1602 lines
82 KiB
JSON
1602 lines
82 KiB
JSON
[
|
||
{
|
||
"title": "网安瞭望台第18期:警惕新型攻击利用Windows Defender绕过终端检测、CVE-2024-50379 漏洞利用工具分享",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=Mzg2NTkwODU3Ng==&mid=2247514556&idx=1&sn=a10e80238c91658489ebe6cc8657315c",
|
||
"description": "网安资讯分享\\\\x0d\\\\x0aDAILY NEWS AND KNOWLEDGE",
|
||
"author": "东方隐侠安全团队",
|
||
"category": "东方隐侠安全团队",
|
||
"pubDate": "2024-12-25T20:31:30"
|
||
},
|
||
{
|
||
"title": "MDUT-Extend(MDUT-增强版) V1.2.0 Released",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzI5NDg0ODkwMQ==&mid=2247486138&idx=1&sn=4f881e7e1cc99466d57aa3d95d980b3b",
|
||
"description": null,
|
||
"author": "格格巫和蓝精灵",
|
||
"category": "格格巫和蓝精灵",
|
||
"pubDate": "2024-12-25T20:16:51"
|
||
},
|
||
{
|
||
"title": "CobaltStrike Bof开发(1)",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=Mzg5MDg3OTc0OA==&mid=2247489138&idx=1&sn=3095870df2c9d365db698936abde43b2",
|
||
"description": null,
|
||
"author": "Relay学安全",
|
||
"category": "Relay学安全",
|
||
"pubDate": "2024-12-25T20:05:52"
|
||
},
|
||
{
|
||
"title": "Sa7mon-S3scanner:一款针对S3 Bucket的错误配置扫描工具",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MjM5NjA0NjgyMA==&mid=2651310595&idx=4&sn=78fdcc1150147cc6155e1a2e73c31521",
|
||
"description": "该工具兼容S3 API,可扫描开放S3 Bucket中潜在的错误配置。",
|
||
"author": "FreeBuf",
|
||
"category": "FreeBuf",
|
||
"pubDate": "2024-12-25T19:56:23"
|
||
},
|
||
{
|
||
"title": "免杀对抗从0开始(七)",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=Mzk0MzU5NTg1Ng==&mid=2247484849&idx=1&sn=f075965e73b511cfba0e53536232cf34",
|
||
"description": null,
|
||
"author": "泾弦安全",
|
||
"category": "泾弦安全",
|
||
"pubDate": "2024-12-25T19:50:33"
|
||
},
|
||
{
|
||
"title": "针对护网行动中红队溯源工具 - HuntBack",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzIzNTE0Mzc0OA==&mid=2247486015&idx=1&sn=bc5b7dea1d9621678e4cc49a85d736ae",
|
||
"description": "HuntBack(反击狩猎),用于攻防演练中,防守方对恶意ip进行web指纹扫描与识别。在蓝队职守中,安全设备爆出恶意攻击ip地址,如果对方使用的是自己的服务器,并且搭建了一些安全业务,可使用本工具对目前已知工具进行探测",
|
||
"author": "GSDK安全团队",
|
||
"category": "GSDK安全团队",
|
||
"pubDate": "2024-12-25T19:41:48"
|
||
},
|
||
{
|
||
"title": "MDUT-Extend(MDUT-增强版) V1.2.0 Released",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzU0MzkzOTYzOQ==&mid=2247489554&idx=1&sn=d3d5aa81f68c323b815bcabe78f0b46a",
|
||
"description": null,
|
||
"author": "黑伞安全",
|
||
"category": "黑伞安全",
|
||
"pubDate": "2024-12-25T19:38:38"
|
||
},
|
||
{
|
||
"title": "一款wifi数据抓包破解工具Wireshark",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzI1MzQwNjEzNA==&mid=2247484154&idx=1&sn=252b411b617f65ba4513c1dda0fe70aa",
|
||
"description": "wife数据包破解",
|
||
"author": "渗透测试知识学习",
|
||
"category": "渗透测试知识学习",
|
||
"pubDate": "2024-12-25T19:35:56"
|
||
},
|
||
{
|
||
"title": "银狐黑产组织最新免杀样本详细分析",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzA4ODEyODA3MQ==&mid=2247489745&idx=1&sn=92cfd13140b08317c1901f6f89c89239",
|
||
"description": "银狐黑产组织最新免杀样本详细分析",
|
||
"author": "安全分析与研究",
|
||
"category": "安全分析与研究",
|
||
"pubDate": "2024-12-25T18:30:13"
|
||
},
|
||
{
|
||
"title": "警惕!2024年全球零日漏洞利用呈现七大趋势",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzI4NDY2MDMwMw==&mid=2247513353&idx=1&sn=cc572d3391797a15aa66590d70d0ac96",
|
||
"description": "零日漏洞的攻击目标迁移",
|
||
"author": "安全内参",
|
||
"category": "安全内参",
|
||
"pubDate": "2024-12-25T18:14:14"
|
||
},
|
||
{
|
||
"title": "Apache Tomcat 漏洞导致服务器易受RCE攻击",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzI2NTg4OTc5Nw==&mid=2247521893&idx=1&sn=867f98595849107577a98fcaf043a177",
|
||
"description": "速修复",
|
||
"author": "代码卫士",
|
||
"category": "代码卫士",
|
||
"pubDate": "2024-12-25T18:11:51"
|
||
},
|
||
{
|
||
"title": "绕过Elastic EDR进行横向移动",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzAxMjYyMzkwOA==&mid=2247526433&idx=1&sn=6ee718605b5d67e3f68417bf664c46f8",
|
||
"description": null,
|
||
"author": "Ots安全",
|
||
"category": "Ots安全",
|
||
"pubDate": "2024-12-25T18:01:05"
|
||
},
|
||
{
|
||
"title": "探索 NASA CryptoLib 的 SDLS 实现中的漏洞",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzAxMjYyMzkwOA==&mid=2247526433&idx=2&sn=9734352beed4645fcdc599733e607e22",
|
||
"description": null,
|
||
"author": "Ots安全",
|
||
"category": "Ots安全",
|
||
"pubDate": "2024-12-25T18:01:05"
|
||
},
|
||
{
|
||
"title": "利用 WDAC 武器化:粉碎 EDR 的梦想",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzAxMjYyMzkwOA==&mid=2247526433&idx=3&sn=7fcef7477d3365c9f2905137b1be267e",
|
||
"description": null,
|
||
"author": "Ots安全",
|
||
"category": "Ots安全",
|
||
"pubDate": "2024-12-25T18:01:05"
|
||
},
|
||
{
|
||
"title": "《英雄无敌》4:修改pe导入表注入DLL扩展回城术功能",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MjM5NTc2MDYxMw==&mid=2458587767&idx=1&sn=dd1c04637890c14cb9d72fb95bbb0010",
|
||
"description": "看雪论坛作者ID:fdark",
|
||
"author": "看雪学苑",
|
||
"category": "看雪学苑",
|
||
"pubDate": "2024-12-25T17:59:58"
|
||
},
|
||
{
|
||
"title": "【漏洞文字】博斯外贸管理软件 SQL注入",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkyMTY1NDc2OA==&mid=2247487244&idx=1&sn=5011bd862eae6337a04f9e1673c7a184",
|
||
"description": null,
|
||
"author": "小羊安全屋",
|
||
"category": "小羊安全屋",
|
||
"pubDate": "2024-12-25T17:01:56"
|
||
},
|
||
{
|
||
"title": "无影v2.6.7—代理池管理功能上线",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkwMTQxNDc3OQ==&mid=2247484093&idx=1&sn=69376ebfa1d2ea2a2950573433fe9da5",
|
||
"description": "无影上线代理池管理功能模块,通过多种代理录入、多种场景切换、多种协议支持、自动验证和删除等功能,为安全测试人员提供了更便捷的代理池管理功能。",
|
||
"author": "菜鸟的渗透测试之路",
|
||
"category": "菜鸟的渗透测试之路",
|
||
"pubDate": "2024-12-25T16:47:48"
|
||
},
|
||
{
|
||
"title": "蚁剑魔改--添加自定义编码/解码器",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzU0MTc2NTExNg==&mid=2247491289&idx=1&sn=458b4ba62019a7da6af2f1c01da15989",
|
||
"description": null,
|
||
"author": "实战安全研究",
|
||
"category": "实战安全研究",
|
||
"pubDate": "2024-12-25T16:13:43"
|
||
},
|
||
{
|
||
"title": "【漏洞通告】Adobe ColdFusion任意文件读取漏洞(CVE-2024-53961)",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=Mzk0MjE3ODkxNg==&mid=2247488801&idx=1&sn=60be4d8cff8f2bbedf73bf54fe8bf3e0",
|
||
"description": "近日,绿盟科技CERT监测到Adobe发布安全公告,修复了Adobe ColdFusion中的任意文件读取漏洞(CVE-2024-53961)。CVSS评分7.4,目前已有PoC存在,请相关用户尽快采取措施进行防护。",
|
||
"author": "绿盟科技CERT",
|
||
"category": "绿盟科技CERT",
|
||
"pubDate": "2024-12-25T16:03:19"
|
||
},
|
||
{
|
||
"title": "无影v2.6.7—代理池管理功能上线",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=Mzg2NTA4OTI5NA==&mid=2247517729&idx=1&sn=01a1786ad5440080df9e850ce24a5a42",
|
||
"description": "无影上线代理池管理功能模块,通过多种代理录入、多种场景切换、多种协议支持、自动验证和删除等功能,为安全测试人员提供了更便捷的代理池管理功能。",
|
||
"author": "Tide安全团队",
|
||
"category": "Tide安全团队",
|
||
"pubDate": "2024-12-25T16:00:51"
|
||
},
|
||
{
|
||
"title": "2024年零日漏洞利用七大趋势",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzA5ODA0NDE2MA==&mid=2649787672&idx=1&sn=414101ef66f3ee973ac7054187675a01",
|
||
"description": null,
|
||
"author": "安全客",
|
||
"category": "安全客",
|
||
"pubDate": "2024-12-25T15:53:53"
|
||
},
|
||
{
|
||
"title": "高危!Craft CMS代码注入漏洞安全风险通告",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzU1ODUwODg5Ng==&mid=2247485874&idx=2&sn=427cbe57bcecf31a9d8988cf6579bc9d",
|
||
"description": "亚信安全建议受影响用户尽快采取相关安全措施。",
|
||
"author": "亚信安全服务",
|
||
"category": "亚信安全服务",
|
||
"pubDate": "2024-12-25T14:32:55"
|
||
},
|
||
{
|
||
"title": "Oracle WebLogic Server反序列化漏洞(CVE-2024-21216)",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkyMjcxNzE2MQ==&mid=2247484506&idx=1&sn=4e8642ae5fb5ac56155c85575660f234",
|
||
"description": "Oracle WebLogic Server反序列化漏洞(CVE-2024-21216)",
|
||
"author": "白帽攻防",
|
||
"category": "白帽攻防",
|
||
"pubDate": "2024-12-25T14:01:17"
|
||
},
|
||
{
|
||
"title": "RongIOC 一款全自动APT威胁情报拓线工具(APT Automated Tool )(使用教程+实战对比效果)",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=Mzg4MTkwMTI5Mw==&mid=2247488289&idx=1&sn=e9a3d235b8f3da0a9d1a3a4ef5a022b3",
|
||
"description": "RongIOC 一款全自动APT威胁情报拓线工具(APT Automated Tool )(使用教程+实战对比效果)",
|
||
"author": "星悦安全",
|
||
"category": "星悦安全",
|
||
"pubDate": "2024-12-25T13:50:45"
|
||
},
|
||
{
|
||
"title": "Frida hook常用脚本合集",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=Mzg2MTg2NzI5OA==&mid=2247484873&idx=1&sn=b6b2503d6e15b10441385de8aaedee3a",
|
||
"description": null,
|
||
"author": "黑熊安全",
|
||
"category": "黑熊安全",
|
||
"pubDate": "2024-12-25T12:32:09"
|
||
},
|
||
{
|
||
"title": "绕过 SAML 认证接管管理面板",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzI4NTcxMjQ1MA==&mid=2247614814&idx=1&sn=d531f6f3c07d0accb3f3f7ea16327c87",
|
||
"description": null,
|
||
"author": "白帽子左一",
|
||
"category": "白帽子左一",
|
||
"pubDate": "2024-12-25T12:01:18"
|
||
},
|
||
{
|
||
"title": "使用 ssh 投递恶意文件的\\\"骚操作\\\"",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkzNDIzNDUxOQ==&mid=2247493438&idx=1&sn=8091198fd7da89503114d3b8f3d8de78",
|
||
"description": null,
|
||
"author": "独眼情报",
|
||
"category": "独眼情报",
|
||
"pubDate": "2024-12-25T11:00:01"
|
||
},
|
||
{
|
||
"title": "【漏洞预警】开源图形数据库系统 Apache HugeGraph-Server 存在安全漏洞 CVE-2024-43441",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkzNDIzNDUxOQ==&mid=2247493438&idx=2&sn=2bf63573c04f4cd2a2cb822334c8d039",
|
||
"description": null,
|
||
"author": "独眼情报",
|
||
"category": "独眼情报",
|
||
"pubDate": "2024-12-25T11:00:01"
|
||
},
|
||
{
|
||
"title": "【漏洞预警】CVE-2024-23945:Apache Hive 和 Spark 中存在严重漏洞",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkzNDIzNDUxOQ==&mid=2247493438&idx=3&sn=7c6d3ad3049f44965fe8082752ee6dcf",
|
||
"description": null,
|
||
"author": "独眼情报",
|
||
"category": "独眼情报",
|
||
"pubDate": "2024-12-25T11:00:01"
|
||
},
|
||
{
|
||
"title": "利用 Windows Defender 进行武器化:新攻击绕过 EDR",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkzNDIzNDUxOQ==&mid=2247493438&idx=4&sn=4b0f0829a80a8a17ab63c333486b214b",
|
||
"description": null,
|
||
"author": "独眼情报",
|
||
"category": "独眼情报",
|
||
"pubDate": "2024-12-25T11:00:01"
|
||
},
|
||
{
|
||
"title": "JA4+:通过cookie和标头查找隐藏的C2服务器",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkzNDIzNDUxOQ==&mid=2247493438&idx=5&sn=b4f9a7e7720e1fcdc877d365af8887b2",
|
||
"description": null,
|
||
"author": "独眼情报",
|
||
"category": "独眼情报",
|
||
"pubDate": "2024-12-25T11:00:01"
|
||
},
|
||
{
|
||
"title": "新的僵尸网络能利用 NVR、TP-Link 路由器中的漏洞",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzU0MjE2Mjk3Ng==&mid=2247488262&idx=1&sn=725078f1d42de941b5caf4c3894bcd0c",
|
||
"description": "赛欧思安全资讯(2024-12-25)",
|
||
"author": "赛欧思安全研究实验室",
|
||
"category": "赛欧思安全研究实验室",
|
||
"pubDate": "2024-12-25T10:52:32"
|
||
},
|
||
{
|
||
"title": "Postman 大量企业生产数据泄露,可直接接管后台!!!",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=Mzg4MzA4NTM0OA==&mid=2247493314&idx=1&sn=e4a1befde5e92e121826f15fbf176cd7",
|
||
"description": null,
|
||
"author": "OSINT研习社",
|
||
"category": "OSINT研习社",
|
||
"pubDate": "2024-12-25T10:48:57"
|
||
},
|
||
{
|
||
"title": "某转逆向分析(环境检测,sign值分析)",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzAxMjE3ODU3MQ==&mid=2650605607&idx=3&sn=97e9997e8d00d14796f581cce04f9551",
|
||
"description": null,
|
||
"author": "黑白之道",
|
||
"category": "黑白之道",
|
||
"pubDate": "2024-12-25T09:54:52"
|
||
},
|
||
{
|
||
"title": "【漏洞通告】Apache Hive & Spark信息泄露漏洞安全风险通告",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzU4NjY4MDAyNQ==&mid=2247496897&idx=2&sn=0d8efe9e9a42601832812cd7e83ce830",
|
||
"description": "近日,嘉诚安全监测到Apache Hive和Apache Spark中存在一个敏感信息泄露漏洞,鉴于漏洞危害较大,嘉诚安全提醒相关用户尽快更新至安全版本,避免引发漏洞相关的网络安全事件。",
|
||
"author": "嘉诚安全",
|
||
"category": "嘉诚安全",
|
||
"pubDate": "2024-12-25T09:35:42"
|
||
},
|
||
{
|
||
"title": "立即更新!Adobe警告ColdFusion严重漏洞PoC",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzI4MjA1MzkyNA==&mid=2655348345&idx=1&sn=02f5839a880a5e2191b58ca3dc6b324d",
|
||
"description": null,
|
||
"author": "E安全",
|
||
"category": "E安全",
|
||
"pubDate": "2024-12-25T09:03:18"
|
||
},
|
||
{
|
||
"title": "实战红队:记一次从文件上传突破TQ到内网突破",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=Mzk0Mzc1MTI2Nw==&mid=2247486558&idx=1&sn=edc46bed0242ba8d562c1e166c370076",
|
||
"description": "突破TQ到内网突破!",
|
||
"author": "神农Sec",
|
||
"category": "神农Sec",
|
||
"pubDate": "2024-12-25T09:01:09"
|
||
},
|
||
{
|
||
"title": "新的僵尸网络利用 NVR、TP-Link 路由器中的漏洞",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzI2NzAwOTg4NQ==&mid=2649793628&idx=2&sn=42bf5f5cc56312df950aa58ac749beb7",
|
||
"description": "僵尸网络控制视频监控设备和小型路由器。",
|
||
"author": "军哥网络安全读报",
|
||
"category": "军哥网络安全读报",
|
||
"pubDate": "2024-12-25T09:00:54"
|
||
},
|
||
{
|
||
"title": "蚁剑魔改--添加自定义编码/解码器",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkzNTcwOTgxMQ==&mid=2247485164&idx=1&sn=144c56988966ecc701accf66799c7efa",
|
||
"description": null,
|
||
"author": "Spade sec",
|
||
"category": "Spade sec",
|
||
"pubDate": "2024-12-25T09:00:28"
|
||
},
|
||
{
|
||
"title": "蚁剑魔改--修改黑名单URL",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkzNTcwOTgxMQ==&mid=2247485164&idx=2&sn=456407880c201061bf7b53a1a5b2def3",
|
||
"description": null,
|
||
"author": "Spade sec",
|
||
"category": "Spade sec",
|
||
"pubDate": "2024-12-25T09:00:28"
|
||
},
|
||
{
|
||
"title": "Pipe管道利用",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkyMDY5OTg5OA==&mid=2247492059&idx=1&sn=5020944d8ad5b2cf2cc5c925e3d361a7",
|
||
"description": null,
|
||
"author": "ZeroPointZero安全团队",
|
||
"category": "ZeroPointZero安全团队",
|
||
"pubDate": "2024-12-25T09:00:20"
|
||
},
|
||
{
|
||
"title": "远程管理神器 MobaXterm 的密码存储解析与解密工具",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzU1NzczNTM1MQ==&mid=2247485085&idx=1&sn=08b33f8975fce6ce1726ed761cdf0702",
|
||
"description": null,
|
||
"author": "云梦安全",
|
||
"category": "云梦安全",
|
||
"pubDate": "2024-12-25T08:55:39"
|
||
},
|
||
{
|
||
"title": "警惕!“银狐”木马病毒再次出现新变种并更新传播手法",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=Mzg2MDg0ODg1NQ==&mid=2247537751&idx=2&sn=3df96cce7eded2b82d6fd202906faab9",
|
||
"description": null,
|
||
"author": "安小圈",
|
||
"category": "安小圈",
|
||
"pubDate": "2024-12-25T08:45:44"
|
||
},
|
||
{
|
||
"title": "Edit堆溢出打fastbin任意地址修改",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=Mzk0NDYwOTcxNg==&mid=2247485103&idx=1&sn=34c432b059dfa96c3bd9ca37d227f615",
|
||
"description": "Edit堆溢出2.23libc打fastbin任意地址修改",
|
||
"author": "智佳网络安全",
|
||
"category": "智佳网络安全",
|
||
"pubDate": "2024-12-25T08:25:32"
|
||
},
|
||
{
|
||
"title": "远程 SSH - MobaXterm 密码转储工具",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkzMDQ5MDM3NA==&mid=2247487869&idx=1&sn=a93c92106bd528b114408099840be970",
|
||
"description": null,
|
||
"author": "SecretTeam安全团队",
|
||
"category": "SecretTeam安全团队",
|
||
"pubDate": "2024-12-25T08:12:37"
|
||
},
|
||
{
|
||
"title": "记录灯塔收集学校信息,攻击薄弱点站点,拿到5K+的敏感信息",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkwMzMwODg2Mw==&mid=2247510071&idx=1&sn=0e67f21b3c9a98ce9bdf4a0b7c0fc474",
|
||
"description": null,
|
||
"author": "李白你好",
|
||
"category": "李白你好",
|
||
"pubDate": "2024-12-25T08:00:45"
|
||
},
|
||
{
|
||
"title": "记一次完整的Keepalived实现nginx高可用集群实验(含踩坑记录)",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzI1NzI5NDM4Mw==&mid=2247498470&idx=1&sn=e284f75fced4fd14c0d18d42b3581607",
|
||
"description": null,
|
||
"author": "Docker中文社区",
|
||
"category": "Docker中文社区",
|
||
"pubDate": "2024-12-25T08:00:43"
|
||
},
|
||
{
|
||
"title": "漏洞预警 | Jeecg-Boot任意用户密码重置漏洞",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkwMTQ0NDA1NQ==&mid=2247491829&idx=2&sn=8e7ff0c4d22c2821e3205f5e074754a1",
|
||
"description": "Jeecg-Boot的/jeecg-boot/sys/user/passwordChange接口存在任意用户密码重置漏洞,未经身份验证的攻击者可以通过该漏洞重置任意用户密码,从而登录后台,获取管理员权限。",
|
||
"author": "浅安安全",
|
||
"category": "浅安安全",
|
||
"pubDate": "2024-12-25T08:00:25"
|
||
},
|
||
{
|
||
"title": "漏洞预警 | 协众OA SQL注入漏洞",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkwMTQ0NDA1NQ==&mid=2247491829&idx=3&sn=6931b6b0b3bc693cc6827a674a08af13",
|
||
"description": "协众OA的checkLoginQrCode接口存在SQL注入漏洞,未经身份验证的远程攻击者除了可以利用SQL注入漏洞获取数据库中的信息之外,甚至在高权限的情况可向服务器中写入木马,进一步获取服务器系统权限。",
|
||
"author": "浅安安全",
|
||
"category": "浅安安全",
|
||
"pubDate": "2024-12-25T08:00:25"
|
||
},
|
||
{
|
||
"title": "使用 wmplayer 下载远程文件",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkwOTE5MDY5NA==&mid=2247504070&idx=1&sn=07e61782582403da0c8be8c874710ae2",
|
||
"description": "最近,我发现了一种使用 wmplayer.exe(旧版 Windows Media Player)下载精心制作文件的方法。该媒体播放器仍然存在并存在于 Windows 11 中,可用于通过",
|
||
"author": "安全狗的自我修养",
|
||
"category": "安全狗的自我修养",
|
||
"pubDate": "2024-12-25T07:03:40"
|
||
},
|
||
{
|
||
"title": "Apache基金会修复了一个严重的Tomcat漏洞",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=Mzg3OTc0NDcyNQ==&mid=2247493039&idx=1&sn=aa602c3642fde6a6dcb6a5767587847a",
|
||
"description": null,
|
||
"author": "黑猫安全",
|
||
"category": "黑猫安全",
|
||
"pubDate": "2024-12-25T07:00:10"
|
||
},
|
||
{
|
||
"title": "安卓逆向 -- 用charles对某奇异视频抓包",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzA4MzgzNTU5MA==&mid=2652037340&idx=1&sn=c3e5023aa84818bd71ad19f99eb53d66",
|
||
"description": null,
|
||
"author": "逆向有你",
|
||
"category": "逆向有你",
|
||
"pubDate": "2024-12-25T00:01:02"
|
||
},
|
||
{
|
||
"title": "如何HOST碰撞挖掘隐蔽资产",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzU2NDY2OTU4Nw==&mid=2247517810&idx=1&sn=d9b2e63e229223f9d2f7911016a1f9e2",
|
||
"description": null,
|
||
"author": "船山信安",
|
||
"category": "船山信安",
|
||
"pubDate": "2024-12-25T00:00:27"
|
||
},
|
||
{
|
||
"title": "灵当CRM系统接口wechatSession文件上传漏洞检测利用工具",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzU3NzY3MzYzMw==&mid=2247499069&idx=1&sn=e7ac0601926895e20f9d1da09c0f5cd0",
|
||
"description": null,
|
||
"author": "网络安全者",
|
||
"category": "网络安全者",
|
||
"pubDate": "2024-12-25T00:00:08"
|
||
},
|
||
{
|
||
"title": "Apache Tomcat远程代码执行漏洞(CVE-2024-56337)",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzUxMjc0MTE3Mw==&mid=2247494824&idx=1&sn=b03003ad6787b8b285ca4e469940cf87",
|
||
"description": "CVE-2024-56337 是 Apache Tomcat 中的一个竞争条件漏洞,允许攻击者在区分大小写的文件系统上通过绕过大小写检查,实现远程代码执行 (RCE)。",
|
||
"author": "锋刃科技",
|
||
"category": "锋刃科技",
|
||
"pubDate": "2024-12-24T23:05:06"
|
||
},
|
||
{
|
||
"title": "红队基础设施加固—SSH",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=Mzg4MDk4MjM0Mw==&mid=2247484579&idx=1&sn=fac95e100d70819f42a03af066c224ce",
|
||
"description": "全网首发!!!!!本文主要通过监控SSH的登录,当有非法用户成功登录时,通过邮件告知红方 VPS被反向渗透。整个过程非法用户登录全程无感,非常隐蔽。",
|
||
"author": "YongYe 安全实验室",
|
||
"category": "YongYe 安全实验室",
|
||
"pubDate": "2024-12-24T23:04:46"
|
||
},
|
||
{
|
||
"title": "Burpsuite存储桶配置不当漏洞检测插件 - BucketVulTools",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzIzNTE0Mzc0OA==&mid=2247485993&idx=1&sn=dd9e46b807f5bd2742162658819f983c",
|
||
"description": "Burpsuite存储桶配置不当漏洞检测插件 - BucketVulTools",
|
||
"author": "GSDK安全团队",
|
||
"category": "GSDK安全团队",
|
||
"pubDate": "2024-12-24T21:22:38"
|
||
},
|
||
{
|
||
"title": "一次异常艰难的渗透测试",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=Mzg2ODYxMzY3OQ==&mid=2247517824&idx=1&sn=7725f3abae36a924ed0e470d09429548",
|
||
"description": null,
|
||
"author": "Z2O安全攻防",
|
||
"category": "Z2O安全攻防",
|
||
"pubDate": "2024-12-24T21:19:41"
|
||
},
|
||
{
|
||
"title": "07【邮件安全】如何防护链接类网页钓鱼",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzI1OTUyMTI2MQ==&mid=2247484749&idx=1&sn=8f6d5bdd820ed71ee2a9680a3d98c257",
|
||
"description": "问:\\\\x0a通过邮件发送钓鱼网站也是攻击队常用的社工手段,那么如何防护这类邮件攻击?\\\\x0a\\\\x0a答:\\\\x0a1、对接威胁情报:\\\\x0a提炼邮件中的链接(包括二维码),将url、域名、IP、发件人等IoC信息与威胁情报做匹配。\\\\x0a\\\\x0a2、替换安全二维码:\\\\x0a通过邮件网关将邮件中的二维码替换成安全二维码,通过代理网关跳转访问目标网站,如发现风险可实时拦截。\\\\x0a\\\\x0a3、无头浏览器结合OCR做相似度识别:\\\\x0a在沙箱中主动访问链接,对目标网站做相似度识别,来识别是否",
|
||
"author": "十九线菜鸟学安全",
|
||
"category": "十九线菜鸟学安全",
|
||
"pubDate": "2024-12-24T20:17:00"
|
||
},
|
||
{
|
||
"title": "Adobe ColdFusion 路径遍历漏洞(CVE-2024-53961)安全风险通告",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzU5NDgxODU1MQ==&mid=2247502682&idx=1&sn=83e2cebbdeddd336724d291651d2bc51",
|
||
"description": "致力于第一时间为企业级用户提供权威漏洞情报和有效解决方案。",
|
||
"author": "奇安信 CERT",
|
||
"category": "奇安信 CERT",
|
||
"pubDate": "2024-12-24T19:45:44"
|
||
},
|
||
{
|
||
"title": "警惕!“银狐”木马病毒再次出现新变种并更新传播手法",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzI0NzE4ODk1Mw==&mid=2652094410&idx=1&sn=bed5fad50c5baac4a282b84456435ed1",
|
||
"description": null,
|
||
"author": "网安百色",
|
||
"category": "网安百色",
|
||
"pubDate": "2024-12-24T19:44:44"
|
||
},
|
||
{
|
||
"title": "【漏洞预警】Apache Hive&Spark信息泄露漏洞(CVE-2024-23945)",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzI3NzMzNzE5Ng==&mid=2247489351&idx=1&sn=01778ca696e485c04d2862adb19bfa8c",
|
||
"description": null,
|
||
"author": "飓风网络安全",
|
||
"category": "飓风网络安全",
|
||
"pubDate": "2024-12-24T19:11:24"
|
||
},
|
||
{
|
||
"title": "Nmap抓包分析与绕过Windows防火墙扫内网存活主机",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkxNTIwNTkyNg==&mid=2247552266&idx=1&sn=16b799f7d2630dfc7e8dee6e8e026235",
|
||
"description": null,
|
||
"author": "蚁景网络安全",
|
||
"category": "蚁景网络安全",
|
||
"pubDate": "2024-12-24T17:30:24"
|
||
},
|
||
{
|
||
"title": "【漏洞通告】Adobe ColdFusion任意文件读取漏洞(CVE-2024-53961)",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=Mzg2NjgzNjA5NQ==&mid=2247523973&idx=1&sn=328a8278946c6ddc659d707dda812940",
|
||
"description": "2024年12月24日,深瞳漏洞实验室监测到一则Adobe-ColdFusion组件存在任意文件读取漏洞的信息,漏洞编号:CVE-2024-53961,漏洞威胁等级:高危。",
|
||
"author": "深信服千里目安全技术中心",
|
||
"category": "深信服千里目安全技术中心",
|
||
"pubDate": "2024-12-24T17:26:55"
|
||
},
|
||
{
|
||
"title": "Kali高手都在用的环境变量技巧,学会这些就能实现隐蔽渗透?",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzI5MjY4MTMyMQ==&mid=2247489180&idx=1&sn=aa3275ab6daf3c82fbb961199d189a4d",
|
||
"description": "通过掌握这些环境变量管理技巧,我们可以更好地控制和优化Kali Linux系统,提高渗透测试效率,同时保持必要的隐蔽性和安全性。环境变量不仅是简单的配置工具,更是一种强大的系统管理和控制机制。",
|
||
"author": "HW安全之路",
|
||
"category": "HW安全之路",
|
||
"pubDate": "2024-12-24T17:14:07"
|
||
},
|
||
{
|
||
"title": "警惕!“银狐”木马病毒再次出现新变种并更新传播手法",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkwMTMyMDQ3Mw==&mid=2247597038&idx=3&sn=839d458f2fb8ffc50b098960a6051345",
|
||
"description": "重点关注",
|
||
"author": "信息安全与通信保密杂志社",
|
||
"category": "信息安全与通信保密杂志社",
|
||
"pubDate": "2024-12-24T16:51:49"
|
||
},
|
||
{
|
||
"title": "小皮 Windows web 面板漏洞详解",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkyNTY3Nzc3Mg==&mid=2247487964&idx=1&sn=ddd91046b72e8c7335e0fb5ee0768853",
|
||
"description": "小皮 Windows web 面板存在存储型 XSS 漏洞...",
|
||
"author": "蚁景网安",
|
||
"category": "蚁景网安",
|
||
"pubDate": "2024-12-24T16:31:03"
|
||
},
|
||
{
|
||
"title": "记一次调用网页JS解决前端加密",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=Mzk0MTIzNTgzMQ==&mid=2247518762&idx=1&sn=92dc3635740bd8e77b9ddfce313d8730",
|
||
"description": null,
|
||
"author": "亿人安全",
|
||
"category": "亿人安全",
|
||
"pubDate": "2024-12-24T16:16:39"
|
||
},
|
||
{
|
||
"title": "命令注入漏洞使数百万Node.js系统面临攻击",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzI5NTA0MTY2Mw==&mid=2247485729&idx=1&sn=e4974c15092b047d347c8c11399b645f",
|
||
"description": "“systeminformation”的5.23.6及以下版本受此漏洞影响。维护者已经发布了5.23.7版本,解决了这个问题。强烈建议用户立即更新到最新版本。",
|
||
"author": "HackSee",
|
||
"category": "HackSee",
|
||
"pubDate": "2024-12-24T16:10:13"
|
||
},
|
||
{
|
||
"title": "dedecms织梦任意文件上传漏洞",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkxNzUxNTMzNw==&mid=2247484054&idx=1&sn=fe0f59eddecc373a8c0f4f6e0f530973",
|
||
"description": "dedecms织梦\\\\x0d\\\\x0a漏洞类型:通用型\\\\x0d\\\\x0a漏洞版本:≤ V5.7.116",
|
||
"author": "雾鸣安全",
|
||
"category": "雾鸣安全",
|
||
"pubDate": "2024-12-24T14:37:37"
|
||
},
|
||
{
|
||
"title": "新的 DroidBot Android 恶意软件针对 77 个银行加密应用程序",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzI0MDY1MDU4MQ==&mid=2247580391&idx=1&sn=2bdac2222c560e9b5607fbdcb854f116",
|
||
"description": "为了减轻这种威胁,建议 Android 用户仅从 Google Play 下载应用程序,在安装时仔细检查权限请求,并确保 Play Protect 在其设备上处于活动状态。",
|
||
"author": "嘶吼专业版",
|
||
"category": "嘶吼专业版",
|
||
"pubDate": "2024-12-24T14:00:41"
|
||
},
|
||
{
|
||
"title": "使用LLM混淆恶意 JavaScript,88%的恶意样本可以逃避检测",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkzNDIzNDUxOQ==&mid=2247493396&idx=1&sn=816812743c54e547f54f05b18b64288d",
|
||
"description": null,
|
||
"author": "独眼情报",
|
||
"category": "独眼情报",
|
||
"pubDate": "2024-12-24T14:00:34"
|
||
},
|
||
{
|
||
"title": "Adobe 警告 ColdFusion 存在严重漏洞,并且 PoC 已流出",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkzNDIzNDUxOQ==&mid=2247493396&idx=5&sn=cf01d14f914941546541b6a0a2f5abec",
|
||
"description": null,
|
||
"author": "独眼情报",
|
||
"category": "独眼情报",
|
||
"pubDate": "2024-12-24T14:00:34"
|
||
},
|
||
{
|
||
"title": "RongIOC 一款全自动APT威胁情报拓线工具(APT Automated Tool )(使用教程+实战对比效果)",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkzNTY1MTg4Mg==&mid=2247484208&idx=1&sn=ae5a67add3b71e2aec4f047e1f92ae5f",
|
||
"description": "RongIOC 一款全自动APT威胁情报拓线工具(APT Automated Tool )(使用教程+实战对比效果)",
|
||
"author": "WingBy安全团队",
|
||
"category": "WingBy安全团队",
|
||
"pubDate": "2024-12-24T13:56:16"
|
||
},
|
||
{
|
||
"title": "RongIOC 一款全自动APT威胁情报拓线工具(APT Automated Tool )(使用教程+实战对比效果)",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkyODY3NjkyNQ==&mid=2247484405&idx=1&sn=c0993aa055e2c68bacd5f741c127e343",
|
||
"description": "RongIOC 一款全自动APT威胁情报拓线工具(APT Automated Tool )(使用教程+实战对比效果)",
|
||
"author": "Ting的安全笔记",
|
||
"category": "Ting的安全笔记",
|
||
"pubDate": "2024-12-24T13:50:08"
|
||
},
|
||
{
|
||
"title": "RongIOC 一款全自动APT威胁情报拓线工具(APT Automated Tool )(使用教程+实战对比效果)",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkyODcwOTA4NA==&mid=2247487707&idx=1&sn=d6d9f18751c0de6108ed9cf7fda14742",
|
||
"description": "RongIOC 一款全自动APT威胁情报拓线工具(APT Automated Tool )(使用教程+实战对比效果)",
|
||
"author": "fkalis",
|
||
"category": "fkalis",
|
||
"pubDate": "2024-12-24T13:35:03"
|
||
},
|
||
{
|
||
"title": "CVE-2024-56337:Apache Tomcat 修补关键 RCE 漏洞",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzAxMjYyMzkwOA==&mid=2247526417&idx=1&sn=5d19b7fd81e7e92ff3cca973a60ccd22",
|
||
"description": null,
|
||
"author": "Ots安全",
|
||
"category": "Ots安全",
|
||
"pubDate": "2024-12-24T12:57:17"
|
||
},
|
||
{
|
||
"title": "【首发 1day】WordPress File Upload 插件存在前台任意文件读取漏洞(CVE-2024-9047)",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=Mzg4MTkwMTI5Mw==&mid=2247488285&idx=1&sn=97653bb5fd6a2d661776be1026799921",
|
||
"description": "安装完毕后,位于 /wp-content/plugins/wp-file-upload/wfu_file_downloader.php 中的wfu_fopen_for_downloader 方法存在fopen 函数导致文件读取操作.",
|
||
"author": "星悦安全",
|
||
"category": "星悦安全",
|
||
"pubDate": "2024-12-24T11:54:54"
|
||
},
|
||
{
|
||
"title": "通杀国内杀软,杀软你怎么不说话",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=Mzg4Njg3MDk5Ng==&mid=2247486770&idx=1&sn=b8db3e65245e7a65d11c3599425ceb89",
|
||
"description": "在网络安全领域,免杀技术是指通过各种手段使恶意代码不被杀毒软件检测到,从而实现隐蔽执行的技术。这在安全测试和渗透测试中尤为重要,因为它可以帮助测试人员模拟真实的攻击场景,评估系统的安全防护能力。",
|
||
"author": "朱厌安全",
|
||
"category": "朱厌安全",
|
||
"pubDate": "2024-12-24T10:27:03"
|
||
},
|
||
{
|
||
"title": "powershell横向渗透样本分析",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkzMDQ5MDM3NA==&mid=2247487857&idx=1&sn=a5d37ae0ffa77779a933ad9324b4518b",
|
||
"description": null,
|
||
"author": "SecretTeam安全团队",
|
||
"category": "SecretTeam安全团队",
|
||
"pubDate": "2024-12-24T10:06:53"
|
||
},
|
||
{
|
||
"title": "实战自动化加解密&加密场景下的暴力破解",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzAxMjE3ODU3MQ==&mid=2650605533&idx=3&sn=10b918d20ab45ac4b08ffe43015a116d",
|
||
"description": null,
|
||
"author": "黑白之道",
|
||
"category": "黑白之道",
|
||
"pubDate": "2024-12-24T09:53:58"
|
||
},
|
||
{
|
||
"title": "本地文件包含发现和利用工具",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzAxMjE3ODU3MQ==&mid=2650605533&idx=4&sn=0b44670e74524677e27530426c1546e8",
|
||
"description": null,
|
||
"author": "黑白之道",
|
||
"category": "黑白之道",
|
||
"pubDate": "2024-12-24T09:53:58"
|
||
},
|
||
{
|
||
"title": "PbootCMS前台SQL注入漏洞(下)",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkyNzcxNTczNA==&mid=2247486906&idx=1&sn=f30579afd864dc32a4b8d966b5fbe1e1",
|
||
"description": "我认为这是2024最好用的漏洞,你觉得呢?",
|
||
"author": "Beacon Tower Lab",
|
||
"category": "Beacon Tower Lab",
|
||
"pubDate": "2024-12-24T09:35:26"
|
||
},
|
||
{
|
||
"title": "满足你 | Tomcat条件竞争RCE利用脚本:CVE-2024-50379、CVE-2024-56337",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=Mzk0NzQxNzY2OQ==&mid=2247487679&idx=1&sn=9aada25fb8260f17942f0d8726a6cb7a",
|
||
"description": "犀利猪安全,带你上高速~",
|
||
"author": "犀利猪安全",
|
||
"category": "犀利猪安全",
|
||
"pubDate": "2024-12-24T09:23:01"
|
||
},
|
||
{
|
||
"title": "网络钓鱼攻击常用手法盘点与防护建议",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=Mzg2NDkwMDcxNA==&mid=2247485496&idx=1&sn=3372f07b12538909bbb3b5d4fe64b5d3",
|
||
"description": null,
|
||
"author": "渝安全Sec",
|
||
"category": "渝安全Sec",
|
||
"pubDate": "2024-12-24T09:02:36"
|
||
},
|
||
{
|
||
"title": "Java反序列化漏洞 | log4j2远程代码执行漏洞原理+漏洞复现",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=Mzk0Mzc1MTI2Nw==&mid=2247486527&idx=1&sn=0e5b1a7c579ad31c1583a45c71bd41c2",
|
||
"description": "log4j2漏洞分析!",
|
||
"author": "神农Sec",
|
||
"category": "神农Sec",
|
||
"pubDate": "2024-12-24T09:01:20"
|
||
},
|
||
{
|
||
"title": "记录灯塔收集学校信息,攻击薄弱点站点,拿到5K+的敏感信息",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkyMDM4NDM5Ng==&mid=2247489612&idx=1&sn=291e47b42397fc383959e1330678e52a",
|
||
"description": null,
|
||
"author": "安全洞察知识图谱",
|
||
"category": "安全洞察知识图谱",
|
||
"pubDate": "2024-12-24T08:30:48"
|
||
},
|
||
{
|
||
"title": "使用 Burpsuite 暴力破解网站登录页面",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzU1NjczNjA0Nw==&mid=2247486133&idx=1&sn=1d8b9a9f0136678a40e6bfa797288836",
|
||
"description": "在本文中,我们使用 Burp Suite 对 Web 应用程序进行暴力破解,但还有许多其他著名的渗透测试工具在暴力攻击中非常有用。",
|
||
"author": "三沐数安",
|
||
"category": "三沐数安",
|
||
"pubDate": "2024-12-24T08:30:47"
|
||
},
|
||
{
|
||
"title": "Webshell自动解密流量分析工具",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzA4NzU1Mjk4Mw==&mid=2247492247&idx=1&sn=b92494a69a4271e924f2f2c625d16dac",
|
||
"description": "通过获取到的webshell流量、url、key来还原攻击者使用webshell所做的操作,目前已完成以下功能。",
|
||
"author": "Hack分享吧",
|
||
"category": "Hack分享吧",
|
||
"pubDate": "2024-12-24T08:30:31"
|
||
},
|
||
{
|
||
"title": ".NET | 详解通过Win32函数实现本地提权",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzUyOTc3NTQ5MA==&mid=2247497683&idx=1&sn=9d02e2022258556da5cc2df0550f652f",
|
||
"description": null,
|
||
"author": "dotNet安全矩阵",
|
||
"category": "dotNet安全矩阵",
|
||
"pubDate": "2024-12-24T08:29:48"
|
||
},
|
||
{
|
||
"title": "漏洞预警 | CyberPanel命令执行漏洞",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkwMTQ0NDA1NQ==&mid=2247491825&idx=1&sn=3f17b8321f3d7a18c621a9631b58033f",
|
||
"description": "CyberPanel的/websites/submitWebsiteCreation接口存在命令执行漏洞,经过授权的攻击者可以通过此接口执行任意命令获取服务器权限,从而造成数据泄露、服务器被接管等严重的后果。",
|
||
"author": "浅安安全",
|
||
"category": "浅安安全",
|
||
"pubDate": "2024-12-24T08:01:03"
|
||
},
|
||
{
|
||
"title": "漏洞预警 | SitecoreCMS任意文件读取漏洞",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkwMTQ0NDA1NQ==&mid=2247491825&idx=2&sn=10017681ee52f6f356351fc448cb1d45",
|
||
"description": "Sitecore的/-/speak/v1/bundles/bundle.js接口存在任意文件读取漏洞,未经身份验证的攻击者可以通过该漏洞读取服务器任意文件,从而获取服务器大量敏感信息。",
|
||
"author": "浅安安全",
|
||
"category": "浅安安全",
|
||
"pubDate": "2024-12-24T08:01:03"
|
||
},
|
||
{
|
||
"title": "Windows 主机信息自动化狩猎工具",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkxNjMwNDUxNg==&mid=2247487157&idx=1&sn=33e23b2a68ac64785f2804e5200cfa8a",
|
||
"description": null,
|
||
"author": "进击的HACK",
|
||
"category": "进击的HACK",
|
||
"pubDate": "2024-12-24T07:55:42"
|
||
},
|
||
{
|
||
"title": "FTP匿名登录",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=Mzg2Nzk0NjA4Mg==&mid=2247497243&idx=1&sn=069103e7418d78149cef12a332678450",
|
||
"description": null,
|
||
"author": "泷羽Sec",
|
||
"category": "泷羽Sec",
|
||
"pubDate": "2024-12-24T07:44:17"
|
||
},
|
||
{
|
||
"title": "【神兵利器】红队Shellcode免杀框架",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=Mzg4MTU4NTc2Nw==&mid=2247494149&idx=1&sn=fab06a0ca89ddda6d7305b4a978b703f",
|
||
"description": null,
|
||
"author": "七芒星实验室",
|
||
"category": "七芒星实验室",
|
||
"pubDate": "2024-12-24T07:03:44"
|
||
},
|
||
{
|
||
"title": "内网渗透之无文件落地攻击",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=Mzg4MTU4NTc2Nw==&mid=2247494149&idx=2&sn=7e3fcd76f9f1a64bff2a1b21c9be7a41",
|
||
"description": "文章前言所谓的\\\\x26quot;无文件落地攻击\\\\x26quot;是指恶意程序文件不直接落地到目标系统的磁盘空间中的一种攻击手法,常用于逃避传",
|
||
"author": "七芒星实验室",
|
||
"category": "七芒星实验室",
|
||
"pubDate": "2024-12-24T07:03:44"
|
||
},
|
||
{
|
||
"title": "Lazarus黑客利用CookiePlus恶意软件攻击核电部门",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkyMjQ5ODk5OA==&mid=2247506354&idx=1&sn=3fd6654a84875b878cfb4f586dff84df",
|
||
"description": "朝鲜黑客组织拉撒路集团正将攻击目标对准核电行业。该组织通过复杂精密的行动,试图渗透国防、航空航天和加密货币等高安全行业,现在似乎将核工业组织也纳入攻击范围。卡巴斯基观察到拉撒路集团一个月内向至少两名与核相关的员工发送含恶意文件的档案。",
|
||
"author": "网空闲话plus",
|
||
"category": "网空闲话plus",
|
||
"pubDate": "2024-12-24T06:58:38"
|
||
},
|
||
{
|
||
"title": "如何保护企业中的敏感数据?加密与访问控制详解",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=Mzg4NDc0Njk1MQ==&mid=2247486578&idx=1&sn=00c0200f09082585ed2b64083885d7b8",
|
||
"description": null,
|
||
"author": "信息安全动态",
|
||
"category": "信息安全动态",
|
||
"pubDate": "2024-12-24T06:00:22"
|
||
},
|
||
{
|
||
"title": "蓝凌EKP V16 未授权SQL注入漏洞分析",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzU2NDY2OTU4Nw==&mid=2247517803&idx=1&sn=bbf1338350e2628431ec7659eb014097",
|
||
"description": null,
|
||
"author": "船山信安",
|
||
"category": "船山信安",
|
||
"pubDate": "2024-12-24T00:05:47"
|
||
},
|
||
{
|
||
"title": "Bazaar v1.4.3 任意文件读取漏洞(CVE-2024-40348)",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzI4MDQ5MjY1Mg==&mid=2247515310&idx=1&sn=0d5a90a6415efced680b61d90b5d0c8c",
|
||
"description": null,
|
||
"author": "Web安全工具库",
|
||
"category": "Web安全工具库",
|
||
"pubDate": "2024-12-24T00:02:58"
|
||
},
|
||
{
|
||
"title": "安卓逆向 -- 某游戏打开开发者面板",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzA4MzgzNTU5MA==&mid=2652037321&idx=1&sn=2f643b5615cf72406df9d57ba120fdb4",
|
||
"description": null,
|
||
"author": "逆向有你",
|
||
"category": "逆向有你",
|
||
"pubDate": "2024-12-24T00:02:24"
|
||
},
|
||
{
|
||
"title": "【漏洞预警】Poppler越界读取漏洞(CVE-2024-56378)",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzI3NzMzNzE5Ng==&mid=2247489345&idx=1&sn=91726b817300dc5b41e7c6a25ef449d4",
|
||
"description": null,
|
||
"author": "飓风网络安全",
|
||
"category": "飓风网络安全",
|
||
"pubDate": "2024-12-23T21:55:11"
|
||
},
|
||
{
|
||
"title": "漏洞公开——从弱口令到通杀",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=Mzg2ODYxMzY3OQ==&mid=2247517735&idx=1&sn=7d8c311aaec65b40784ae780af73519b",
|
||
"description": "实战思路定期公开",
|
||
"author": "Z2O安全攻防",
|
||
"category": "Z2O安全攻防",
|
||
"pubDate": "2024-12-23T21:32:42"
|
||
},
|
||
{
|
||
"title": "文件上传漏洞",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkwMjU5MzgzMQ==&mid=2247485143&idx=1&sn=ca184c882a6f45a7b1160c5e65116d61",
|
||
"description": null,
|
||
"author": "AlertSec",
|
||
"category": "AlertSec",
|
||
"pubDate": "2024-12-23T19:56:00"
|
||
},
|
||
{
|
||
"title": "【安全圈】Diicot 威胁组织利用高级恶意软件攻击 Linux",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzIzMzE4NDU1OQ==&mid=2652066835&idx=4&sn=66217b60f43298ef9b36aff4b47463a1",
|
||
"description": null,
|
||
"author": "安全圈",
|
||
"category": "安全圈",
|
||
"pubDate": "2024-12-23T19:00:16"
|
||
},
|
||
{
|
||
"title": "安全卫士 | 魔方安全漏洞周报",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzI3NzA5NDc0MA==&mid=2649291940&idx=2&sn=017c601f071172c54e31467605898ee7",
|
||
"description": "成事在微,筑防于先。魔方安全提醒您:注意企业网络空间资产安全!",
|
||
"author": "魔方安全",
|
||
"category": "魔方安全",
|
||
"pubDate": "2024-12-23T18:30:54"
|
||
},
|
||
{
|
||
"title": "iDRAC 到域管理员",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzAxMjYyMzkwOA==&mid=2247526408&idx=2&sn=91bf23c4c28ad0158f7d706a5450dbe3",
|
||
"description": null,
|
||
"author": "Ots安全",
|
||
"category": "Ots安全",
|
||
"pubDate": "2024-12-23T18:09:20"
|
||
},
|
||
{
|
||
"title": "AB PLC与CIP协议安全研究",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzU2NjI5NzY1OA==&mid=2247511883&idx=1&sn=6b260626239bffe0ea7ae7914f7b8b38",
|
||
"description": "揭秘AB PLC与CIP协议的关联。",
|
||
"author": "珞安科技",
|
||
"category": "珞安科技",
|
||
"pubDate": "2024-12-23T18:04:44"
|
||
},
|
||
{
|
||
"title": "【已复现】Apache Tomcat存在远程代码执行漏洞(CVE-2024-56337)",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzUzOTE2OTM5Mg==&mid=2247490225&idx=1&sn=afd97fcef9e2132344f804a84347ba7f",
|
||
"description": null,
|
||
"author": "安恒信息CERT",
|
||
"category": "安恒信息CERT",
|
||
"pubDate": "2024-12-23T17:57:02"
|
||
},
|
||
{
|
||
"title": "【已复现】Apache Tomcat存在远程代码执行漏洞(CVE-2024-50379)",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzUzOTE2OTM5Mg==&mid=2247490225&idx=2&sn=885da3c3fa05d39949c5718797a96226",
|
||
"description": null,
|
||
"author": "安恒信息CERT",
|
||
"category": "安恒信息CERT",
|
||
"pubDate": "2024-12-23T17:57:02"
|
||
},
|
||
{
|
||
"title": "警惕!全球超190,000台Android设备感染后门程序,包括国内知名品牌的手机设备",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzI0MTE4ODY3Nw==&mid=2247492482&idx=1&sn=5659f4a8b3130b6eb9ecc4905ec2fb89",
|
||
"description": "近日,一起大规模的数据泄露事件震动了网络安全界。名为“HikkI-Chan”的黑客在臭名昭著的Breach Forums上泄露了超过3.9亿VK用户的个人信息。",
|
||
"author": "白泽安全实验室",
|
||
"category": "白泽安全实验室",
|
||
"pubDate": "2024-12-23T17:06:38"
|
||
},
|
||
{
|
||
"title": "『红蓝对抗』分块传输绕过WAF学习",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzU2MDU5MDE2MA==&mid=2247484140&idx=1&sn=a9efe827ca71dabf4f827faba8678652",
|
||
"description": "『红蓝对抗』分块传输绕过WAF学习",
|
||
"author": "网络安全杂记",
|
||
"category": "网络安全杂记",
|
||
"pubDate": "2024-12-23T16:45:15"
|
||
},
|
||
{
|
||
"title": "【处置手册】Apache Tomcat条件竞争代码执行漏洞(CVE-2024-50379/CVE-2024-56337)",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=Mzk0MjE3ODkxNg==&mid=2247488790&idx=1&sn=376728eef98af14fb13112cf8db0c80d",
|
||
"description": "近日,绿盟科技CERT监测到Apache发布安全公告,修复了Apache Tomcat条件竞争代码执行漏洞(CVE-2024-50379/CVE-2024-56337)。CVSS评分9.8,目前漏洞细节与PoC已公开,请相关用户尽快防护。",
|
||
"author": "绿盟科技CERT",
|
||
"category": "绿盟科技CERT",
|
||
"pubDate": "2024-12-23T16:07:01"
|
||
},
|
||
{
|
||
"title": "路径遍历漏洞技巧手法",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkxNzUxNTMzNw==&mid=2247484048&idx=1&sn=75765ca273ebe45ec635d0c1d6037b66",
|
||
"description": null,
|
||
"author": "雾鸣安全",
|
||
"category": "雾鸣安全",
|
||
"pubDate": "2024-12-23T15:55:25"
|
||
},
|
||
{
|
||
"title": "一文学会XXE漏洞",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=Mzk0NTY5Nzc1OA==&mid=2247484213&idx=1&sn=af96b8c4532bba3b51fec6ef7648873d",
|
||
"description": "XXE漏洞",
|
||
"author": "simple学安全",
|
||
"category": "simple学安全",
|
||
"pubDate": "2024-12-23T14:47:02"
|
||
},
|
||
{
|
||
"title": "面向红队的 Active Directory 枚举",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzAxODM5ODQzNQ==&mid=2247485994&idx=1&sn=60ebae95f855eb610099776123d60fe5",
|
||
"description": null,
|
||
"author": "securitainment",
|
||
"category": "securitainment",
|
||
"pubDate": "2024-12-23T13:37:24"
|
||
},
|
||
{
|
||
"title": "记一次红队渗透通关某金融单位",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkyOTUxMzk2NQ==&mid=2247485881&idx=1&sn=09f8f2355a6967317149b16f93d9954b",
|
||
"description": null,
|
||
"author": "安全君呀",
|
||
"category": "安全君呀",
|
||
"pubDate": "2024-12-23T12:34:59"
|
||
},
|
||
{
|
||
"title": "【$$$$】从信息收集到攻破Okta",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzI4NTcxMjQ1MA==&mid=2247614773&idx=1&sn=8068fe691c21122e9ef909e34b8c7e8b",
|
||
"description": null,
|
||
"author": "白帽子左一",
|
||
"category": "白帽子左一",
|
||
"pubDate": "2024-12-23T12:03:57"
|
||
},
|
||
{
|
||
"title": "一次异常艰难的渗透测试",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzU0MTc2NTExNg==&mid=2247491285&idx=1&sn=0f06f5aebcc3fca484698c3598d8b633",
|
||
"description": null,
|
||
"author": "实战安全研究",
|
||
"category": "实战安全研究",
|
||
"pubDate": "2024-12-23T11:46:57"
|
||
},
|
||
{
|
||
"title": "IIS中间件漏洞",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkyOTMxNDM3Ng==&mid=2247488752&idx=1&sn=f5d1b413360eaaa586e8547d31c4dbce",
|
||
"description": null,
|
||
"author": "丁永博的成长日记",
|
||
"category": "丁永博的成长日记",
|
||
"pubDate": "2024-12-23T10:16:37"
|
||
},
|
||
{
|
||
"title": "Tomcat RCE | CVE-2024-56337远程代码执行,带复现视频及POC",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=Mzk0NzQxNzY2OQ==&mid=2247487630&idx=1&sn=6cf205a3fab2e22c6d42abce80395724",
|
||
"description": "犀利猪安全,带你上高速~",
|
||
"author": "犀利猪安全",
|
||
"category": "犀利猪安全",
|
||
"pubDate": "2024-12-23T10:14:16"
|
||
},
|
||
{
|
||
"title": "Apache Tomcat 安全配置与优化指南",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkzMDQ0NzQwNA==&mid=2247485751&idx=1&sn=e71b15fafbae32f12199a2b2750794fd",
|
||
"description": null,
|
||
"author": "网络个人修炼",
|
||
"category": "网络个人修炼",
|
||
"pubDate": "2024-12-23T10:00:45"
|
||
},
|
||
{
|
||
"title": "攻防|记一次5KW资产的渗透测试",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzAxMjE3ODU3MQ==&mid=2650605454&idx=3&sn=64577c6b6ced302f81154522580d5893",
|
||
"description": null,
|
||
"author": "黑白之道",
|
||
"category": "黑白之道",
|
||
"pubDate": "2024-12-23T09:50:43"
|
||
},
|
||
{
|
||
"title": "一款ShellCode在线免杀处理平台",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzAxMjE3ODU3MQ==&mid=2650605454&idx=4&sn=9e9bffc8f58257e0f370cc5e6a02a4e0",
|
||
"description": null,
|
||
"author": "黑白之道",
|
||
"category": "黑白之道",
|
||
"pubDate": "2024-12-23T09:50:43"
|
||
},
|
||
{
|
||
"title": "【POC开发系列01】Pocsuite3框架的使用与poc的编写",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkxMDc1NzU1Ng==&mid=2247484143&idx=1&sn=0909bc6a1e1608db5396bd53d3516603",
|
||
"description": "本篇文章我们将详细讲述pocsuite3框架的使用以及该框架下的poc编写方法",
|
||
"author": "天欣安全实验室",
|
||
"category": "天欣安全实验室",
|
||
"pubDate": "2024-12-23T09:05:58"
|
||
},
|
||
{
|
||
"title": "[溯源]HuntBack(反击狩猎),用于攻防演练中,防守方对恶意ip进行web指纹扫描与识别",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkxMTUwOTY1MA==&mid=2247489823&idx=1&sn=9772f4b0d90fa409e8931007756be5b2",
|
||
"description": null,
|
||
"author": "知攻善防实验室",
|
||
"category": "知攻善防实验室",
|
||
"pubDate": "2024-12-23T09:02:34"
|
||
},
|
||
{
|
||
"title": "不会取证?取证总结少?Windows内存取证超详细解题过程看过来!",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=Mzk0Mzc1MTI2Nw==&mid=2247486496&idx=1&sn=b4a673d2771b2822c6f886dbe6125c11",
|
||
"description": "内存取证解题思路!",
|
||
"author": "神农Sec",
|
||
"category": "神农Sec",
|
||
"pubDate": "2024-12-23T09:01:58"
|
||
},
|
||
{
|
||
"title": "vulnhub之PumpkinGarden的实践",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzA3MjM5MDc2Nw==&mid=2650748882&idx=1&sn=88419dd89bf91aef4fa7578913b7060a",
|
||
"description": null,
|
||
"author": "云计算和网络安全技术实践",
|
||
"category": "云计算和网络安全技术实践",
|
||
"pubDate": "2024-12-23T08:50:03"
|
||
},
|
||
{
|
||
"title": "深度剖析 CVE-2024-56145:Craft CMS 高危漏洞的利用与防御",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzU1NzczNTM1MQ==&mid=2247485075&idx=1&sn=68db2f838cf34395ab94bbc562be7cf5",
|
||
"description": null,
|
||
"author": "云梦安全",
|
||
"category": "云梦安全",
|
||
"pubDate": "2024-12-23T08:39:35"
|
||
},
|
||
{
|
||
"title": "Apache Tomcat 高危远程代码执行漏洞(CVE-2024-56337)",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzU1NzczNTM1MQ==&mid=2247485075&idx=2&sn=b8aebda4d9773c722dd15d51bc6b357b",
|
||
"description": null,
|
||
"author": "云梦安全",
|
||
"category": "云梦安全",
|
||
"pubDate": "2024-12-23T08:39:35"
|
||
},
|
||
{
|
||
"title": "工具集:Golin【等级保护核查工具】",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=Mzk0MjY1ODE5Mg==&mid=2247484989&idx=1&sn=7ba70977add1f57de829b1fb3072f82c",
|
||
"description": null,
|
||
"author": "风铃Sec",
|
||
"category": "风铃Sec",
|
||
"pubDate": "2024-12-23T08:35:37"
|
||
},
|
||
{
|
||
"title": "本地文件包含发现和利用工具",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzA4NzU1Mjk4Mw==&mid=2247492246&idx=1&sn=22d9e0d72a237a1ac703eb164beac473",
|
||
"description": "LFImap是一款本地文件包含发现和利用工具,主要版本1.0即将推出,其中包含大量新功能和模块。",
|
||
"author": "Hack分享吧",
|
||
"category": "Hack分享吧",
|
||
"pubDate": "2024-12-23T08:31:00"
|
||
},
|
||
{
|
||
"title": "漏洞预警 | Apache Tomcat条件竞争漏洞",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkwMTQ0NDA1NQ==&mid=2247491824&idx=1&sn=1e180df542cc81f8ccd126fa3a1a793a",
|
||
"description": "Apache Tomcat中JSP编译期间存在检查时间使用TOCTOU竞争条件漏洞,攻击者可绕过Tomcat的大小写敏感性检查,导致上传的文件被错误地当作JSP文件处理,从而导致远程代码执行。",
|
||
"author": "浅安安全",
|
||
"category": "浅安安全",
|
||
"pubDate": "2024-12-23T08:02:27"
|
||
},
|
||
{
|
||
"title": "漏洞预警 | 蓝凌OA SSRF漏洞",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkwMTQ0NDA1NQ==&mid=2247491824&idx=2&sn=00d3f008f7a8e6862f85e636c1729047",
|
||
"description": "蓝凌OA存在SSRF漏洞,未经身份验证攻击者可通过该漏洞读取系统重要文件,导致网站处于极度不安全状态。",
|
||
"author": "浅安安全",
|
||
"category": "浅安安全",
|
||
"pubDate": "2024-12-23T08:02:27"
|
||
},
|
||
{
|
||
"title": "漏洞预警 | 国威数字程控交换机远程代码执行漏洞",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkwMTQ0NDA1NQ==&mid=2247491824&idx=3&sn=182280414c04ee47c247bae26a93c39e",
|
||
"description": "国威HB1910数字程控电话交换机的/modules/ping/generate.php接口存在远程代码执行漏洞,未经身份验证的攻击者可以通过该漏洞远程执行任意代码,从而控制目标服务器。",
|
||
"author": "浅安安全",
|
||
"category": "浅安安全",
|
||
"pubDate": "2024-12-23T08:02:27"
|
||
},
|
||
{
|
||
"title": "记录灯塔收集学校信息,攻击薄弱点站点,拿到5K+的敏感信息",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzU2NzY5MzI5Ng==&mid=2247504475&idx=1&sn=36083786102a2ec27f8cf89539bb085a",
|
||
"description": "记录如何拿到一所学校该如何攻打,寻找漏洞的手法和思路。",
|
||
"author": "菜鸟学信安",
|
||
"category": "菜鸟学信安",
|
||
"pubDate": "2024-12-23T08:00:40"
|
||
},
|
||
{
|
||
"title": "补丁警报:发现关键的Apache Struts漏洞(CVE-2024-53677)",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzA4MzMzOTQ4Mw==&mid=2453672473&idx=1&sn=b1f42abfb69489f1d38f2bf96dcc303b",
|
||
"description": null,
|
||
"author": "独角鲸网络安全实验室",
|
||
"category": "独角鲸网络安全实验室",
|
||
"pubDate": "2024-12-23T07:35:42"
|
||
},
|
||
{
|
||
"title": "攻击者利用Microsoft Teams和AnyDesk部署DarkGate恶意软件",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzA4MzMzOTQ4Mw==&mid=2453672480&idx=1&sn=c6d20e503d4e736b176f872609c9287d",
|
||
"description": null,
|
||
"author": "独角鲸网络安全实验室",
|
||
"category": "独角鲸网络安全实验室",
|
||
"pubDate": "2024-12-23T07:10:00"
|
||
},
|
||
{
|
||
"title": "社工钓鱼手法总结",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=Mzg4MTU4NTc2Nw==&mid=2247494138&idx=2&sn=b2c884b2d49ab83d6dc02309979fc363",
|
||
"description": null,
|
||
"author": "七芒星实验室",
|
||
"category": "七芒星实验室",
|
||
"pubDate": "2024-12-23T07:03:46"
|
||
},
|
||
{
|
||
"title": "干货 | 极致反沙箱-银狐样本分析",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkwNjczOTQwOA==&mid=2247493443&idx=1&sn=34120f8dd4249bba2ef71c4931878755",
|
||
"description": null,
|
||
"author": "星落安全团队",
|
||
"category": "星落安全团队",
|
||
"pubDate": "2024-12-23T00:20:13"
|
||
},
|
||
{
|
||
"title": "记一次某站运营环境的测试过程从信息泄露到Getshell|挖洞技巧",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=Mzg3ODE2MjkxMQ==&mid=2247489522&idx=1&sn=c9c7f94c7a412133b181cf0cccaadc03",
|
||
"description": "在某个工作日收到客户发来的链接,说需要打点,然后就开始了这次的渗透路程。通过分析目标网站,发现其使用FastAdmin框架,且基于ThinkPHP5。利用该框架的前台getshell漏洞,并通过修改请求UA,获取敏感信息。",
|
||
"author": "渗透安全HackTwo",
|
||
"category": "渗透安全HackTwo",
|
||
"pubDate": "2024-12-23T00:00:22"
|
||
},
|
||
{
|
||
"title": "实战自动化加解密&加密场景下的暴力破解",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=Mzg2ODYxMzY3OQ==&mid=2247517732&idx=1&sn=a729b548786bfa19bc1710d30a1c7edf",
|
||
"description": "实战自动化加解密\\\\x26amp;加密场景下的暴力破解",
|
||
"author": "Z2O安全攻防",
|
||
"category": "Z2O安全攻防",
|
||
"pubDate": "2024-12-22T21:09:20"
|
||
},
|
||
{
|
||
"title": "HTB_Unrested(思路)",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkxMjYyMjA3Mg==&mid=2247485355&idx=1&sn=1daf8e542791e21a08caefb9ce458e5d",
|
||
"description": "HTB-Unrested+linux(Med)+CVE-2024-42327(时间盲注)-\\\\x26gt;RCE-\\\\x26gt;sudo -l(nmap)",
|
||
"author": "羽泪云小栈",
|
||
"category": "羽泪云小栈",
|
||
"pubDate": "2024-12-22T20:31:43"
|
||
},
|
||
{
|
||
"title": "关于AWD的小结",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzAwNTc5MTMyNg==&mid=2247500072&idx=1&sn=2b761dedd7c1caedbe68c644c1292ec6",
|
||
"description": null,
|
||
"author": "Gh0xE9",
|
||
"category": "Gh0xE9",
|
||
"pubDate": "2024-12-22T20:27:36"
|
||
},
|
||
{
|
||
"title": "【漏洞复现】CVE-2024-50623",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzUxMTk4OTA1NQ==&mid=2247484851&idx=1&sn=52c5df6c1e8f7e240e5d705a9adb8fbc",
|
||
"description": null,
|
||
"author": "混子Hacker",
|
||
"category": "混子Hacker",
|
||
"pubDate": "2024-12-22T19:22:38"
|
||
},
|
||
{
|
||
"title": "自定义Shellcode",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=Mzg5MDg3OTc0OA==&mid=2247489116&idx=1&sn=bdf3e93ba0fbb448b76dd8dc2a816813",
|
||
"description": null,
|
||
"author": "Relay学安全",
|
||
"category": "Relay学安全",
|
||
"pubDate": "2024-12-22T18:48:29"
|
||
},
|
||
{
|
||
"title": "记录一次RCE无回显突破内网隔离",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkwMzcwMDU5OA==&mid=2247484107&idx=1&sn=efc2381710f01860a5727090f7f992f4",
|
||
"description": "在攻防演练的时候常常遇到无回显的情况,怎么办呢?你还在用DNSLog外带内容?还是在用文件写入Web访问读取?",
|
||
"author": "RongRui安全团队",
|
||
"category": "RongRui安全团队",
|
||
"pubDate": "2024-12-22T17:21:16"
|
||
},
|
||
{
|
||
"title": "一个不起眼的 PHP 漏洞如何导致 Craft CMS 出现 RCE",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzAxMjYyMzkwOA==&mid=2247526407&idx=2&sn=c861b76793e01721eca83cd6cd50d901",
|
||
"description": null,
|
||
"author": "Ots安全",
|
||
"category": "Ots安全",
|
||
"pubDate": "2024-12-22T15:02:56"
|
||
},
|
||
{
|
||
"title": "记一次逻辑漏洞修改任意用户密码",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkzNTQwNjQ4OA==&mid=2247484039&idx=1&sn=84848557aee5ef51ec87d5cd74607656",
|
||
"description": "任意用户重置密码漏洞小结",
|
||
"author": "UF安全团队",
|
||
"category": "UF安全团队",
|
||
"pubDate": "2024-12-22T14:38:01"
|
||
},
|
||
{
|
||
"title": "【首发1day详情】CVE-2024-51479 全网首发漏洞复现分析+POC (Next.js权限绕过)",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkzNTY1MTg4Mg==&mid=2247484206&idx=1&sn=c6c8bc748d9cd6b3305a188a37b8c6b9",
|
||
"description": "【首发1day详情】CVE-2024-51479 全网首发漏洞复现分析+POC (Next.js权限绕过)",
|
||
"author": "WingBy安全团队",
|
||
"category": "WingBy安全团队",
|
||
"pubDate": "2024-12-22T14:05:22"
|
||
},
|
||
{
|
||
"title": "【首发1day详情】CVE-2024-51479 全网首发漏洞复现分析+POC (Next.js权限绕过)",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkyODY3NjkyNQ==&mid=2247484401&idx=1&sn=71dcfb268f5852a19c75d24153bb827e",
|
||
"description": "【首发1day详情】CVE-2024-51479 全网首发漏洞复现分析+POC (Next.js权限绕过)",
|
||
"author": "Ting的安全笔记",
|
||
"category": "Ting的安全笔记",
|
||
"pubDate": "2024-12-22T13:57:48"
|
||
},
|
||
{
|
||
"title": "【首发1day详情】CVE-2024-51479 全网首发漏洞复现分析+POC (Next.js权限绕过)",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkyODcwOTA4NA==&mid=2247487524&idx=1&sn=0ba60c7c544d38db55c6cc9723985528",
|
||
"description": "【首发1day详情】CVE-2024-51479 全网首发漏洞复现分析+POC (Next.js权限绕过)",
|
||
"author": "fkalis",
|
||
"category": "fkalis",
|
||
"pubDate": "2024-12-22T13:50:36"
|
||
},
|
||
{
|
||
"title": "武器化 WDAC:终结 EDR",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzAxODM5ODQzNQ==&mid=2247485954&idx=1&sn=8d45f8b0393a54ad7969755cce063a71",
|
||
"description": null,
|
||
"author": "securitainment",
|
||
"category": "securitainment",
|
||
"pubDate": "2024-12-22T13:38:00"
|
||
},
|
||
{
|
||
"title": "CVE-2024-56145:Craft CMS 漏洞利用工具",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkzNDIzNDUxOQ==&mid=2247493290&idx=1&sn=87dbe8e4fb12dd7dc0b236623fe5f4be",
|
||
"description": null,
|
||
"author": "独眼情报",
|
||
"category": "独眼情报",
|
||
"pubDate": "2024-12-22T10:51:58"
|
||
},
|
||
{
|
||
"title": "针对安全人员,攻击者窃取了39万个WordPress凭证",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MjM5NjA0NjgyMA==&mid=2651310355&idx=3&sn=0d23a5233269e89ec783afae8e697609",
|
||
"description": "受害者包括红队成员、渗透测试员、安全研究人员甚至其他一些黑客。",
|
||
"author": "FreeBuf",
|
||
"category": "FreeBuf",
|
||
"pubDate": "2024-12-22T10:02:27"
|
||
},
|
||
{
|
||
"title": "武装你的burpsuite",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzU2NzY5MzI5Ng==&mid=2247504474&idx=1&sn=8aa7b9f0b2409a39abc14ed2346ce7e6",
|
||
"description": null,
|
||
"author": "菜鸟学信安",
|
||
"category": "菜鸟学信安",
|
||
"pubDate": "2024-12-22T09:30:16"
|
||
},
|
||
{
|
||
"title": "Fortinet 无线管理器惊现严重漏洞,黑客可轻松获取管理员权限!",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzA4NTY4MjAyMQ==&mid=2447899799&idx=1&sn=bf5134fc99d34ec1f16199c151fa25ef",
|
||
"description": "Fortinet xa0近日披露了 Fortinet 无线管理器 (FortiWLM) 中的一个严重漏洞 (CVE-2023-34990),该漏洞允许远程攻击者通过精心构造的 Web 请求执行未经授权的代码或命令,从而接管设备。",
|
||
"author": "技术修道场",
|
||
"category": "技术修道场",
|
||
"pubDate": "2024-12-22T09:19:40"
|
||
},
|
||
{
|
||
"title": "AWS 管理员身份危机:第 1 部分",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkwOTE5MDY5NA==&mid=2247503976&idx=1&sn=ef8e6af551f64ca713aabc929bb21aac",
|
||
"description": "BLUF:每条攻击路径都需要一个目的地。这是在 AWS 中描述目标的正式方式。在只有数据平面访问权限的云提供商中,我们将注意力从管理员的武断定义转移到我们关心的资源",
|
||
"author": "安全狗的自我修养",
|
||
"category": "安全狗的自我修养",
|
||
"pubDate": "2024-12-22T09:08:34"
|
||
},
|
||
{
|
||
"title": "Frida 逆向一个 APP",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=Mzg4MTg0MjQ5OA==&mid=2247487503&idx=1&sn=45012c2e9db4cd2a2d6daf529acdbdec",
|
||
"description": null,
|
||
"author": "CISSP",
|
||
"category": "CISSP",
|
||
"pubDate": "2024-12-22T09:01:23"
|
||
},
|
||
{
|
||
"title": "FortiWLM 曝关键漏洞,攻击者可获得管理员权限",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzI5NTM4OTQ5Mg==&mid=2247633268&idx=3&sn=98f0293cc6251ab7304f147afa79483c",
|
||
"description": null,
|
||
"author": "商密君",
|
||
"category": "商密君",
|
||
"pubDate": "2024-12-22T09:01:08"
|
||
},
|
||
{
|
||
"title": "记一次溯源真实案例",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzAwMjA5OTY5Ng==&mid=2247525329&idx=1&sn=f4dc7aef56d1aba18bd74175fa9c5c28",
|
||
"description": "每年的七月至八月对于安全圈的小伙伴来说那肯定是忙碌的两个月,各行各业都在开展不大不小的攻防演练...。",
|
||
"author": "乌雲安全",
|
||
"category": "乌雲安全",
|
||
"pubDate": "2024-12-22T09:00:21"
|
||
},
|
||
{
|
||
"title": "CVE-2024-12727|Sophos Firewall SQL注入漏洞",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=Mzg2ODcxMjYzMA==&mid=2247485745&idx=1&sn=d1090b68df39020f6ad17405afe7f029",
|
||
"description": "CVE-2024-12727|Sophos Firewall SQL注入漏洞",
|
||
"author": "信安百科",
|
||
"category": "信安百科",
|
||
"pubDate": "2024-12-22T08:00:24"
|
||
},
|
||
{
|
||
"title": "CVE-2024-49112|Windows 轻量级目录访问协议(LDAP)远程代码执行漏洞",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=Mzg2ODcxMjYzMA==&mid=2247485745&idx=2&sn=5b11dd987b70d63bd327eea23f305e74",
|
||
"description": "CVE-2024-49112|Windows 轻量级目录访问协议(LDAP)远程代码执行漏洞",
|
||
"author": "信安百科",
|
||
"category": "信安百科",
|
||
"pubDate": "2024-12-22T08:00:24"
|
||
},
|
||
{
|
||
"title": "新手小白如何挖掘cnvd通用漏洞之存储xss漏洞(利用xss钓鱼)",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkxNjMwNDUxNg==&mid=2247487133&idx=1&sn=1a65a357b5fb4ed4bd2928654519d005",
|
||
"description": null,
|
||
"author": "进击的HACK",
|
||
"category": "进击的HACK",
|
||
"pubDate": "2024-12-22T07:55:22"
|
||
},
|
||
{
|
||
"title": "【神兵利器】GRS内网穿透工具",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=Mzg4MTU4NTc2Nw==&mid=2247494137&idx=1&sn=96df8db8f17208fea146568a13c609c3",
|
||
"description": null,
|
||
"author": "七芒星实验室",
|
||
"category": "七芒星实验室",
|
||
"pubDate": "2024-12-22T07:04:07"
|
||
},
|
||
{
|
||
"title": "应急响应记录之水坑挂马事件分析",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=Mzg4MTU4NTc2Nw==&mid=2247494137&idx=2&sn=e1f2f1f8c19153cc8e6aa796e5b83fbb",
|
||
"description": null,
|
||
"author": "七芒星实验室",
|
||
"category": "七芒星实验室",
|
||
"pubDate": "2024-12-22T07:04:07"
|
||
},
|
||
{
|
||
"title": "PE文件代码注入",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzU2NDY2OTU4Nw==&mid=2247517788&idx=1&sn=5bf26f6dbafbcb94f439e8a8f6a0cf3f",
|
||
"description": null,
|
||
"author": "船山信安",
|
||
"category": "船山信安",
|
||
"pubDate": "2024-12-22T02:00:30"
|
||
},
|
||
{
|
||
"title": "新手小白如何挖掘cnvd通用漏洞之存储xss漏洞(利用xss钓鱼)",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=Mzg5NTUyNTI5OA==&mid=2247486364&idx=1&sn=6376e5a20c87ec8e5f291c09a4e13f16",
|
||
"description": null,
|
||
"author": "扫地僧的茶饭日常",
|
||
"category": "扫地僧的茶饭日常",
|
||
"pubDate": "2024-12-22T00:00:47"
|
||
},
|
||
{
|
||
"title": "SQLMAP注入神器MySQL注入使用总结",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzA3NTc0MTA1Mg==&mid=2664712104&idx=1&sn=4c7af6bf68b87554a6183444c12996a8",
|
||
"description": null,
|
||
"author": "小兵搞安全",
|
||
"category": "小兵搞安全",
|
||
"pubDate": "2024-12-21T22:34:56"
|
||
},
|
||
{
|
||
"title": "CVE-2024-56337 Apache Tomcat - 通过启用写入功能的默认 servlet 进行 RCE",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkzNDIzNDUxOQ==&mid=2247493261&idx=1&sn=519cd25d6df0692babe00f4c41ffdee9",
|
||
"description": null,
|
||
"author": "独眼情报",
|
||
"category": "独眼情报",
|
||
"pubDate": "2024-12-21T20:18:46"
|
||
},
|
||
{
|
||
"title": "【新day】CVE-2024-56145(Craft CMS 模板注入导致 RCE)",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkyODcwOTA4NA==&mid=2247487494&idx=1&sn=de643d61ba91eb9452c98cebeb61a56a",
|
||
"description": "【新day】CVE-2024-56145(Craft CMS 模板注入导致 RCE)",
|
||
"author": "fkalis",
|
||
"category": "fkalis",
|
||
"pubDate": "2024-12-21T18:50:36"
|
||
},
|
||
{
|
||
"title": "CVE-2024-53677|Apache Struts 2(S2-067)远程代码执行漏洞(POC)",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=Mzg2ODcxMjYzMA==&mid=2247485730&idx=1&sn=4a11c334dc821e3cebf6e8642e236341",
|
||
"description": "CVE-2024-53677|Apache Struts 2远程代码执行漏洞(POC)",
|
||
"author": "信安百科",
|
||
"category": "信安百科",
|
||
"pubDate": "2024-12-21T18:15:40"
|
||
},
|
||
{
|
||
"title": "CVE-2024-50379|Apache Tomcat竞争条件远程代码执行漏洞(POC)",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=Mzg2ODcxMjYzMA==&mid=2247485730&idx=2&sn=ee2e3210c82a61b26acfc5ba94b512ca",
|
||
"description": "CVE-2024-50379|Apache Tomcat竞争条件远程代码执行漏洞(POC)",
|
||
"author": "信安百科",
|
||
"category": "信安百科",
|
||
"pubDate": "2024-12-21T18:15:40"
|
||
},
|
||
{
|
||
"title": "【bWAPP】越权攻防实战",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=Mzg5NTU2NjA1Mw==&mid=2247495244&idx=2&sn=db714a74ed1e7bc1dd8b62d608311ee0",
|
||
"description": "我这一生如履薄冰,你说我能走到对岸吗?",
|
||
"author": "儒道易行",
|
||
"category": "儒道易行",
|
||
"pubDate": "2024-12-21T18:00:26"
|
||
},
|
||
{
|
||
"title": "新的Windows权限提升漏洞! SSD 咨询 – cldflt 基于堆的溢出 (PE)",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzAxMjYyMzkwOA==&mid=2247526269&idx=2&sn=be4f2144eee49c7ab4153c1c05760a33",
|
||
"description": null,
|
||
"author": "Ots安全",
|
||
"category": "Ots安全",
|
||
"pubDate": "2024-12-21T15:35:59"
|
||
},
|
||
{
|
||
"title": "OtterRoot Netfilter 通用型 Linux 本地提权 1-day 漏洞",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzAxODM5ODQzNQ==&mid=2247485930&idx=1&sn=b212c0f73f12ef7a741f99bb4b8fd2e1",
|
||
"description": null,
|
||
"author": "securitainment",
|
||
"category": "securitainment",
|
||
"pubDate": "2024-12-21T13:37:57"
|
||
},
|
||
{
|
||
"title": "哥斯拉(Godzilla)二开环境配置",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzU5NjYwNDIyOQ==&mid=2247484759&idx=1&sn=13419dbd0d2b4e2f2134476460f5188b",
|
||
"description": "Java8 失败了,所以使用 java11",
|
||
"author": "走在网安路上的哥布林",
|
||
"category": "走在网安路上的哥布林",
|
||
"pubDate": "2024-12-21T13:37:23"
|
||
},
|
||
{
|
||
"title": "【已复现】Apache Tomcat 远程代码执行漏洞(CVE-2024-56337)安全风险通告",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzU5NDgxODU1MQ==&mid=2247502658&idx=1&sn=e1de6decc572e58a32c667c1ecd2ec0b",
|
||
"description": "致力于第一时间为企业级用户提供权威漏洞情报和有效解决方案。",
|
||
"author": "奇安信 CERT",
|
||
"category": "奇安信 CERT",
|
||
"pubDate": "2024-12-21T13:26:32"
|
||
},
|
||
{
|
||
"title": "【翻译】身份验证失效:利用高级身份验证漏洞的完整指南",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=Mzg4NzgzMjUzOA==&mid=2247485358&idx=1&sn=c180edecfc5c80fefafb15baea7e06d5",
|
||
"description": null,
|
||
"author": "安全视安",
|
||
"category": "安全视安",
|
||
"pubDate": "2024-12-21T12:24:51"
|
||
},
|
||
{
|
||
"title": "新手小白如何挖掘cnvd通用漏洞之存储xss漏洞(利用xss钓鱼)",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzUyODkwNDIyMg==&mid=2247546135&idx=1&sn=cbfb468158bc82d35028d522eaa3ab4d",
|
||
"description": null,
|
||
"author": "掌控安全EDU",
|
||
"category": "掌控安全EDU",
|
||
"pubDate": "2024-12-21T12:02:14"
|
||
},
|
||
{
|
||
"title": "利用 LFI 和文件上传进行 Web 服务器攻击",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzU1NjczNjA0Nw==&mid=2247486074&idx=1&sn=692559a9a408094530ae7fc4be428396",
|
||
"description": "在本文中,您将了解如何通过 FILE INCLUSION 漏洞绕过高安全性中的文件上传漏洞。以及如何绕过本地文件包含以获取受害者 PC 的反向连接。",
|
||
"author": "三沐数安",
|
||
"category": "三沐数安",
|
||
"pubDate": "2024-12-21T09:30:17"
|
||
},
|
||
{
|
||
"title": "从信息泄露到越权再到弱口令",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzAxMjE3ODU3MQ==&mid=2650605407&idx=3&sn=ff5e919d615a969b10d176323b99e285",
|
||
"description": null,
|
||
"author": "黑白之道",
|
||
"category": "黑白之道",
|
||
"pubDate": "2024-12-21T09:09:40"
|
||
},
|
||
{
|
||
"title": "Tomcat综合利用工具",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzAxMjE3ODU3MQ==&mid=2650605407&idx=4&sn=b6af55a1866ce006ae647248c39d159a",
|
||
"description": null,
|
||
"author": "黑白之道",
|
||
"category": "黑白之道",
|
||
"pubDate": "2024-12-21T09:09:40"
|
||
},
|
||
{
|
||
"title": "【玄机】哥斯拉 4.0 流量分析",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzU0MTc2NTExNg==&mid=2247491281&idx=1&sn=977cb76a49ffa177ac3ff88883f2faaf",
|
||
"description": "后台私信获取玄机邀请码!!!",
|
||
"author": "实战安全研究",
|
||
"category": "实战安全研究",
|
||
"pubDate": "2024-12-21T09:03:45"
|
||
},
|
||
{
|
||
"title": "曹县 Lazarus APT组织被发现利用 CookiePlus 恶意软件攻击核工程师",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzI2NzAwOTg4NQ==&mid=2649793589&idx=1&sn=bde4cb81b3bd2bf7ae988ed976019283",
|
||
"description": "卡巴大叔不厚道,人家几万人在替你们打仗,你还写将军黑客部队的报告。",
|
||
"author": "军哥网络安全读报",
|
||
"category": "军哥网络安全读报",
|
||
"pubDate": "2024-12-21T09:01:11"
|
||
},
|
||
{
|
||
"title": "红蓝对抗 | 基于某商全流量设备端口复用流量分析",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=Mzk0Mzc1MTI2Nw==&mid=2247486389&idx=1&sn=47227bcc89e5592a142bcf06ca47105a",
|
||
"description": "红蓝对抗!",
|
||
"author": "神农Sec",
|
||
"category": "神农Sec",
|
||
"pubDate": "2024-12-21T09:00:38"
|
||
},
|
||
{
|
||
"title": "Java反序列化GUI利用工具",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkyNzIxMjM3Mg==&mid=2247488588&idx=1&sn=0bb57826c73dd32965a80cdc979b25b6",
|
||
"description": null,
|
||
"author": "白帽学子",
|
||
"category": "白帽学子",
|
||
"pubDate": "2024-12-21T08:11:16"
|
||
},
|
||
{
|
||
"title": "漏洞预警 | Cleo Harmony任意文件读取漏洞",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkwMTQ0NDA1NQ==&mid=2247491804&idx=1&sn=9ca9d6fe52223ae2d42a4e122bbad7d6",
|
||
"description": "Cleo Harmony的/Synchronization接口存在任意文件读取漏洞,未经身份验证的攻击者可以通过漏洞读取服务器任意文件,从而获取大量敏感信息。",
|
||
"author": "浅安安全",
|
||
"category": "浅安安全",
|
||
"pubDate": "2024-12-21T08:02:04"
|
||
},
|
||
{
|
||
"title": "漏洞预警 | NextChat SSRF漏洞",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkwMTQ0NDA1NQ==&mid=2247491804&idx=2&sn=1b58756b842eabe75c03da17279606b8",
|
||
"description": "NextChat的/api/webdav/chatgpt-next-web/backup.json接口存在SSRF漏洞,由于WebDav API端点上的参数未得到验证,攻击者可通过该漏洞获取敏感信息。",
|
||
"author": "浅安安全",
|
||
"category": "浅安安全",
|
||
"pubDate": "2024-12-21T08:02:04"
|
||
},
|
||
{
|
||
"title": "漏洞预警 | 网神SecGate3600防火墙任意文件上传漏洞",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkwMTQ0NDA1NQ==&mid=2247491804&idx=3&sn=7d2c640fda5f60bb78dd1511bd64f853",
|
||
"description": "网神SecGate3600防火墙的/?g=route_ispinfo_import_save接口存在任意文件上传漏洞,未授权的攻击者可以通过该漏洞上传任意文件,从而控制服务器。",
|
||
"author": "浅安安全",
|
||
"category": "浅安安全",
|
||
"pubDate": "2024-12-21T08:02:04"
|
||
},
|
||
{
|
||
"title": "Zabbix从环境搭建到漏洞利用,附批量漏洞利用工具",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkxNjMwNDUxNg==&mid=2247487125&idx=1&sn=2dcb68ae48973292ce0e41ebe7b6d41a",
|
||
"description": null,
|
||
"author": "进击的HACK",
|
||
"category": "进击的HACK",
|
||
"pubDate": "2024-12-21T07:55:59"
|
||
},
|
||
{
|
||
"title": "CVE-2024-50379|条件竞争Tomcat RCE POC(首发)",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkxNjMwNDUxNg==&mid=2247487125&idx=2&sn=ec3d00ecc8c4f8f61c72585c57ffb1d1",
|
||
"description": "半通杀|Tomcat RCE!无敌!",
|
||
"author": "进击的HACK",
|
||
"category": "进击的HACK",
|
||
"pubDate": "2024-12-21T07:55:59"
|
||
},
|
||
{
|
||
"title": "攻击 Entra Connect Sync :第 1 部分",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkwOTE5MDY5NA==&mid=2247503975&idx=1&sn=4ae3deca42d8f1442b973d8ccbe0fad1",
|
||
"description": "这是关于攻击者围绕 Active Directory 和 Entra 之间的同步机制进行交易的系列文章中的第一部分。第一篇博文是一篇简短的博文,演示了对 Entra",
|
||
"author": "安全狗的自我修养",
|
||
"category": "安全狗的自我修养",
|
||
"pubDate": "2024-12-21T07:12:27"
|
||
},
|
||
{
|
||
"title": "【神兵利器】Redis漏洞综合利用工具",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=Mzg4MTU4NTc2Nw==&mid=2247494056&idx=1&sn=745c6db09be2022a37d4366370e6fa3d",
|
||
"description": null,
|
||
"author": "七芒星实验室",
|
||
"category": "七芒星实验室",
|
||
"pubDate": "2024-12-21T07:01:13"
|
||
},
|
||
{
|
||
"title": "JAVA安全之RMI命令执行深度刨析",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=Mzg4MTU4NTc2Nw==&mid=2247494056&idx=2&sn=1da01719b72f91b74a209b5fc0258df7",
|
||
"description": null,
|
||
"author": "七芒星实验室",
|
||
"category": "七芒星实验室",
|
||
"pubDate": "2024-12-21T07:01:13"
|
||
},
|
||
{
|
||
"title": "Juniper网络警告:Mirai僵尸网络攻击目标转向SSR设备",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=Mzg3OTc0NDcyNQ==&mid=2247493011&idx=1&sn=998856cbbec33efebe5d1416e0b77fd4",
|
||
"description": null,
|
||
"author": "黑猫安全",
|
||
"category": "黑猫安全",
|
||
"pubDate": "2024-12-21T07:01:06"
|
||
},
|
||
{
|
||
"title": "深入Pyd逆向",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzU2NDY2OTU4Nw==&mid=2247517769&idx=1&sn=9dac06bb26a8777dea410cf49dbc8507",
|
||
"description": null,
|
||
"author": "船山信安",
|
||
"category": "船山信安",
|
||
"pubDate": "2024-12-21T02:00:42"
|
||
},
|
||
{
|
||
"title": "记一次磕磕绊绊的sql注入漏洞挖掘",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=Mzg2NTk4MTE1MQ==&mid=2247486353&idx=1&sn=652419703f4d5311dac369eb1a1a6014",
|
||
"description": null,
|
||
"author": "TtTeam",
|
||
"category": "TtTeam",
|
||
"pubDate": "2024-12-21T00:03:05"
|
||
},
|
||
{
|
||
"title": "记一次溯源真实案例(小孩子别看)",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkxNzY5MTg1Ng==&mid=2247484995&idx=1&sn=2206bfebf84aad7d71fa7b4c788c9b06",
|
||
"description": "牛逼克拉斯",
|
||
"author": "富贵安全",
|
||
"category": "富贵安全",
|
||
"pubDate": "2024-12-21T00:00:47"
|
||
},
|
||
{
|
||
"title": "【漏洞预警】moaluko Store Locator代码执行漏洞(CVE-2024-12571)",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzI3NzMzNzE5Ng==&mid=2247489338&idx=1&sn=d7f3b1f635c785d818ad3b8e32e9d83c",
|
||
"description": null,
|
||
"author": "飓风网络安全",
|
||
"category": "飓风网络安全",
|
||
"pubDate": "2024-12-20T23:11:50"
|
||
}
|
||
] |