4 +17,5 @@
|
||||
### 更新日志
|
||||
- 2024年12月15日早:优化了文件结构,修复了日志记录时的小BUG,添加web展示日志功能 <br>
|
||||
- 2024年12月15日晚:修复了单次运行结束时的校验错误问题 <br>
|
||||
- 2024年12月18日早:添加了短文本推送机制,一定程度上解决了长字节推送问题(解决办法正在思考中) <br>
|
||||
- 2024年12月18日早:添加了短文本推送机制,一定程度上解决了长字节推送问题(解决办法正在思考中) <br>
|
||||
- 2024年12月24日晚:上传了测试0.1版本,修复了报错问题 <br>
|
10
config.yaml
10
config.yaml
@ -1,11 +1,11 @@
|
||||
# 飞书相关配置信息
|
||||
fs_activate: True
|
||||
fs_key: aa04a02f-d7bf-4279-bd48-44c4f28c8f74
|
||||
fs_secret: 4tq65T4jm1MO2IlxvHxBWe
|
||||
fs_key: # 此处填写token,记得冒号后空一格,如aa04a02f-d7bf-4279-bd48-44c4f28c8f74
|
||||
fs_secret: # 此处填写签名密钥,记得冒号后空一格,如4tq65T4jm1MO2IlxvHxBWe
|
||||
|
||||
# 企业微信相关配置信息
|
||||
wx_activate: True
|
||||
wx_key: 9a3dd6ff-75d6-4208-bc4b-77724a5805d6
|
||||
wx_key: # 此处填写token,记得冒号后空一格,如9a3dd6ff-75d6-4208-bc4b-77724a5805d6
|
||||
|
||||
# 钉钉相关配置信息
|
||||
ding_activate: False
|
||||
@ -13,12 +13,12 @@ ding_activate: False
|
||||
# 蓝信相关配置信息
|
||||
lx_activate: False
|
||||
|
||||
# 邮件配置
|
||||
# 邮件配置,邮件推送正在完善中
|
||||
mail_host: smtp.masonliu.com #设置服务器
|
||||
mail_user: test@masonliu.com #用户名
|
||||
mail_pass: Test123456 #口令
|
||||
sender: test@masonliu.com
|
||||
receivers: ['2857911564@qq.com']
|
||||
# 结算时间范围
|
||||
e_hour: 12 # 程序运行时间间隔
|
||||
e_hour: 4 # 程序运行时间间隔
|
||||
circle: 1 # 是否启用循环,设置为0后将设置为特定时间点运行
|
||||
|
BIN
db/4hou.db
BIN
db/4hou.db
Binary file not shown.
BIN
db/anquanke.db
BIN
db/anquanke.db
Binary file not shown.
BIN
db/doonsec.db
BIN
db/doonsec.db
Binary file not shown.
BIN
db/freebuf.db
BIN
db/freebuf.db
Binary file not shown.
BIN
db/qianxin.db
BIN
db/qianxin.db
Binary file not shown.
BIN
db/seebug.db
BIN
db/seebug.db
Binary file not shown.
BIN
db/xianzhi.db
BIN
db/xianzhi.db
Binary file not shown.
@ -1,313 +0,0 @@
|
||||
#### 文章:附原文 |《2024年漏洞与威胁趋势报告》深度解读
|
||||
**类型**:漏洞
|
||||
**链接**:https://www.freebuf.com/vuls/418381.html
|
||||
**上传时间**:2024-12-24 11:41:51
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:看不到的尽头,回顾与展望哈以冲突以来的中东网络战
|
||||
**类型**:资讯
|
||||
**链接**:https://www.freebuf.com/news/418373.html
|
||||
**上传时间**:2024-12-24 11:16:59
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:AI可一键生成上万种恶意软件变体,88%能规避检测
|
||||
**类型**:资讯
|
||||
**链接**:https://www.freebuf.com/news/418362.html
|
||||
**上传时间**:2024-12-24 10:26:42
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:NDSS 2025|抖音集团安全研究团队提出机密沙箱内存管理方案WAVEN
|
||||
**作者**: 字节跳动安全中心
|
||||
**来源**:None
|
||||
**链接**:https://www.anquanke.com/post/id/302977
|
||||
**上传时间**:2024-12-24 13:01:55
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:呈贡区政府携手360,共绘昆明市数字经济发展新蓝图!
|
||||
**作者**: 安全客
|
||||
**来源**:微信
|
||||
**链接**:https://www.anquanke.com/post/id/302974
|
||||
**上传时间**:2024-12-24 11:26:19
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:CVE-2024-53552 (CVSS 9.8): CrushFTP 漏洞使用户面临账户接管风险
|
||||
**作者**: 安全客
|
||||
**来源**:securityonline
|
||||
**链接**:https://www.anquanke.com/post/id/302971
|
||||
**上传时间**:2024-12-24 11:23:02
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:CVE-2024-12828 (CVSS 9.9): Webmin 漏洞导致数百万台服务器暴露于 RCE
|
||||
**作者**: 安全客
|
||||
**来源**:securityonline
|
||||
**链接**:https://www.anquanke.com/post/id/302968
|
||||
**上传时间**:2024-12-24 11:16:49
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:针对 CVE-2024-30085:Windows 权限提升漏洞发布 PoC 漏洞利用程序
|
||||
**作者**: 安全客
|
||||
**来源**:securityonline
|
||||
**链接**:https://www.anquanke.com/post/id/302963
|
||||
**上传时间**:2024-12-24 11:09:25
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:Aave 考虑整合 Chainlink,将 MEV 费用返还给用户
|
||||
**作者**: 安全客
|
||||
**来源**:Cointelegraph.com News
|
||||
**链接**:https://www.anquanke.com/post/id/302960
|
||||
**上传时间**:2024-12-24 11:04:04
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:勒索软件攻击暴露了 560 万 Ascension 患者的数据
|
||||
**作者**: 安全客
|
||||
**来源**:infosecurity
|
||||
**链接**:https://www.anquanke.com/post/id/302957
|
||||
**上传时间**:2024-12-24 10:53:52
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:黑客利用 Fortinet EMS 的关键漏洞部署远程访问工具
|
||||
**作者**: 安全客
|
||||
**来源**:TheHackersNews
|
||||
**链接**:https://www.anquanke.com/post/id/302954
|
||||
**上传时间**:2024-12-24 10:46:09
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:供应链攻击攻击 Rspack、Vant 使用 Monero Miner 的 npm 包
|
||||
**作者**: 安全客
|
||||
**来源**:hackread
|
||||
**链接**:https://www.anquanke.com/post/id/302951
|
||||
**上传时间**:2024-12-24 10:21:25
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:Lazarus Group 使用 CookiePlus 恶意软件以核工业为目标
|
||||
**作者**: 安全客
|
||||
**来源**:hackread
|
||||
**链接**:https://www.anquanke.com/post/id/302948
|
||||
**上传时间**:2024-12-24 10:08:26
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:美国 CISA 将 Acclaim Systems USAHERDS 漏洞列入已知漏洞目录
|
||||
**作者**: 安全客
|
||||
**来源**:securityaffairs
|
||||
**链接**:https://www.anquanke.com/post/id/302945
|
||||
**上传时间**:2024-12-24 09:59:10
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:关于针对我国用户的“银狐”木马病毒再次出现新变种并更新传播手法的预警报告
|
||||
**作者**:嘶吼
|
||||
**链接**:https://www.4hou.com/posts/XPVo
|
||||
**上传时间**:2024-12-24 12:00:00
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:附原文 |《2024年漏洞与威胁趋势报告》深度解读
|
||||
**类型**:漏洞
|
||||
**链接**:https://www.freebuf.com/vuls/418381.html
|
||||
**上传时间**:2024-12-24 11:41:51
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:看不到的尽头,回顾与展望哈以冲突以来的中东网络战
|
||||
**类型**:资讯
|
||||
**链接**:https://www.freebuf.com/news/418373.html
|
||||
**上传时间**:2024-12-24 11:16:59
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:AI可一键生成上万种恶意软件变体,88%能规避检测
|
||||
**类型**:资讯
|
||||
**链接**:https://www.freebuf.com/news/418362.html
|
||||
**上传时间**:2024-12-24 10:26:42
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:NDSS 2025|抖音集团安全研究团队提出机密沙箱内存管理方案WAVEN
|
||||
**作者**: 字节跳动安全中心
|
||||
**来源**:None
|
||||
**链接**:https://www.anquanke.com/post/id/302977
|
||||
**上传时间**:2024-12-24 13:01:55
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:呈贡区政府携手360,共绘昆明市数字经济发展新蓝图!
|
||||
**作者**: 安全客
|
||||
**来源**:微信
|
||||
**链接**:https://www.anquanke.com/post/id/302974
|
||||
**上传时间**:2024-12-24 11:26:19
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:CVE-2024-53552 (CVSS 9.8): CrushFTP 漏洞使用户面临账户接管风险
|
||||
**作者**: 安全客
|
||||
**来源**:securityonline
|
||||
**链接**:https://www.anquanke.com/post/id/302971
|
||||
**上传时间**:2024-12-24 11:23:02
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:CVE-2024-12828 (CVSS 9.9): Webmin 漏洞导致数百万台服务器暴露于 RCE
|
||||
**作者**: 安全客
|
||||
**来源**:securityonline
|
||||
**链接**:https://www.anquanke.com/post/id/302968
|
||||
**上传时间**:2024-12-24 11:16:49
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:针对 CVE-2024-30085:Windows 权限提升漏洞发布 PoC 漏洞利用程序
|
||||
**作者**: 安全客
|
||||
**来源**:securityonline
|
||||
**链接**:https://www.anquanke.com/post/id/302963
|
||||
**上传时间**:2024-12-24 11:09:25
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:Aave 考虑整合 Chainlink,将 MEV 费用返还给用户
|
||||
**作者**: 安全客
|
||||
**来源**:Cointelegraph.com News
|
||||
**链接**:https://www.anquanke.com/post/id/302960
|
||||
**上传时间**:2024-12-24 11:04:04
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:勒索软件攻击暴露了 560 万 Ascension 患者的数据
|
||||
**作者**: 安全客
|
||||
**来源**:infosecurity
|
||||
**链接**:https://www.anquanke.com/post/id/302957
|
||||
**上传时间**:2024-12-24 10:53:52
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:黑客利用 Fortinet EMS 的关键漏洞部署远程访问工具
|
||||
**作者**: 安全客
|
||||
**来源**:TheHackersNews
|
||||
**链接**:https://www.anquanke.com/post/id/302954
|
||||
**上传时间**:2024-12-24 10:46:09
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:供应链攻击攻击 Rspack、Vant 使用 Monero Miner 的 npm 包
|
||||
**作者**: 安全客
|
||||
**来源**:hackread
|
||||
**链接**:https://www.anquanke.com/post/id/302951
|
||||
**上传时间**:2024-12-24 10:21:25
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:Lazarus Group 使用 CookiePlus 恶意软件以核工业为目标
|
||||
**作者**: 安全客
|
||||
**来源**:hackread
|
||||
**链接**:https://www.anquanke.com/post/id/302948
|
||||
**上传时间**:2024-12-24 10:08:26
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:美国 CISA 将 Acclaim Systems USAHERDS 漏洞列入已知漏洞目录
|
||||
**作者**: 安全客
|
||||
**来源**:securityaffairs
|
||||
**链接**:https://www.anquanke.com/post/id/302945
|
||||
**上传时间**:2024-12-24 09:59:10
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:关于针对我国用户的“银狐”木马病毒再次出现新变种并更新传播手法的预警报告
|
||||
**作者**:嘶吼
|
||||
**链接**:https://www.4hou.com/posts/XPVo
|
||||
**上传时间**:2024-12-24 12:00:00
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:微软 Teams 成了黑客社工的“最佳方法”?
|
||||
**类型**:资讯
|
||||
**链接**:https://www.freebuf.com/news/418092.html
|
||||
**上传时间**:2024-12-19 14:20:56
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:深耕行业·持续赋能!360携手百位合作伙伴共绘教育安全新未来!
|
||||
**作者**: 安全客
|
||||
**来源**:微信
|
||||
**链接**:https://www.anquanke.com/post/id/302858
|
||||
**上传时间**:2024-12-19 14:29:29
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:权威认证|梆梆安全顺利通过CCRC“移动互联网应用程序(App)个人信息安全测试”认证
|
||||
**作者**:梆梆安全
|
||||
**链接**:https://www.4hou.com/posts/J1Wv
|
||||
**上传时间**:2024-12-19 17:56:10
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:盛邦安全产品全面适配神通数据库V7.0,赋能信创生态与数据安全防护
|
||||
**作者**:盛邦安全
|
||||
**链接**:https://www.4hou.com/posts/xyLE
|
||||
**上传时间**:2024-12-19 17:18:59
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:深耕网络安全 布局未来新领域——访盛邦安全董事长权小文
|
||||
**作者**:盛邦安全
|
||||
**链接**:https://www.4hou.com/posts/vwLM
|
||||
**上传时间**:2024-12-19 17:17:23
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:关于针对我国用户的“银狐”木马病毒出现新变种的预警报告
|
||||
**作者**:企业资讯
|
||||
**链接**:https://www.4hou.com/posts/MXWR
|
||||
**上传时间**:2024-12-19 14:16:39
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:微软 Teams 成了黑客社工的“最佳方法”?
|
||||
**类型**:资讯
|
||||
**链接**:https://www.freebuf.com/news/418092.html
|
||||
**上传时间**:2024-12-19 14:20:56
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:深耕行业·持续赋能!360携手百位合作伙伴共绘教育安全新未来!
|
||||
**作者**: 安全客
|
||||
**来源**:微信
|
||||
**链接**:https://www.anquanke.com/post/id/302858
|
||||
**上传时间**:2024-12-19 14:29:29
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:权威认证|梆梆安全顺利通过CCRC“移动互联网应用程序(App)个人信息安全测试”认证
|
||||
**作者**:梆梆安全
|
||||
**链接**:https://www.4hou.com/posts/J1Wv
|
||||
**上传时间**:2024-12-19 17:56:10
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:盛邦安全产品全面适配神通数据库V7.0,赋能信创生态与数据安全防护
|
||||
**作者**:盛邦安全
|
||||
**链接**:https://www.4hou.com/posts/xyLE
|
||||
**上传时间**:2024-12-19 17:18:59
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:深耕网络安全 布局未来新领域——访盛邦安全董事长权小文
|
||||
**作者**:盛邦安全
|
||||
**链接**:https://www.4hou.com/posts/vwLM
|
||||
**上传时间**:2024-12-19 17:17:23
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:关于针对我国用户的“银狐”木马病毒出现新变种的预警报告
|
||||
**作者**:企业资讯
|
||||
**链接**:https://www.4hou.com/posts/MXWR
|
||||
**上传时间**:2024-12-19 14:16:39
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:微软 Teams 成了黑客社工的“最佳方法”?
|
||||
**类型**:资讯
|
||||
**链接**:https://www.freebuf.com/news/418092.html
|
||||
**上传时间**:2024-12-19 14:20:56
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:深耕行业·持续赋能!360携手百位合作伙伴共绘教育安全新未来!
|
||||
**作者**: 安全客
|
||||
**来源**:微信
|
||||
**链接**:https://www.anquanke.com/post/id/302858
|
||||
**上传时间**:2024-12-19 14:29:29
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:权威认证|梆梆安全顺利通过CCRC“移动互联网应用程序(App)个人信息安全测试”认证
|
||||
**作者**:梆梆安全
|
||||
**链接**:https://www.4hou.com/posts/J1Wv
|
||||
**上传时间**:2024-12-19 17:56:10
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:盛邦安全产品全面适配神通数据库V7.0,赋能信创生态与数据安全防护
|
||||
**作者**:盛邦安全
|
||||
**链接**:https://www.4hou.com/posts/xyLE
|
||||
**上传时间**:2024-12-19 17:18:59
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:深耕网络安全 布局未来新领域——访盛邦安全董事长权小文
|
||||
**作者**:盛邦安全
|
||||
**链接**:https://www.4hou.com/posts/vwLM
|
||||
**上传时间**:2024-12-19 17:17:23
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:关于针对我国用户的“银狐”木马病毒出现新变种的预警报告
|
||||
**作者**:企业资讯
|
||||
**链接**:https://www.4hou.com/posts/MXWR
|
||||
**上传时间**:2024-12-19 14:16:39
|
||||
|
||||
----------------------------------------
|
@ -1,779 +0,0 @@
|
||||
#### 文章:.Net Remoting 系列二:Solarwinds ARM 漏洞分析
|
||||
**来源**:subject
|
||||
**链接**:https://forum.butian.net/share/3998
|
||||
**上传时间**:2024-12-24 10:11:30
|
||||
**描述**:本篇主要是以Solarwinds Arm产品介绍自定义ServerChanel的场景,漏洞分析利用是其次,事实上是去年挖的没有详细记录,后续写的,勿怪哈哈哈
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:.Net Remoting 系列一
|
||||
**来源**:subject
|
||||
**链接**:https://forum.butian.net/share/3989
|
||||
**上传时间**:2024-12-24 10:11:20
|
||||
**描述**:前言:笔者在代码审计时碰到许多以.Net Remoting技术开发的应用如SolarWinds、VeeamBackup、Ivanti等产品,尽管随着 WCF 和 gRPC 等更现代化技术的兴起,.NET Remoting 已逐渐淡出主流,但是依然有其研究的价值,本次主要以TcpChannel为主分析其工作原理、应用场景,后续会通过两个漏洞介绍.Net Remoting在不同场景下的利用姿势和挖掘思路
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:07【邮件安全】如何防护链接类网页钓鱼
|
||||
**作者**:十九线菜鸟学安全
|
||||
**链接**:[点此访问](https://mp.weixin.qq.com/s?__biz=MzI1OTUyMTI2MQ==&mid=2247484749&idx=1&sn=8f6d5bdd820ed71ee2a9680a3d98c257)
|
||||
**上传时间**:2024-12-24 20:17:00
|
||||
**简介**:问:\\x0a通过邮件发送钓鱼网站也是攻击队常用的社工手段,那么如何防护这类邮件攻击?\\x0a\\x0a答:\\x0a1、对接威胁情报:\\x0a提炼邮件中的链接(包括二维码),将url、域名、IP、发件人等IoC信息与威胁情报做匹配。\\x0a\\x0a2、替换安全二维码:\\x0a通过邮件网关将邮件中的二维码替换成安全二维码,通过代理网关跳转访问目标网站,如发现风险可实时拦截。\\x0a\\x0a3、无头浏览器结合OCR做相似度识别:\\x0a在沙箱中主动访问链接,对目标网站做相似度识别,来识别是否
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:Adobe ColdFusion 路径遍历漏洞(CVE-2024-53961)安全风险通告
|
||||
**作者**:奇安信 CERT
|
||||
**链接**:[点此访问](https://mp.weixin.qq.com/s?__biz=MzU5NDgxODU1MQ==&mid=2247502682&idx=1&sn=83e2cebbdeddd336724d291651d2bc51)
|
||||
**上传时间**:2024-12-24 19:45:44
|
||||
**简介**:致力于第一时间为企业级用户提供权威漏洞情报和有效解决方案。
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:警惕!“银狐”木马病毒再次出现新变种并更新传播手法
|
||||
**作者**:网安百色
|
||||
**链接**:[点此访问](https://mp.weixin.qq.com/s?__biz=MzI0NzE4ODk1Mw==&mid=2652094410&idx=1&sn=bed5fad50c5baac4a282b84456435ed1)
|
||||
**上传时间**:2024-12-24 19:44:44
|
||||
**简介**:None
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:【漏洞预警】Apache Hive&Spark信息泄露漏洞(CVE-2024-23945)
|
||||
**作者**:飓风网络安全
|
||||
**链接**:[点此访问](https://mp.weixin.qq.com/s?__biz=MzI3NzMzNzE5Ng==&mid=2247489351&idx=1&sn=01778ca696e485c04d2862adb19bfa8c)
|
||||
**上传时间**:2024-12-24 19:11:24
|
||||
**简介**:None
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:【漏洞通告】Adobe ColdFusion任意文件读取漏洞(CVE-2024-53961)
|
||||
**作者**:深信服千里目安全技术中心
|
||||
**链接**:[点此访问](https://mp.weixin.qq.com/s?__biz=Mzg2NjgzNjA5NQ==&mid=2247523973&idx=1&sn=328a8278946c6ddc659d707dda812940)
|
||||
**上传时间**:2024-12-24 17:26:55
|
||||
**简介**:2024年12月24日,深瞳漏洞实验室监测到一则Adobe-ColdFusion组件存在任意文件读取漏洞的信息,漏洞编号:CVE-2024-53961,漏洞威胁等级:高危。
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:Kali高手都在用的环境变量技巧,学会这些就能实现隐蔽渗透?
|
||||
**作者**:HW安全之路
|
||||
**链接**:[点此访问](https://mp.weixin.qq.com/s?__biz=MzI5MjY4MTMyMQ==&mid=2247489180&idx=1&sn=aa3275ab6daf3c82fbb961199d189a4d)
|
||||
**上传时间**:2024-12-24 17:14:07
|
||||
**简介**:通过掌握这些环境变量管理技巧,我们可以更好地控制和优化Kali Linux系统,提高渗透测试效率,同时保持必要的隐蔽性和安全性。环境变量不仅是简单的配置工具,更是一种强大的系统管理和控制机制。
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:dedecms织梦任意文件上传漏洞
|
||||
**作者**:雾鸣安全
|
||||
**链接**:[点此访问](https://mp.weixin.qq.com/s?__biz=MzkxNzUxNTMzNw==&mid=2247484054&idx=1&sn=fe0f59eddecc373a8c0f4f6e0f530973)
|
||||
**上传时间**:2024-12-24 14:37:37
|
||||
**简介**:dedecms织梦\\x0d\\x0a漏洞类型:通用型\\x0d\\x0a漏洞版本:≤ V5.7.116
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:新的 DroidBot Android 恶意软件针对 77 个银行加密应用程序
|
||||
**作者**:嘶吼专业版
|
||||
**链接**:[点此访问](https://mp.weixin.qq.com/s?__biz=MzI0MDY1MDU4MQ==&mid=2247580391&idx=1&sn=2bdac2222c560e9b5607fbdcb854f116)
|
||||
**上传时间**:2024-12-24 14:00:41
|
||||
**简介**:为了减轻这种威胁,建议 Android 用户仅从 Google Play 下载应用程序,在安装时仔细检查权限请求,并确保 Play Protect 在其设备上处于活动状态。
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:使用LLM混淆恶意 JavaScript,88%的恶意样本可以逃避检测
|
||||
**作者**:独眼情报
|
||||
**链接**:[点此访问](https://mp.weixin.qq.com/s?__biz=MzkzNDIzNDUxOQ==&mid=2247493396&idx=1&sn=816812743c54e547f54f05b18b64288d)
|
||||
**上传时间**:2024-12-24 14:00:34
|
||||
**简介**:None
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:Adobe 警告 ColdFusion 存在严重漏洞,并且 PoC 已流出
|
||||
**作者**:独眼情报
|
||||
**链接**:[点此访问](https://mp.weixin.qq.com/s?__biz=MzkzNDIzNDUxOQ==&mid=2247493396&idx=5&sn=cf01d14f914941546541b6a0a2f5abec)
|
||||
**上传时间**:2024-12-24 14:00:34
|
||||
**简介**:None
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:RongIOC 一款全自动APT威胁情报拓线工具(APT Automated Tool )(使用教程+实战对比效果)
|
||||
**作者**:WingBy安全团队
|
||||
**链接**:[点此访问](https://mp.weixin.qq.com/s?__biz=MzkzNTY1MTg4Mg==&mid=2247484208&idx=1&sn=ae5a67add3b71e2aec4f047e1f92ae5f)
|
||||
**上传时间**:2024-12-24 13:56:16
|
||||
**简介**:RongIOC 一款全自动APT威胁情报拓线工具(APT Automated Tool )(使用教程+实战对比效果)
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:RongIOC 一款全自动APT威胁情报拓线工具(APT Automated Tool )(使用教程+实战对比效果)
|
||||
**作者**:Ting的安全笔记
|
||||
**链接**:[点此访问](https://mp.weixin.qq.com/s?__biz=MzkyODY3NjkyNQ==&mid=2247484405&idx=1&sn=c0993aa055e2c68bacd5f741c127e343)
|
||||
**上传时间**:2024-12-24 13:50:08
|
||||
**简介**:RongIOC 一款全自动APT威胁情报拓线工具(APT Automated Tool )(使用教程+实战对比效果)
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:RongIOC 一款全自动APT威胁情报拓线工具(APT Automated Tool )(使用教程+实战对比效果)
|
||||
**作者**:fkalis
|
||||
**链接**:[点此访问](https://mp.weixin.qq.com/s?__biz=MzkyODcwOTA4NA==&mid=2247487707&idx=1&sn=d6d9f18751c0de6108ed9cf7fda14742)
|
||||
**上传时间**:2024-12-24 13:35:03
|
||||
**简介**:RongIOC 一款全自动APT威胁情报拓线工具(APT Automated Tool )(使用教程+实战对比效果)
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:CVE-2024-56337:Apache Tomcat 修补关键 RCE 漏洞
|
||||
**作者**:Ots安全
|
||||
**链接**:[点此访问](https://mp.weixin.qq.com/s?__biz=MzAxMjYyMzkwOA==&mid=2247526417&idx=1&sn=5d19b7fd81e7e92ff3cca973a60ccd22)
|
||||
**上传时间**:2024-12-24 12:57:17
|
||||
**简介**:None
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:【首发 1day】WordPress File Upload 插件存在前台任意文件读取漏洞(CVE-2024-9047)
|
||||
**作者**:星悦安全
|
||||
**链接**:[点此访问](https://mp.weixin.qq.com/s?__biz=Mzg4MTkwMTI5Mw==&mid=2247488285&idx=1&sn=97653bb5fd6a2d661776be1026799921)
|
||||
**上传时间**:2024-12-24 11:54:54
|
||||
**简介**:安装完毕后,位于 /wp-content/plugins/wp-file-upload/wfu_file_downloader.php 中的wfu_fopen_for_downloader 方法存在fopen 函数导致文件读取操作.
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:通杀国内杀软,杀软你怎么不说话
|
||||
**作者**:朱厌安全
|
||||
**链接**:[点此访问](https://mp.weixin.qq.com/s?__biz=Mzg4Njg3MDk5Ng==&mid=2247486770&idx=1&sn=b8db3e65245e7a65d11c3599425ceb89)
|
||||
**上传时间**:2024-12-24 10:27:03
|
||||
**简介**:在网络安全领域,免杀技术是指通过各种手段使恶意代码不被杀毒软件检测到,从而实现隐蔽执行的技术。这在安全测试和渗透测试中尤为重要,因为它可以帮助测试人员模拟真实的攻击场景,评估系统的安全防护能力。
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:powershell横向渗透样本分析
|
||||
**作者**:SecretTeam安全团队
|
||||
**链接**:[点此访问](https://mp.weixin.qq.com/s?__biz=MzkzMDQ5MDM3NA==&mid=2247487857&idx=1&sn=a5d37ae0ffa77779a933ad9324b4518b)
|
||||
**上传时间**:2024-12-24 10:06:53
|
||||
**简介**:None
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:实战自动化加解密&加密场景下的暴力破解
|
||||
**作者**:黑白之道
|
||||
**链接**:[点此访问](https://mp.weixin.qq.com/s?__biz=MzAxMjE3ODU3MQ==&mid=2650605533&idx=3&sn=10b918d20ab45ac4b08ffe43015a116d)
|
||||
**上传时间**:2024-12-24 09:53:58
|
||||
**简介**:None
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:本地文件包含发现和利用工具
|
||||
**作者**:黑白之道
|
||||
**链接**:[点此访问](https://mp.weixin.qq.com/s?__biz=MzAxMjE3ODU3MQ==&mid=2650605533&idx=4&sn=0b44670e74524677e27530426c1546e8)
|
||||
**上传时间**:2024-12-24 09:53:58
|
||||
**简介**:None
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:.Net Remoting 系列二:Solarwinds ARM 漏洞分析
|
||||
**来源**:subject
|
||||
**链接**:https://forum.butian.net/share/3998
|
||||
**上传时间**:2024-12-24 10:11:30
|
||||
**描述**:本篇主要是以Solarwinds Arm产品介绍自定义ServerChanel的场景,漏洞分析利用是其次,事实上是去年挖的没有详细记录,后续写的,勿怪哈哈哈
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:.Net Remoting 系列一
|
||||
**来源**:subject
|
||||
**链接**:https://forum.butian.net/share/3989
|
||||
**上传时间**:2024-12-24 10:11:20
|
||||
**描述**:前言:笔者在代码审计时碰到许多以.Net Remoting技术开发的应用如SolarWinds、VeeamBackup、Ivanti等产品,尽管随着 WCF 和 gRPC 等更现代化技术的兴起,.NET Remoting 已逐渐淡出主流,但是依然有其研究的价值,本次主要以TcpChannel为主分析其工作原理、应用场景,后续会通过两个漏洞介绍.Net Remoting在不同场景下的利用姿势和挖掘思路
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:07【邮件安全】如何防护链接类网页钓鱼
|
||||
**作者**:十九线菜鸟学安全
|
||||
**链接**:[点此访问](https://mp.weixin.qq.com/s?__biz=MzI1OTUyMTI2MQ==&mid=2247484749&idx=1&sn=8f6d5bdd820ed71ee2a9680a3d98c257)
|
||||
**上传时间**:2024-12-24 20:17:00
|
||||
**简介**:问:\\x0a通过邮件发送钓鱼网站也是攻击队常用的社工手段,那么如何防护这类邮件攻击?\\x0a\\x0a答:\\x0a1、对接威胁情报:\\x0a提炼邮件中的链接(包括二维码),将url、域名、IP、发件人等IoC信息与威胁情报做匹配。\\x0a\\x0a2、替换安全二维码:\\x0a通过邮件网关将邮件中的二维码替换成安全二维码,通过代理网关跳转访问目标网站,如发现风险可实时拦截。\\x0a\\x0a3、无头浏览器结合OCR做相似度识别:\\x0a在沙箱中主动访问链接,对目标网站做相似度识别,来识别是否
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:Adobe ColdFusion 路径遍历漏洞(CVE-2024-53961)安全风险通告
|
||||
**作者**:奇安信 CERT
|
||||
**链接**:[点此访问](https://mp.weixin.qq.com/s?__biz=MzU5NDgxODU1MQ==&mid=2247502682&idx=1&sn=83e2cebbdeddd336724d291651d2bc51)
|
||||
**上传时间**:2024-12-24 19:45:44
|
||||
**简介**:致力于第一时间为企业级用户提供权威漏洞情报和有效解决方案。
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:警惕!“银狐”木马病毒再次出现新变种并更新传播手法
|
||||
**作者**:网安百色
|
||||
**链接**:[点此访问](https://mp.weixin.qq.com/s?__biz=MzI0NzE4ODk1Mw==&mid=2652094410&idx=1&sn=bed5fad50c5baac4a282b84456435ed1)
|
||||
**上传时间**:2024-12-24 19:44:44
|
||||
**简介**:None
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:【漏洞预警】Apache Hive&Spark信息泄露漏洞(CVE-2024-23945)
|
||||
**作者**:飓风网络安全
|
||||
**链接**:[点此访问](https://mp.weixin.qq.com/s?__biz=MzI3NzMzNzE5Ng==&mid=2247489351&idx=1&sn=01778ca696e485c04d2862adb19bfa8c)
|
||||
**上传时间**:2024-12-24 19:11:24
|
||||
**简介**:None
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:【漏洞通告】Adobe ColdFusion任意文件读取漏洞(CVE-2024-53961)
|
||||
**作者**:深信服千里目安全技术中心
|
||||
**链接**:[点此访问](https://mp.weixin.qq.com/s?__biz=Mzg2NjgzNjA5NQ==&mid=2247523973&idx=1&sn=328a8278946c6ddc659d707dda812940)
|
||||
**上传时间**:2024-12-24 17:26:55
|
||||
**简介**:2024年12月24日,深瞳漏洞实验室监测到一则Adobe-ColdFusion组件存在任意文件读取漏洞的信息,漏洞编号:CVE-2024-53961,漏洞威胁等级:高危。
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:Kali高手都在用的环境变量技巧,学会这些就能实现隐蔽渗透?
|
||||
**作者**:HW安全之路
|
||||
**链接**:[点此访问](https://mp.weixin.qq.com/s?__biz=MzI5MjY4MTMyMQ==&mid=2247489180&idx=1&sn=aa3275ab6daf3c82fbb961199d189a4d)
|
||||
**上传时间**:2024-12-24 17:14:07
|
||||
**简介**:通过掌握这些环境变量管理技巧,我们可以更好地控制和优化Kali Linux系统,提高渗透测试效率,同时保持必要的隐蔽性和安全性。环境变量不仅是简单的配置工具,更是一种强大的系统管理和控制机制。
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:dedecms织梦任意文件上传漏洞
|
||||
**作者**:雾鸣安全
|
||||
**链接**:[点此访问](https://mp.weixin.qq.com/s?__biz=MzkxNzUxNTMzNw==&mid=2247484054&idx=1&sn=fe0f59eddecc373a8c0f4f6e0f530973)
|
||||
**上传时间**:2024-12-24 14:37:37
|
||||
**简介**:dedecms织梦\\x0d\\x0a漏洞类型:通用型\\x0d\\x0a漏洞版本:≤ V5.7.116
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:新的 DroidBot Android 恶意软件针对 77 个银行加密应用程序
|
||||
**作者**:嘶吼专业版
|
||||
**链接**:[点此访问](https://mp.weixin.qq.com/s?__biz=MzI0MDY1MDU4MQ==&mid=2247580391&idx=1&sn=2bdac2222c560e9b5607fbdcb854f116)
|
||||
**上传时间**:2024-12-24 14:00:41
|
||||
**简介**:为了减轻这种威胁,建议 Android 用户仅从 Google Play 下载应用程序,在安装时仔细检查权限请求,并确保 Play Protect 在其设备上处于活动状态。
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:使用LLM混淆恶意 JavaScript,88%的恶意样本可以逃避检测
|
||||
**作者**:独眼情报
|
||||
**链接**:[点此访问](https://mp.weixin.qq.com/s?__biz=MzkzNDIzNDUxOQ==&mid=2247493396&idx=1&sn=816812743c54e547f54f05b18b64288d)
|
||||
**上传时间**:2024-12-24 14:00:34
|
||||
**简介**:None
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:Adobe 警告 ColdFusion 存在严重漏洞,并且 PoC 已流出
|
||||
**作者**:独眼情报
|
||||
**链接**:[点此访问](https://mp.weixin.qq.com/s?__biz=MzkzNDIzNDUxOQ==&mid=2247493396&idx=5&sn=cf01d14f914941546541b6a0a2f5abec)
|
||||
**上传时间**:2024-12-24 14:00:34
|
||||
**简介**:None
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:RongIOC 一款全自动APT威胁情报拓线工具(APT Automated Tool )(使用教程+实战对比效果)
|
||||
**作者**:WingBy安全团队
|
||||
**链接**:[点此访问](https://mp.weixin.qq.com/s?__biz=MzkzNTY1MTg4Mg==&mid=2247484208&idx=1&sn=ae5a67add3b71e2aec4f047e1f92ae5f)
|
||||
**上传时间**:2024-12-24 13:56:16
|
||||
**简介**:RongIOC 一款全自动APT威胁情报拓线工具(APT Automated Tool )(使用教程+实战对比效果)
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:RongIOC 一款全自动APT威胁情报拓线工具(APT Automated Tool )(使用教程+实战对比效果)
|
||||
**作者**:Ting的安全笔记
|
||||
**链接**:[点此访问](https://mp.weixin.qq.com/s?__biz=MzkyODY3NjkyNQ==&mid=2247484405&idx=1&sn=c0993aa055e2c68bacd5f741c127e343)
|
||||
**上传时间**:2024-12-24 13:50:08
|
||||
**简介**:RongIOC 一款全自动APT威胁情报拓线工具(APT Automated Tool )(使用教程+实战对比效果)
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:RongIOC 一款全自动APT威胁情报拓线工具(APT Automated Tool )(使用教程+实战对比效果)
|
||||
**作者**:fkalis
|
||||
**链接**:[点此访问](https://mp.weixin.qq.com/s?__biz=MzkyODcwOTA4NA==&mid=2247487707&idx=1&sn=d6d9f18751c0de6108ed9cf7fda14742)
|
||||
**上传时间**:2024-12-24 13:35:03
|
||||
**简介**:RongIOC 一款全自动APT威胁情报拓线工具(APT Automated Tool )(使用教程+实战对比效果)
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:CVE-2024-56337:Apache Tomcat 修补关键 RCE 漏洞
|
||||
**作者**:Ots安全
|
||||
**链接**:[点此访问](https://mp.weixin.qq.com/s?__biz=MzAxMjYyMzkwOA==&mid=2247526417&idx=1&sn=5d19b7fd81e7e92ff3cca973a60ccd22)
|
||||
**上传时间**:2024-12-24 12:57:17
|
||||
**简介**:None
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:【首发 1day】WordPress File Upload 插件存在前台任意文件读取漏洞(CVE-2024-9047)
|
||||
**作者**:星悦安全
|
||||
**链接**:[点此访问](https://mp.weixin.qq.com/s?__biz=Mzg4MTkwMTI5Mw==&mid=2247488285&idx=1&sn=97653bb5fd6a2d661776be1026799921)
|
||||
**上传时间**:2024-12-24 11:54:54
|
||||
**简介**:安装完毕后,位于 /wp-content/plugins/wp-file-upload/wfu_file_downloader.php 中的wfu_fopen_for_downloader 方法存在fopen 函数导致文件读取操作.
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:通杀国内杀软,杀软你怎么不说话
|
||||
**作者**:朱厌安全
|
||||
**链接**:[点此访问](https://mp.weixin.qq.com/s?__biz=Mzg4Njg3MDk5Ng==&mid=2247486770&idx=1&sn=b8db3e65245e7a65d11c3599425ceb89)
|
||||
**上传时间**:2024-12-24 10:27:03
|
||||
**简介**:在网络安全领域,免杀技术是指通过各种手段使恶意代码不被杀毒软件检测到,从而实现隐蔽执行的技术。这在安全测试和渗透测试中尤为重要,因为它可以帮助测试人员模拟真实的攻击场景,评估系统的安全防护能力。
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:powershell横向渗透样本分析
|
||||
**作者**:SecretTeam安全团队
|
||||
**链接**:[点此访问](https://mp.weixin.qq.com/s?__biz=MzkzMDQ5MDM3NA==&mid=2247487857&idx=1&sn=a5d37ae0ffa77779a933ad9324b4518b)
|
||||
**上传时间**:2024-12-24 10:06:53
|
||||
**简介**:None
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:实战自动化加解密&加密场景下的暴力破解
|
||||
**作者**:黑白之道
|
||||
**链接**:[点此访问](https://mp.weixin.qq.com/s?__biz=MzAxMjE3ODU3MQ==&mid=2650605533&idx=3&sn=10b918d20ab45ac4b08ffe43015a116d)
|
||||
**上传时间**:2024-12-24 09:53:58
|
||||
**简介**:None
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:本地文件包含发现和利用工具
|
||||
**作者**:黑白之道
|
||||
**链接**:[点此访问](https://mp.weixin.qq.com/s?__biz=MzAxMjE3ODU3MQ==&mid=2650605533&idx=4&sn=0b44670e74524677e27530426c1546e8)
|
||||
**上传时间**:2024-12-24 09:53:58
|
||||
**简介**:None
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:应急响应记录之水坑挂马事件分析与恢复
|
||||
**链接**:https://xz.aliyun.com/t/16829
|
||||
**上传时间**:2024-12-19 14:27:41
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:万字长文窥探信息收集真正的艺术
|
||||
**链接**:https://xz.aliyun.com/t/16828
|
||||
**上传时间**:2024-12-19 13:57:53
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:免杀 | 过360核晶、火绒、defender上线CS、运行mimikatz的万能加载器XlAnyLoader 1.3正式发布!
|
||||
**作者**:星落安全团队
|
||||
**链接**:[点此访问](https://mp.weixin.qq.com/s?__biz=MzkwNjczOTQwOA==&mid=2247493398&idx=1&sn=23d23f07d66f01906e78850b25fe8b54)
|
||||
**上传时间**:2024-12-20 00:06:13
|
||||
**简介**:过360核晶、火绒 、微软 xlanyloader万能加载器
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:Apache Struts2 文件上传逻辑绕过(CVE-2024-53677)(S2-067)
|
||||
**作者**:网络安全者
|
||||
**链接**:[点此访问](https://mp.weixin.qq.com/s?__biz=MzU3NzY3MzYzMw==&mid=2247499048&idx=1&sn=8b4ebcd450f2bf1c19eef0d34f7ae4a8)
|
||||
**上传时间**:2024-12-20 00:00:37
|
||||
**简介**:None
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:【漏洞复现】Apache Tomcat竞争条件远程代码执行漏洞(CVE-2024-50379)
|
||||
**作者**:飓风网络安全
|
||||
**链接**:[点此访问](https://mp.weixin.qq.com/s?__biz=MzI3NzMzNzE5Ng==&mid=2247489333&idx=1&sn=dff7d934b42679e01f662c8f10e27f33)
|
||||
**上传时间**:2024-12-19 23:32:54
|
||||
**简介**:None
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:水泽-信息收集自动化工具
|
||||
**作者**:老鑫安全
|
||||
**链接**:[点此访问](https://mp.weixin.qq.com/s?__biz=MzU0NDc0NTY3OQ==&mid=2247488235&idx=1&sn=9b8854db458754ceff2b98e49a07a6ba)
|
||||
**上传时间**:2024-12-19 22:11:41
|
||||
**简介**:一条龙服务,只需要输入根域名即可全方位收集相关资产,并检测漏洞。也可以输入多个域名、C段IP等,具体案例见下文。
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:【漏洞通告】OpenWrt Attended SysUpgrade 命令注入漏洞(CVE-2024-54143)
|
||||
**作者**:安迈信科应急响应中心
|
||||
**链接**:[点此访问](https://mp.weixin.qq.com/s?__biz=Mzg2NjczMzc1NA==&mid=2247486475&idx=4&sn=943a72a40bc01ee1401d16c5b6db3f11)
|
||||
**上传时间**:2024-12-19 20:35:26
|
||||
**简介**:None
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:深入浅出API测试|搜集分析与漏洞挖掘实战
|
||||
**作者**:迪哥讲事
|
||||
**链接**:[点此访问](https://mp.weixin.qq.com/s?__biz=MzIzMTIzNTM0MA==&mid=2247496635&idx=1&sn=34c31d16785a1db6359cc507f1312498)
|
||||
**上传时间**:2024-12-19 20:30:27
|
||||
**简介**:None
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:Apache Tomcat新漏洞允许攻击者执行远程代码
|
||||
**作者**:FreeBuf
|
||||
**链接**:[点此访问](https://mp.weixin.qq.com/s?__biz=MjM5NjA0NjgyMA==&mid=2651310195&idx=3&sn=d9e83e129b0a14950e2d04cd8ad9576c)
|
||||
**上传时间**:2024-12-19 19:04:02
|
||||
**简介**:Apache已发布安全漏洞补丁,敦促用户立即升级。
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:Apache Struts重大漏洞被黑客利用,远程代码执行风险加剧
|
||||
**作者**:安世加
|
||||
**链接**:[点此访问](https://mp.weixin.qq.com/s?__biz=MzU2MTQwMzMxNA==&mid=2247541073&idx=1&sn=66d200edcdbbb26a0c8618ca749bcfbe)
|
||||
**上传时间**:2024-12-19 18:36:00
|
||||
**简介**:None
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:俄罗斯黑客利用RDP代理发动中间人攻击窃取数据
|
||||
**作者**:代码卫士
|
||||
**链接**:[点此访问](https://mp.weixin.qq.com/s?__biz=MzI2NTg4OTc5Nw==&mid=2247521847&idx=1&sn=3574f2fa73eb1444a958326d5c4956db)
|
||||
**上传时间**:2024-12-19 18:20:42
|
||||
**简介**:APT29攻击的实体主要位于美国、法国、澳大利亚、乌克兰、葡萄牙、德国、以色列、法国、希腊、土耳其和荷兰。
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:Apache Tomcat 最新RCE 稳定复现+分析 保姆级!附复现视频+POC
|
||||
**作者**:fkalis
|
||||
**链接**:[点此访问](https://mp.weixin.qq.com/s?__biz=MzkyODcwOTA4NA==&mid=2247487434&idx=1&sn=52ed8d0b21e6701c0e4503999d9dfeaa)
|
||||
**上传时间**:2024-12-19 18:18:47
|
||||
**简介**:CVE-2024-50379稳定复现 保姆级!!附视频+POC
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:【bWAPP】XSS跨站脚本攻击实战
|
||||
**作者**:儒道易行
|
||||
**链接**:[点此访问](https://mp.weixin.qq.com/s?__biz=Mzg5NTU2NjA1Mw==&mid=2247495189&idx=1&sn=222ce09d0825a28d562ba2ca0ae80806)
|
||||
**上传时间**:2024-12-19 18:00:40
|
||||
**简介**:别低头,皇冠会掉;别流泪,贱人会笑。
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:u200bApache Tomcat高危漏洞曝光,远程代码执行风险需警惕
|
||||
**作者**:看雪学苑
|
||||
**链接**:[点此访问](https://mp.weixin.qq.com/s?__biz=MjM5NTc2MDYxMw==&mid=2458587465&idx=2&sn=e5d0f25746dce13de80ec7ed9907263f)
|
||||
**上传时间**:2024-12-19 17:59:23
|
||||
**简介**:Apache Tomcat爆出两个严重安全漏洞,可导致远程代码执行和拒绝服务攻击,官方已发布补丁,强烈推荐用户立即升级。
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:创宇安全智脑 | 灵当 CRM uploadify.php 任意文件上传等70个漏洞可检测
|
||||
**作者**:创宇安全智脑
|
||||
**链接**:[点此访问](https://mp.weixin.qq.com/s?__biz=MzIwNjU0NjAyNg==&mid=2247490111&idx=1&sn=0c1158934db85f02099fd8f3d919c930)
|
||||
**上传时间**:2024-12-19 17:50:42
|
||||
**简介**:创宇安全智脑是基于知道创宇16年来AI+安全大数据在真实攻防场景中的经验积累构建的下一代全场景安全智能算力平台
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:蓝凌OA-文件读取(在野)
|
||||
**作者**:Kokoxca安全
|
||||
**链接**:[点此访问](https://mp.weixin.qq.com/s?__biz=Mzg3ODkzNjkxMg==&mid=2247483998&idx=1&sn=079d99e58f631ca79a0dda791b7416db)
|
||||
**上传时间**:2024-12-19 17:21:30
|
||||
**简介**:None
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:SharpHunter - Windows 主机信息自动化狩猎工具
|
||||
**作者**:黑熊安全
|
||||
**链接**:[点此访问](https://mp.weixin.qq.com/s?__biz=Mzg2MTg2NzI5OA==&mid=2247484856&idx=1&sn=e11dcfd0960e7dfb0860e4b56b3fe5f9)
|
||||
**上传时间**:2024-12-19 17:15:56
|
||||
**简介**:None
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:Apache Tomcat 最新RCE 稳定复现+分析 保姆级!附复现视频+POC
|
||||
**作者**:WingBy安全团队
|
||||
**链接**:[点此访问](https://mp.weixin.qq.com/s?__biz=MzkzNTY1MTg4Mg==&mid=2247484202&idx=1&sn=0e1298d761bd7888caf1c2f8f6dee4f1)
|
||||
**上传时间**:2024-12-19 16:47:36
|
||||
**简介**:CVE-2024-50379稳定复现 保姆级!!附视频+POC
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:新高危漏洞 (附在野POC)| Struts2任意文件上传漏洞(CVE-2024-53677)
|
||||
**作者**:励行安全
|
||||
**链接**:[点此访问](https://mp.weixin.qq.com/s?__biz=MzkxNTY4NTQwMg==&mid=2247484183&idx=1&sn=54a360747cca4c12f38b8325bbe8230a)
|
||||
**上传时间**:2024-12-19 16:02:49
|
||||
**简介**:None
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:【代理工具】Proxifier v4.0.7 汉化版
|
||||
**作者**:Z0安全
|
||||
**链接**:[点此访问](https://mp.weixin.qq.com/s?__biz=Mzk0OTY2ODE1NA==&mid=2247484932&idx=1&sn=64c3aff328fff11cce973871947cad45)
|
||||
**上传时间**:2024-12-19 15:43:43
|
||||
**简介**:星标公众号,及时接收推送。
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:Apache Tomcat 最新RCE 稳定复现+分析 保姆级!!!附复现视频+POC
|
||||
**作者**:Ting的安全笔记
|
||||
**链接**:[点此访问](https://mp.weixin.qq.com/s?__biz=MzkyODY3NjkyNQ==&mid=2247484396&idx=1&sn=73b8f9b54a54eb1b5412bfc84a7662fc)
|
||||
**上传时间**:2024-12-19 15:32:02
|
||||
**简介**:CVE-2024-50379稳定复现 保姆级!!附视频+POC
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:隐藏有效负载:在图像文件中嵌入Shellcode
|
||||
**作者**:Ots安全
|
||||
**链接**:[点此访问](https://mp.weixin.qq.com/s?__biz=MzAxMjYyMzkwOA==&mid=2247526144&idx=1&sn=f0ae2bdadd3ed8bb8d1468c3566dbb21)
|
||||
**上传时间**:2024-12-19 14:31:09
|
||||
**简介**:None
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:攻击者利用 Microsoft Teams 和 AnyDesk 部署 DarkGate 恶意软件
|
||||
**作者**:Ots安全
|
||||
**链接**:[点此访问](https://mp.weixin.qq.com/s?__biz=MzAxMjYyMzkwOA==&mid=2247526144&idx=3&sn=05e5e74fd895282501e35cbd025f4b2a)
|
||||
**上传时间**:2024-12-19 14:31:09
|
||||
**简介**:None
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:Tomcat RCE | CVE-2024-50379条件竞争RCE复现,带视频教程及POC
|
||||
**作者**:犀利猪安全
|
||||
**链接**:[点此访问](https://mp.weixin.qq.com/s?__biz=Mzk0NzQxNzY2OQ==&mid=2247487499&idx=1&sn=54c62641c62f93cdf13a14f22231801f)
|
||||
**上传时间**:2024-12-19 14:20:03
|
||||
**简介**:犀利猪安全,带你上高速~
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:应急响应记录之水坑挂马事件分析与恢复
|
||||
**链接**:https://xz.aliyun.com/t/16829
|
||||
**上传时间**:2024-12-19 14:27:41
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:万字长文窥探信息收集真正的艺术
|
||||
**链接**:https://xz.aliyun.com/t/16828
|
||||
**上传时间**:2024-12-19 13:57:53
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:免杀 | 过360核晶、火绒、defender上线CS、运行mimikatz的万能加载器XlAnyLoader 1.3正式发布!
|
||||
**作者**:星落安全团队
|
||||
**链接**:[点此访问](https://mp.weixin.qq.com/s?__biz=MzkwNjczOTQwOA==&mid=2247493398&idx=1&sn=23d23f07d66f01906e78850b25fe8b54)
|
||||
**上传时间**:2024-12-20 00:06:13
|
||||
**简介**:过360核晶、火绒 、微软 xlanyloader万能加载器
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:Apache Struts2 文件上传逻辑绕过(CVE-2024-53677)(S2-067)
|
||||
**作者**:网络安全者
|
||||
**链接**:[点此访问](https://mp.weixin.qq.com/s?__biz=MzU3NzY3MzYzMw==&mid=2247499048&idx=1&sn=8b4ebcd450f2bf1c19eef0d34f7ae4a8)
|
||||
**上传时间**:2024-12-20 00:00:37
|
||||
**简介**:None
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:【漏洞复现】Apache Tomcat竞争条件远程代码执行漏洞(CVE-2024-50379)
|
||||
**作者**:飓风网络安全
|
||||
**链接**:[点此访问](https://mp.weixin.qq.com/s?__biz=MzI3NzMzNzE5Ng==&mid=2247489333&idx=1&sn=dff7d934b42679e01f662c8f10e27f33)
|
||||
**上传时间**:2024-12-19 23:32:54
|
||||
**简介**:None
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:水泽-信息收集自动化工具
|
||||
**作者**:老鑫安全
|
||||
**链接**:[点此访问](https://mp.weixin.qq.com/s?__biz=MzU0NDc0NTY3OQ==&mid=2247488235&idx=1&sn=9b8854db458754ceff2b98e49a07a6ba)
|
||||
**上传时间**:2024-12-19 22:11:41
|
||||
**简介**:一条龙服务,只需要输入根域名即可全方位收集相关资产,并检测漏洞。也可以输入多个域名、C段IP等,具体案例见下文。
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:【漏洞通告】OpenWrt Attended SysUpgrade 命令注入漏洞(CVE-2024-54143)
|
||||
**作者**:安迈信科应急响应中心
|
||||
**链接**:[点此访问](https://mp.weixin.qq.com/s?__biz=Mzg2NjczMzc1NA==&mid=2247486475&idx=4&sn=943a72a40bc01ee1401d16c5b6db3f11)
|
||||
**上传时间**:2024-12-19 20:35:26
|
||||
**简介**:None
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:深入浅出API测试|搜集分析与漏洞挖掘实战
|
||||
**作者**:迪哥讲事
|
||||
**链接**:[点此访问](https://mp.weixin.qq.com/s?__biz=MzIzMTIzNTM0MA==&mid=2247496635&idx=1&sn=34c31d16785a1db6359cc507f1312498)
|
||||
**上传时间**:2024-12-19 20:30:27
|
||||
**简介**:None
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:Apache Tomcat新漏洞允许攻击者执行远程代码
|
||||
**作者**:FreeBuf
|
||||
**链接**:[点此访问](https://mp.weixin.qq.com/s?__biz=MjM5NjA0NjgyMA==&mid=2651310195&idx=3&sn=d9e83e129b0a14950e2d04cd8ad9576c)
|
||||
**上传时间**:2024-12-19 19:04:02
|
||||
**简介**:Apache已发布安全漏洞补丁,敦促用户立即升级。
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:Apache Struts重大漏洞被黑客利用,远程代码执行风险加剧
|
||||
**作者**:安世加
|
||||
**链接**:[点此访问](https://mp.weixin.qq.com/s?__biz=MzU2MTQwMzMxNA==&mid=2247541073&idx=1&sn=66d200edcdbbb26a0c8618ca749bcfbe)
|
||||
**上传时间**:2024-12-19 18:36:00
|
||||
**简介**:None
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:俄罗斯黑客利用RDP代理发动中间人攻击窃取数据
|
||||
**作者**:代码卫士
|
||||
**链接**:[点此访问](https://mp.weixin.qq.com/s?__biz=MzI2NTg4OTc5Nw==&mid=2247521847&idx=1&sn=3574f2fa73eb1444a958326d5c4956db)
|
||||
**上传时间**:2024-12-19 18:20:42
|
||||
**简介**:APT29攻击的实体主要位于美国、法国、澳大利亚、乌克兰、葡萄牙、德国、以色列、法国、希腊、土耳其和荷兰。
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:Apache Tomcat 最新RCE 稳定复现+分析 保姆级!附复现视频+POC
|
||||
**作者**:fkalis
|
||||
**链接**:[点此访问](https://mp.weixin.qq.com/s?__biz=MzkyODcwOTA4NA==&mid=2247487434&idx=1&sn=52ed8d0b21e6701c0e4503999d9dfeaa)
|
||||
**上传时间**:2024-12-19 18:18:47
|
||||
**简介**:CVE-2024-50379稳定复现 保姆级!!附视频+POC
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:【bWAPP】XSS跨站脚本攻击实战
|
||||
**作者**:儒道易行
|
||||
**链接**:[点此访问](https://mp.weixin.qq.com/s?__biz=Mzg5NTU2NjA1Mw==&mid=2247495189&idx=1&sn=222ce09d0825a28d562ba2ca0ae80806)
|
||||
**上传时间**:2024-12-19 18:00:40
|
||||
**简介**:别低头,皇冠会掉;别流泪,贱人会笑。
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:u200bApache Tomcat高危漏洞曝光,远程代码执行风险需警惕
|
||||
**作者**:看雪学苑
|
||||
**链接**:[点此访问](https://mp.weixin.qq.com/s?__biz=MjM5NTc2MDYxMw==&mid=2458587465&idx=2&sn=e5d0f25746dce13de80ec7ed9907263f)
|
||||
**上传时间**:2024-12-19 17:59:23
|
||||
**简介**:Apache Tomcat爆出两个严重安全漏洞,可导致远程代码执行和拒绝服务攻击,官方已发布补丁,强烈推荐用户立即升级。
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:创宇安全智脑 | 灵当 CRM uploadify.php 任意文件上传等70个漏洞可检测
|
||||
**作者**:创宇安全智脑
|
||||
**链接**:[点此访问](https://mp.weixin.qq.com/s?__biz=MzIwNjU0NjAyNg==&mid=2247490111&idx=1&sn=0c1158934db85f02099fd8f3d919c930)
|
||||
**上传时间**:2024-12-19 17:50:42
|
||||
**简介**:创宇安全智脑是基于知道创宇16年来AI+安全大数据在真实攻防场景中的经验积累构建的下一代全场景安全智能算力平台
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:蓝凌OA-文件读取(在野)
|
||||
**作者**:Kokoxca安全
|
||||
**链接**:[点此访问](https://mp.weixin.qq.com/s?__biz=Mzg3ODkzNjkxMg==&mid=2247483998&idx=1&sn=079d99e58f631ca79a0dda791b7416db)
|
||||
**上传时间**:2024-12-19 17:21:30
|
||||
**简介**:None
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:SharpHunter - Windows 主机信息自动化狩猎工具
|
||||
**作者**:黑熊安全
|
||||
**链接**:[点此访问](https://mp.weixin.qq.com/s?__biz=Mzg2MTg2NzI5OA==&mid=2247484856&idx=1&sn=e11dcfd0960e7dfb0860e4b56b3fe5f9)
|
||||
**上传时间**:2024-12-19 17:15:56
|
||||
**简介**:None
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:Apache Tomcat 最新RCE 稳定复现+分析 保姆级!附复现视频+POC
|
||||
**作者**:WingBy安全团队
|
||||
**链接**:[点此访问](https://mp.weixin.qq.com/s?__biz=MzkzNTY1MTg4Mg==&mid=2247484202&idx=1&sn=0e1298d761bd7888caf1c2f8f6dee4f1)
|
||||
**上传时间**:2024-12-19 16:47:36
|
||||
**简介**:CVE-2024-50379稳定复现 保姆级!!附视频+POC
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:新高危漏洞 (附在野POC)| Struts2任意文件上传漏洞(CVE-2024-53677)
|
||||
**作者**:励行安全
|
||||
**链接**:[点此访问](https://mp.weixin.qq.com/s?__biz=MzkxNTY4NTQwMg==&mid=2247484183&idx=1&sn=54a360747cca4c12f38b8325bbe8230a)
|
||||
**上传时间**:2024-12-19 16:02:49
|
||||
**简介**:None
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:【代理工具】Proxifier v4.0.7 汉化版
|
||||
**作者**:Z0安全
|
||||
**链接**:[点此访问](https://mp.weixin.qq.com/s?__biz=Mzk0OTY2ODE1NA==&mid=2247484932&idx=1&sn=64c3aff328fff11cce973871947cad45)
|
||||
**上传时间**:2024-12-19 15:43:43
|
||||
**简介**:星标公众号,及时接收推送。
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:Apache Tomcat 最新RCE 稳定复现+分析 保姆级!!!附复现视频+POC
|
||||
**作者**:Ting的安全笔记
|
||||
**链接**:[点此访问](https://mp.weixin.qq.com/s?__biz=MzkyODY3NjkyNQ==&mid=2247484396&idx=1&sn=73b8f9b54a54eb1b5412bfc84a7662fc)
|
||||
**上传时间**:2024-12-19 15:32:02
|
||||
**简介**:CVE-2024-50379稳定复现 保姆级!!附视频+POC
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:隐藏有效负载:在图像文件中嵌入Shellcode
|
||||
**作者**:Ots安全
|
||||
**链接**:[点此访问](https://mp.weixin.qq.com/s?__biz=MzAxMjYyMzkwOA==&mid=2247526144&idx=1&sn=f0ae2bdadd3ed8bb8d1468c3566dbb21)
|
||||
**上传时间**:2024-12-19 14:31:09
|
||||
**简介**:None
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:攻击者利用 Microsoft Teams 和 AnyDesk 部署 DarkGate 恶意软件
|
||||
**作者**:Ots安全
|
||||
**链接**:[点此访问](https://mp.weixin.qq.com/s?__biz=MzAxMjYyMzkwOA==&mid=2247526144&idx=3&sn=05e5e74fd895282501e35cbd025f4b2a)
|
||||
**上传时间**:2024-12-19 14:31:09
|
||||
**简介**:None
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:Tomcat RCE | CVE-2024-50379条件竞争RCE复现,带视频教程及POC
|
||||
**作者**:犀利猪安全
|
||||
**链接**:[点此访问](https://mp.weixin.qq.com/s?__biz=Mzk0NzQxNzY2OQ==&mid=2247487499&idx=1&sn=54c62641c62f93cdf13a14f22231801f)
|
||||
**上传时间**:2024-12-19 14:20:03
|
||||
**简介**:犀利猪安全,带你上高速~
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:应急响应记录之水坑挂马事件分析与恢复
|
||||
**链接**:https://xz.aliyun.com/t/16829
|
||||
**上传时间**:2024-12-19 14:27:41
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:万字长文窥探信息收集真正的艺术
|
||||
**链接**:https://xz.aliyun.com/t/16828
|
||||
**上传时间**:2024-12-19 13:57:53
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:Apache Struts2 文件上传逻辑绕过(CVE-2024-53677)(S2-067)
|
||||
**作者**:网络安全者
|
||||
**链接**:[点此访问](https://mp.weixin.qq.com/s?__biz=MzU3NzY3MzYzMw==&mid=2247499048&idx=1&sn=8b4ebcd450f2bf1c19eef0d34f7ae4a8)
|
||||
**上传时间**:2024-12-20 00:00:37
|
||||
**简介**:None
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:【漏洞复现】Apache Tomcat竞争条件远程代码执行漏洞(CVE-2024-50379)
|
||||
**作者**:飓风网络安全
|
||||
**链接**:[点此访问](https://mp.weixin.qq.com/s?__biz=MzI3NzMzNzE5Ng==&mid=2247489333&idx=1&sn=dff7d934b42679e01f662c8f10e27f33)
|
||||
**上传时间**:2024-12-19 23:32:54
|
||||
**简介**:None
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:水泽-信息收集自动化工具
|
||||
**作者**:老鑫安全
|
||||
**链接**:[点此访问](https://mp.weixin.qq.com/s?__biz=MzU0NDc0NTY3OQ==&mid=2247488235&idx=1&sn=9b8854db458754ceff2b98e49a07a6ba)
|
||||
**上传时间**:2024-12-19 22:11:41
|
||||
**简介**:一条龙服务,只需要输入根域名即可全方位收集相关资产,并检测漏洞。也可以输入多个域名、C段IP等,具体案例见下文。
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:【漏洞通告】OpenWrt Attended SysUpgrade 命令注入漏洞(CVE-2024-54143)
|
||||
**作者**:安迈信科应急响应中心
|
||||
**链接**:[点此访问](https://mp.weixin.qq.com/s?__biz=Mzg2NjczMzc1NA==&mid=2247486475&idx=4&sn=943a72a40bc01ee1401d16c5b6db3f11)
|
||||
**上传时间**:2024-12-19 20:35:26
|
||||
**简介**:None
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:深入浅出API测试|搜集分析与漏洞挖掘实战
|
||||
**作者**:迪哥讲事
|
||||
**链接**:[点此访问](https://mp.weixin.qq.com/s?__biz=MzIzMTIzNTM0MA==&mid=2247496635&idx=1&sn=34c31d16785a1db6359cc507f1312498)
|
||||
**上传时间**:2024-12-19 20:30:27
|
||||
**简介**:None
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:Apache Tomcat新漏洞允许攻击者执行远程代码
|
||||
**作者**:FreeBuf
|
||||
**链接**:[点此访问](https://mp.weixin.qq.com/s?__biz=MjM5NjA0NjgyMA==&mid=2651310195&idx=3&sn=d9e83e129b0a14950e2d04cd8ad9576c)
|
||||
**上传时间**:2024-12-19 19:04:02
|
||||
**简介**:Apache已发布安全漏洞补丁,敦促用户立即升级。
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:Apache Struts重大漏洞被黑客利用,远程代码执行风险加剧
|
||||
**作者**:安世加
|
||||
**链接**:[点此访问](https://mp.weixin.qq.com/s?__biz=MzU2MTQwMzMxNA==&mid=2247541073&idx=1&sn=66d200edcdbbb26a0c8618ca749bcfbe)
|
||||
**上传时间**:2024-12-19 18:36:00
|
||||
**简介**:None
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:俄罗斯黑客利用RDP代理发动中间人攻击窃取数据
|
||||
**作者**:代码卫士
|
||||
**链接**:[点此访问](https://mp.weixin.qq.com/s?__biz=MzI2NTg4OTc5Nw==&mid=2247521847&idx=1&sn=3574f2fa73eb1444a958326d5c4956db)
|
||||
**上传时间**:2024-12-19 18:20:42
|
||||
**简介**:APT29攻击的实体主要位于美国、法国、澳大利亚、乌克兰、葡萄牙、德国、以色列、法国、希腊、土耳其和荷兰。
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:Apache Tomcat 最新RCE 稳定复现+分析 保姆级!附复现视频+POC
|
||||
**作者**:fkalis
|
||||
**链接**:[点此访问](https://mp.weixin.qq.com/s?__biz=MzkyODcwOTA4NA==&mid=2247487434&idx=1&sn=52ed8d0b21e6701c0e4503999d9dfeaa)
|
||||
**上传时间**:2024-12-19 18:18:47
|
||||
**简介**:CVE-2024-50379稳定复现 保姆级!!附视频+POC
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:【bWAPP】XSS跨站脚本攻击实战
|
||||
**作者**:儒道易行
|
||||
**链接**:[点此访问](https://mp.weixin.qq.com/s?__biz=Mzg5NTU2NjA1Mw==&mid=2247495189&idx=1&sn=222ce09d0825a28d562ba2ca0ae80806)
|
||||
**上传时间**:2024-12-19 18:00:40
|
||||
**简介**:别低头,皇冠会掉;别流泪,贱人会笑。
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:u200bApache Tomcat高危漏洞曝光,远程代码执行风险需警惕
|
||||
**作者**:看雪学苑
|
||||
**链接**:[点此访问](https://mp.weixin.qq.com/s?__biz=MjM5NTc2MDYxMw==&mid=2458587465&idx=2&sn=e5d0f25746dce13de80ec7ed9907263f)
|
||||
**上传时间**:2024-12-19 17:59:23
|
||||
**简介**:Apache Tomcat爆出两个严重安全漏洞,可导致远程代码执行和拒绝服务攻击,官方已发布补丁,强烈推荐用户立即升级。
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:创宇安全智脑 | 灵当 CRM uploadify.php 任意文件上传等70个漏洞可检测
|
||||
**作者**:创宇安全智脑
|
||||
**链接**:[点此访问](https://mp.weixin.qq.com/s?__biz=MzIwNjU0NjAyNg==&mid=2247490111&idx=1&sn=0c1158934db85f02099fd8f3d919c930)
|
||||
**上传时间**:2024-12-19 17:50:42
|
||||
**简介**:创宇安全智脑是基于知道创宇16年来AI+安全大数据在真实攻防场景中的经验积累构建的下一代全场景安全智能算力平台
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:蓝凌OA-文件读取(在野)
|
||||
**作者**:Kokoxca安全
|
||||
**链接**:[点此访问](https://mp.weixin.qq.com/s?__biz=Mzg3ODkzNjkxMg==&mid=2247483998&idx=1&sn=079d99e58f631ca79a0dda791b7416db)
|
||||
**上传时间**:2024-12-19 17:21:30
|
||||
**简介**:None
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:SharpHunter - Windows 主机信息自动化狩猎工具
|
||||
**作者**:黑熊安全
|
||||
**链接**:[点此访问](https://mp.weixin.qq.com/s?__biz=Mzg2MTg2NzI5OA==&mid=2247484856&idx=1&sn=e11dcfd0960e7dfb0860e4b56b3fe5f9)
|
||||
**上传时间**:2024-12-19 17:15:56
|
||||
**简介**:None
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:Apache Tomcat 最新RCE 稳定复现+分析 保姆级!附复现视频+POC
|
||||
**作者**:WingBy安全团队
|
||||
**链接**:[点此访问](https://mp.weixin.qq.com/s?__biz=MzkzNTY1MTg4Mg==&mid=2247484202&idx=1&sn=0e1298d761bd7888caf1c2f8f6dee4f1)
|
||||
**上传时间**:2024-12-19 16:47:36
|
||||
**简介**:CVE-2024-50379稳定复现 保姆级!!附视频+POC
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:新高危漏洞 (附在野POC)| Struts2任意文件上传漏洞(CVE-2024-53677)
|
||||
**作者**:励行安全
|
||||
**链接**:[点此访问](https://mp.weixin.qq.com/s?__biz=MzkxNTY4NTQwMg==&mid=2247484183&idx=1&sn=54a360747cca4c12f38b8325bbe8230a)
|
||||
**上传时间**:2024-12-19 16:02:49
|
||||
**简介**:None
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:【代理工具】Proxifier v4.0.7 汉化版
|
||||
**作者**:Z0安全
|
||||
**链接**:[点此访问](https://mp.weixin.qq.com/s?__biz=Mzk0OTY2ODE1NA==&mid=2247484932&idx=1&sn=64c3aff328fff11cce973871947cad45)
|
||||
**上传时间**:2024-12-19 15:43:43
|
||||
**简介**:星标公众号,及时接收推送。
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:Apache Tomcat 最新RCE 稳定复现+分析 保姆级!!!附复现视频+POC
|
||||
**作者**:Ting的安全笔记
|
||||
**链接**:[点此访问](https://mp.weixin.qq.com/s?__biz=MzkyODY3NjkyNQ==&mid=2247484396&idx=1&sn=73b8f9b54a54eb1b5412bfc84a7662fc)
|
||||
**上传时间**:2024-12-19 15:32:02
|
||||
**简介**:CVE-2024-50379稳定复现 保姆级!!附视频+POC
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:隐藏有效负载:在图像文件中嵌入Shellcode
|
||||
**作者**:Ots安全
|
||||
**链接**:[点此访问](https://mp.weixin.qq.com/s?__biz=MzAxMjYyMzkwOA==&mid=2247526144&idx=1&sn=f0ae2bdadd3ed8bb8d1468c3566dbb21)
|
||||
**上传时间**:2024-12-19 14:31:09
|
||||
**简介**:None
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:攻击者利用 Microsoft Teams 和 AnyDesk 部署 DarkGate 恶意软件
|
||||
**作者**:Ots安全
|
||||
**链接**:[点此访问](https://mp.weixin.qq.com/s?__biz=MzAxMjYyMzkwOA==&mid=2247526144&idx=3&sn=05e5e74fd895282501e35cbd025f4b2a)
|
||||
**上传时间**:2024-12-19 14:31:09
|
||||
**简介**:None
|
||||
|
||||
----------------------------------------
|
||||
#### 文章:Tomcat RCE | CVE-2024-50379条件竞争RCE复现,带视频教程及POC
|
||||
**作者**:犀利猪安全
|
||||
**链接**:[点此访问](https://mp.weixin.qq.com/s?__biz=Mzk0NzQxNzY2OQ==&mid=2247487499&idx=1&sn=54c62641c62f93cdf13a14f22231801f)
|
||||
**上传时间**:2024-12-19 14:20:03
|
||||
**简介**:犀利猪安全,带你上高速~
|
||||
|
||||
----------------------------------------
|
46
log/core.log
46
log/core.log
@ -1,46 +0,0 @@
|
||||
2024-12-20 01:26:46 - INFO - __main__:<module>:220 - 飞书发送 程序信息 成功
|
||||
2024-12-20 01:26:46 - INFO - __main__:<module>:223 - 飞书发送 RSS源状态 成功
|
||||
2024-12-20 01:26:53 - INFO - __main__:signal_handler:138 - 接收到退出信号,程序即将退出...
|
||||
2024-12-20 01:27:36 - INFO - __main__:<module>:220 - 飞书发送 程序信息 成功
|
||||
2024-12-20 01:27:36 - INFO - __main__:<module>:223 - 飞书发送 RSS源状态 成功
|
||||
2024-12-20 01:27:36 - INFO - __main__:<module>:228 - 企业微信发送 程序信息 成功
|
||||
2024-12-20 01:27:36 - INFO - __main__:<module>:231 - 企业微信发送 RSS源状态 成功
|
||||
2024-12-20 01:28:23 - INFO - __main__:signal_handler:138 - 接收到退出信号,程序即将退出...
|
||||
2024-12-20 01:28:32 - INFO - __main__:<module>:220 - 飞书发送 程序信息 成功
|
||||
2024-12-20 01:28:33 - INFO - __main__:<module>:223 - 飞书发送 RSS源状态 成功
|
||||
2024-12-20 01:28:33 - INFO - __main__:<module>:228 - 企业微信发送 程序信息 成功
|
||||
2024-12-20 01:28:33 - INFO - __main__:<module>:231 - 企业微信发送 RSS源状态 成功
|
||||
2024-12-20 01:28:33 - INFO - __main__:send_job:85 - 发送程序启动,当前时间为:2024-12-20 01:28:33
|
||||
2024-12-20 01:28:33 - INFO - __main__:send_job:86 - 正在启动各爬虫并获取资源中...
|
||||
2024-12-20 01:28:34 - INFO - media.common:seebug_main:89 - 数据已保存到 ./JSON/seebug.json!
|
||||
2024-12-20 01:28:35 - INFO - media.common:anquanke_main:125 - 数据已保存到 ./JSON/anquanke.json!
|
||||
2024-12-20 01:28:35 - INFO - media.common:huawei_main:161 - 数据已保存到 ./JSON/huawei.json!
|
||||
2024-12-20 01:28:35 - INFO - media.common:doonsec_main:179 - 数据已保存到 ./JSON/doonsec.json!
|
||||
2024-12-20 01:28:35 - INFO - media.common:qianxin_main:197 - 数据已保存到 ./JSON/qianxin.json!
|
||||
2024-12-20 01:28:35 - INFO - media.freebuf:freebuf_main:78 - 数据已保存到 ./JSON/freebuf.json!
|
||||
2024-12-20 01:28:37 - INFO - media.xianzhi:xianzhi_main:76 - 数据已保存到 ./JSON/xianzhi.json!
|
||||
2024-12-20 01:28:37 - INFO - media.common:M_4hou_main:107 - 数据已保存到 ./JSON/4hou.json!
|
||||
2024-12-20 01:28:37 - ERROR - __main__:main_loop:155 - 发生错误: cannot access local variable 'result_4hou_short' where it is not associated with a value, 程序已暂停
|
||||
2024-12-20 01:30:34 - INFO - __main__:<module>:218 - 飞书发送 程序信息 成功
|
||||
2024-12-20 01:30:34 - INFO - __main__:<module>:221 - 飞书发送 RSS源状态 成功
|
||||
2024-12-20 01:30:35 - INFO - __main__:<module>:226 - 企业微信发送 程序信息 成功
|
||||
2024-12-20 01:30:35 - INFO - __main__:<module>:229 - 企业微信发送 RSS源状态 成功
|
||||
2024-12-20 01:30:35 - INFO - __main__:send_job:85 - 发送程序启动,当前时间为:2024-12-20 01:30:35
|
||||
2024-12-20 01:30:35 - INFO - __main__:send_job:86 - 正在启动各爬虫并获取资源中...
|
||||
2024-12-20 01:30:36 - INFO - media.common:seebug_main:89 - 数据已保存到 ./JSON/seebug.json!
|
||||
2024-12-20 01:30:36 - INFO - media.common:anquanke_main:125 - 数据已保存到 ./JSON/anquanke.json!
|
||||
2024-12-20 01:30:36 - INFO - media.common:huawei_main:161 - 数据已保存到 ./JSON/huawei.json!
|
||||
2024-12-20 01:30:37 - INFO - media.common:doonsec_main:179 - 数据已保存到 ./JSON/doonsec.json!
|
||||
2024-12-20 01:30:37 - INFO - media.common:qianxin_main:197 - 数据已保存到 ./JSON/qianxin.json!
|
||||
2024-12-20 01:30:37 - INFO - media.freebuf:freebuf_main:78 - 数据已保存到 ./JSON/freebuf.json!
|
||||
2024-12-20 01:30:39 - INFO - media.xianzhi:xianzhi_main:76 - 数据已保存到 ./JSON/xianzhi.json!
|
||||
2024-12-20 01:30:39 - INFO - media.common:M_4hou_main:107 - 数据已保存到 ./JSON/4hou.json!
|
||||
2024-12-20 01:30:40 - INFO - __main__:check_avaliable:58 - 飞书发送 嘶吼资讯 成功
|
||||
2024-12-20 01:31:10 - INFO - __main__:check_avaliable:67 - 企业微信发送 嘶吼资讯 成功
|
||||
2024-12-20 01:31:40 - INFO - __main__:check_avaliable:58 - 飞书发送 安全客资讯 成功
|
||||
2024-12-20 01:32:10 - INFO - __main__:check_avaliable:67 - 企业微信发送 安全客资讯 成功
|
||||
2024-12-20 01:32:41 - INFO - __main__:check_avaliable:58 - 飞书发送 洞见微信安全资讯 成功
|
||||
2024-12-20 01:33:11 - INFO - __main__:check_avaliable:67 - 洞见微信安全资讯 发送失败: 其他错误,请检查请求参数是否正确!
|
||||
原因:markdown.content exceed max length 4096. invalid Request Parameter, hint: [1734629601118370584366737], from ip: 123.112.18.2, more info at https://open.work.weixin.qq.com/devtool/query?e=40058
|
||||
2024-12-20 01:33:41 - INFO - __main__:check_avaliable:58 - 飞书发送 先知社区资讯 成功
|
||||
2024-12-20 01:34:04 - INFO - __main__:signal_handler:136 - 接收到退出信号,程序即将退出...
|
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Loading…
Reference in New Issue
Block a user