1602 lines
81 KiB
JSON
1602 lines
81 KiB
JSON
[
|
||
{
|
||
"title": "【工具分享】I-Wanna-Get-All 主流OA漏洞利用工具",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=Mzg4MTkwMTI5Mw==&mid=2247486533&idx=1&sn=8d46b544b1fdddb5cbc38b18ab0f13b7",
|
||
"description": "根据提示输入内容执行,集成调用sqlmap\\\\x0d\\\\x0a泛微CheckServer-Sql注入,检测漏洞存在后,将payload字段下内容保存为req文件,使用sqlmap模块构造参数",
|
||
"author": "星悦安全",
|
||
"category": "星悦安全",
|
||
"pubDate": "2024-12-02T16:58:07"
|
||
},
|
||
{
|
||
"title": "Linux通用应急响应脚本",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzA4NzU1Mjk4Mw==&mid=2247492111&idx=1&sn=b69e0ad026a6f08f52e4d82c34fbb45e",
|
||
"description": "Linux通用应急响应脚本,适用大多数情况,目前在ubuntu、centos7、kali上均可以正常运行。",
|
||
"author": "Hack分享吧",
|
||
"category": "Hack分享吧",
|
||
"pubDate": "2024-12-02T16:56:30"
|
||
},
|
||
{
|
||
"title": "JAVA安全-反序列化系列-CC6(无依赖链)分析",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=Mzg4MzkwNzI1OQ==&mid=2247485493&idx=1&sn=eae25b060fd652369f42497240baa34d",
|
||
"description": "CC6这条链是基于CC1的基础上,由于在CC1中使用到的AnnotationInvocationHandler类,也就是入口点,它的readObject()在java8u71版本后就进行了修改,导致在jdk8u71后的版本,cc1使用不了",
|
||
"author": "菜狗安全",
|
||
"category": "菜狗安全",
|
||
"pubDate": "2024-12-02T16:30:14"
|
||
},
|
||
{
|
||
"title": "Palo Alto Networks PAN-OS身份认证绕过导致RCE漏洞(CVE-2024-0012)",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkzMTcwMTg1Mg==&mid=2247489476&idx=1&sn=fe81181a05d394083a3fca2f8405d4ca",
|
||
"description": "Palo Alto Networks PAN-OS身份认证绕过导致RCE漏洞(CVE-2024-0012)",
|
||
"author": "nday POC",
|
||
"category": "nday POC",
|
||
"pubDate": "2024-12-02T15:43:29"
|
||
},
|
||
{
|
||
"title": "一款快速等保核查、资产扫描工具",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkzNjQwOTc4MQ==&mid=2247489901&idx=1&sn=e2ffcf91b6bc07bd5261d8d8d59ca3e2",
|
||
"description": "主要功能主机存活探测、漏洞扫描、子域名扫描、端口扫描、各类服务数据库爆破等~~",
|
||
"author": "安全帮",
|
||
"category": "安全帮",
|
||
"pubDate": "2024-12-02T15:13:26"
|
||
},
|
||
{
|
||
"title": "Windows日志分析工具(GUI版)",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=Mzk0NjQ5MTM1MA==&mid=2247492674&idx=1&sn=bed925b80d6823ea8191ede3e6ab18a2",
|
||
"description": null,
|
||
"author": "信安404",
|
||
"category": "信安404",
|
||
"pubDate": "2024-12-02T14:50:25"
|
||
},
|
||
{
|
||
"title": "Windows日志分析工具(GUI版)",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MjM5ODkxMTEzOA==&mid=2247484360&idx=1&sn=26ad13ef39232b62cd89217fd3506f35",
|
||
"description": "骁佬终于把日志查询、内存检索、md5检索整合在一起了,还开发了GUI,有了自己公众号,给榜一大佬点点关注。",
|
||
"author": "安服仔的救赎",
|
||
"category": "安服仔的救赎",
|
||
"pubDate": "2024-12-02T14:46:21"
|
||
},
|
||
{
|
||
"title": "安卓逆向 -- 某app破解下载和高清功能",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzA4MzgzNTU5MA==&mid=2652037081&idx=1&sn=53186ffd1f157ab954530c149627c68c",
|
||
"description": null,
|
||
"author": "逆向有你",
|
||
"category": "逆向有你",
|
||
"pubDate": "2024-12-02T14:08:29"
|
||
},
|
||
{
|
||
"title": "Windows 在新的网络钓鱼攻击中感染了后门 Linux 虚拟机",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzI0MDY1MDU4MQ==&mid=2247579944&idx=1&sn=937ff8a0f0fd609a57acccbdd578fda7",
|
||
"description": "Securonix 研究人员发现的一项新活动是使用网络钓鱼电子邮件执行无人值守的 Linux 虚拟机安装,以破坏企业网络并获得持久性。",
|
||
"author": "嘶吼专业版",
|
||
"category": "嘶吼专业版",
|
||
"pubDate": "2024-12-02T14:00:24"
|
||
},
|
||
{
|
||
"title": "最近邻居攻击:X 罗斯 APT 如何利用附近的 Wi-Fi 网络进行隐秘访问",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzAxODM5ODQzNQ==&mid=2247485529&idx=1&sn=7f9ed4a43afb4ae162c3165663a3c1bf",
|
||
"description": null,
|
||
"author": "securitainment",
|
||
"category": "securitainment",
|
||
"pubDate": "2024-12-02T13:38:02"
|
||
},
|
||
{
|
||
"title": "一次0Day漏洞Rce审计流程",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkzNjM5NDU0OA==&mid=2247486203&idx=1&sn=195421b509dcbf7ba6eca59d16085fab",
|
||
"description": null,
|
||
"author": "钟毓安全",
|
||
"category": "钟毓安全",
|
||
"pubDate": "2024-12-02T13:28:36"
|
||
},
|
||
{
|
||
"title": "关于缓存欺骗的小总结",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzI4NTcxMjQ1MA==&mid=2247614389&idx=1&sn=5a4421e74a24a2fd584ca8795acc6f5d",
|
||
"description": null,
|
||
"author": "白帽子左一",
|
||
"category": "白帽子左一",
|
||
"pubDate": "2024-12-02T12:01:48"
|
||
},
|
||
{
|
||
"title": "记一次网上阅卷系统漏洞挖掘",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzUyODkwNDIyMg==&mid=2247545580&idx=1&sn=b177bb6f876e6363c7633e53a8157dc2",
|
||
"description": null,
|
||
"author": "掌控安全EDU",
|
||
"category": "掌控安全EDU",
|
||
"pubDate": "2024-12-02T12:00:13"
|
||
},
|
||
{
|
||
"title": "干货|一文搞懂加密流量检测的解决方法和技术细节",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzI1OTA1MzQzNA==&mid=2651247084&idx=2&sn=e08fcb88bf26bb7b749512659c069797",
|
||
"description": null,
|
||
"author": "e安在线",
|
||
"category": "e安在线",
|
||
"pubDate": "2024-12-02T10:34:52"
|
||
},
|
||
{
|
||
"title": "混淆 API 补丁以绕过新的 Windows Defender 行为签名",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzAxODM5ODQzNQ==&mid=2247485528&idx=1&sn=a662c6388db6cfcf0e8355194f1937af",
|
||
"description": null,
|
||
"author": "securitainment",
|
||
"category": "securitainment",
|
||
"pubDate": "2024-12-02T10:24:00"
|
||
},
|
||
{
|
||
"title": "二开哥斯拉-绕过cloudflare流量检测",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkwMzcwMDU5OA==&mid=2247484084&idx=1&sn=ed81804fec0bcd62e7666c0d53b63fcd",
|
||
"description": "WebShell\\\\x0d\\\\x0a\\\\x0d\\\\x0a上传了 但是遇到防火墙拦截了,哎,苦恼连接不上\\\\x0d\\\\x0a\\\\x0d\\\\x0a没办法经过测试发现是因为流量中的字段有敏感字段被拦截了,找了好几个人要了二开过的哥斯拉发现都不行,还是被检测被拦截,无奈只能自己手搓一个二开了",
|
||
"author": "RongRui安全团队",
|
||
"category": "RongRui安全团队",
|
||
"pubDate": "2024-12-02T10:23:40"
|
||
},
|
||
{
|
||
"title": "任子行网络安全审计系统 log_fw_ips_scan_jsondata SQL注入漏洞",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkzMTcwMTg1Mg==&mid=2247489464&idx=1&sn=5e9d75fc459499bee5931b854a9e6b22",
|
||
"description": "任子行网络安全审计系统 log_fw_ips_scan_jsondata 接口存在SQL注入漏洞,未经身份验证的远程攻击者除了可以利用xa0SQLxa0注入获取数据库中的信息之外,甚至在高权限的情况可向服务器中写入木马,进一步获取服务器系统权限。",
|
||
"author": "nday POC",
|
||
"category": "nday POC",
|
||
"pubDate": "2024-12-02T10:13:51"
|
||
},
|
||
{
|
||
"title": "绕过CDN查找真实IP方法",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzAxMjE3ODU3MQ==&mid=2650604369&idx=3&sn=d57274a3d983b3f0784be283e00d4013",
|
||
"description": null,
|
||
"author": "黑白之道",
|
||
"category": "黑白之道",
|
||
"pubDate": "2024-12-02T10:08:31"
|
||
},
|
||
{
|
||
"title": "一款内存马检测工具",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzAxMjE3ODU3MQ==&mid=2650604369&idx=4&sn=7f784b5acc1a96bd2e06bb3fc4a4709d",
|
||
"description": null,
|
||
"author": "黑白之道",
|
||
"category": "黑白之道",
|
||
"pubDate": "2024-12-02T10:08:31"
|
||
},
|
||
{
|
||
"title": "Windows 自动登录配置指南",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkzMDQ0NzQwNA==&mid=2247485686&idx=1&sn=ee5f98f830a7ef9a532493c93f427459",
|
||
"description": null,
|
||
"author": "网络个人修炼",
|
||
"category": "网络个人修炼",
|
||
"pubDate": "2024-12-02T10:01:50"
|
||
},
|
||
{
|
||
"title": "一次0Day漏洞Rce审计流程",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=Mzg2NDg2MDIxNQ==&mid=2247485181&idx=1&sn=19d894e589badfb040423b5f9dc66b0b",
|
||
"description": null,
|
||
"author": "Jie安全",
|
||
"category": "Jie安全",
|
||
"pubDate": "2024-12-02T10:00:35"
|
||
},
|
||
{
|
||
"title": "二开哥斯拉-绕过cloudflare流量检测",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkwMzcwMDU5OA==&mid=2247484055&idx=1&sn=d9bf533093a85156acc9d52b79183c55",
|
||
"description": null,
|
||
"author": "RongRui安全团队",
|
||
"category": "RongRui安全团队",
|
||
"pubDate": "2024-12-02T09:57:03"
|
||
},
|
||
{
|
||
"title": "应用内存中的后渗透利用-远程工具密码读取",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkyMDM4NDM5Ng==&mid=2247488877&idx=1&sn=c590c282cca8fea893d27dfce01c8d29",
|
||
"description": "新版本的todesk和向日葵已经无法从配置文件获取密码,而且常规的替换手法也已经失效",
|
||
"author": "安全洞察知识图谱",
|
||
"category": "安全洞察知识图谱",
|
||
"pubDate": "2024-12-02T09:54:28"
|
||
},
|
||
{
|
||
"title": "Windows常规应急",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkzNzI2Mzc0Ng==&mid=2247486342&idx=1&sn=7f19ac711aa23420e8154fb8f9d92c1d",
|
||
"description": "“A9 Team 甲方攻防团队,成员来自某证券、微步、青藤、长亭、安全狗等公司。",
|
||
"author": "A9 Team",
|
||
"category": "A9 Team",
|
||
"pubDate": "2024-12-02T09:44:45"
|
||
},
|
||
{
|
||
"title": "蓝队应急响应-Linux日志分析及常用命令总结",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzU4OTg4Nzc4MQ==&mid=2247504775&idx=2&sn=75c3de7e0ad99bfbbb818769f81c2e17",
|
||
"description": "蓝队应急响应-Linux日志分析及常用命令总结",
|
||
"author": "网络安全实验室",
|
||
"category": "网络安全实验室",
|
||
"pubDate": "2024-12-02T09:37:05"
|
||
},
|
||
{
|
||
"title": "实战!一次超简单的网站后门利用体验",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkxNDY0MjMxNQ==&mid=2247531560&idx=1&sn=d7955cec0a3eaf10a1c57b32b669e6d7",
|
||
"description": null,
|
||
"author": "中国电信安全",
|
||
"category": "中国电信安全",
|
||
"pubDate": "2024-12-02T09:26:04"
|
||
},
|
||
{
|
||
"title": "【新增PHP类型】蚁剑 | 哥斯拉免杀 过雷池、D盾、安全狗的 XlByPassWAF v1.1已更新!",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=Mzg4Mzg4OTIyMA==&mid=2247485843&idx=1&sn=379dca0b0551c3a8260b7d113607b925",
|
||
"description": "新增PHP免杀Webshell\\\\x0d\\\\x0a过雷池、D盾、安全狗等WAF \\\\x0d\\\\x0a蚁剑 | 哥斯拉免杀",
|
||
"author": "威零安全实验室",
|
||
"category": "威零安全实验室",
|
||
"pubDate": "2024-12-02T09:15:21"
|
||
},
|
||
{
|
||
"title": "【新增PHP类型】蚁剑 | 哥斯拉免杀 过雷池、D盾、安全狗的 XlByPassWAF v1.1已更新!",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkwOTIzODg0MA==&mid=2247491256&idx=1&sn=b367b232fb68d53f849330476cf3bef4",
|
||
"description": "新增PHP免杀Webshell\\\\x0d\\\\x0a过雷池、D盾、安全狗等WAF \\\\x0d\\\\x0a蚁剑 | 哥斯拉免杀",
|
||
"author": "爱喝酒烫头的曹操",
|
||
"category": "爱喝酒烫头的曹操",
|
||
"pubDate": "2024-12-02T09:14:56"
|
||
},
|
||
{
|
||
"title": "【漏洞复现】OfficeWeb365 SaveDraw 任意文件上传getshell漏洞",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkyMjcxNzE2MQ==&mid=2247484430&idx=1&sn=ce83f5232dd760583f858e6ddccf7aa7",
|
||
"description": "【漏洞复现】OfficeWeb365 SaveDraw 任意文件上传getshell漏洞",
|
||
"author": "白帽攻防",
|
||
"category": "白帽攻防",
|
||
"pubDate": "2024-12-02T09:10:26"
|
||
},
|
||
{
|
||
"title": "新型网络钓鱼活动利用损坏的 Word 文档来逃避安全保护",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzI2NzAwOTg4NQ==&mid=2649793334&idx=3&sn=41a092c18e1be58c7fc8ce61cf44a3ba",
|
||
"description": "攻击者利用损坏的Word文档钓鱼",
|
||
"author": "军哥网络安全读报",
|
||
"category": "军哥网络安全读报",
|
||
"pubDate": "2024-12-02T09:01:01"
|
||
},
|
||
{
|
||
"title": "一次0Day漏洞Rce审计流程",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkyMjM5NDM3NQ==&mid=2247486155&idx=1&sn=853814e2de56863228049b5207d23e70",
|
||
"description": null,
|
||
"author": "进击安全",
|
||
"category": "进击安全",
|
||
"pubDate": "2024-12-02T09:00:59"
|
||
},
|
||
{
|
||
"title": "JS逆向系列12-深入Js Hook",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkzNTcwOTgxMQ==&mid=2247484921&idx=1&sn=9eb69d9b85fe59f787b406015424bed2",
|
||
"description": null,
|
||
"author": "Spade sec",
|
||
"category": "Spade sec",
|
||
"pubDate": "2024-12-02T09:00:48"
|
||
},
|
||
{
|
||
"title": "vulnhub之Matrix-2的实践",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzA3MjM5MDc2Nw==&mid=2650748838&idx=1&sn=00aa5d5e8d6bb1cfb0c3d8cbad275ab3",
|
||
"description": null,
|
||
"author": "云计算和网络安全技术实践",
|
||
"category": "云计算和网络安全技术实践",
|
||
"pubDate": "2024-12-02T08:57:56"
|
||
},
|
||
{
|
||
"title": "针对【中文】和越南语【用户】的新型【恶意软件】“CleverSoar”",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=Mzg2MDg0ODg1NQ==&mid=2247535293&idx=3&sn=fcf8a07fcf513c0faac8cd883ee392a1",
|
||
"description": null,
|
||
"author": "安小圈",
|
||
"category": "安小圈",
|
||
"pubDate": "2024-12-02T08:45:48"
|
||
},
|
||
{
|
||
"title": "【漏洞复现】Apache OFBiz远程代码执行漏洞(CVE-2024-45195)",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=Mzk0OTY2ODE1NA==&mid=2247484884&idx=1&sn=c3d38f9f57d4e2b96d95aea5b15ddaa6",
|
||
"description": "星标公众号,及时接收推文消息",
|
||
"author": "Z0安全",
|
||
"category": "Z0安全",
|
||
"pubDate": "2024-12-02T08:42:15"
|
||
},
|
||
{
|
||
"title": "针对银狐一些最新攻击样本加载过程的调试分析",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzA4ODEyODA3MQ==&mid=2247489593&idx=1&sn=4791b9831434d21de5e329c04ffde76c",
|
||
"description": "针对银狐一些最新攻击样本加载过程的调试分析",
|
||
"author": "安全分析与研究",
|
||
"category": "安全分析与研究",
|
||
"pubDate": "2024-12-02T08:40:42"
|
||
},
|
||
{
|
||
"title": "开源的Webshell管理器--游魂",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzU2NzY5MzI5Ng==&mid=2247504061&idx=1&sn=92014a616ed3945fbbb3b9541ddfac92",
|
||
"description": null,
|
||
"author": "菜鸟学信安",
|
||
"category": "菜鸟学信安",
|
||
"pubDate": "2024-12-02T08:30:43"
|
||
},
|
||
{
|
||
"title": "某通用系统0day审计过程",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzU5OTMxNjkxMA==&mid=2247488022&idx=1&sn=67aaed483092d9231c0a1c1744d53f6e",
|
||
"description": null,
|
||
"author": "道一安全",
|
||
"category": "道一安全",
|
||
"pubDate": "2024-12-02T08:12:18"
|
||
},
|
||
{
|
||
"title": "内存马检测工具",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkyNzIxMjM3Mg==&mid=2247488428&idx=1&sn=5188e911d690494368fdc456924397d6",
|
||
"description": null,
|
||
"author": "白帽学子",
|
||
"category": "白帽学子",
|
||
"pubDate": "2024-12-02T08:11:23"
|
||
},
|
||
{
|
||
"title": "Wireshark & Packetdrill | TCP RST 之连接不存在的服务端口",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzA5NTUxODA0OA==&mid=2247493054&idx=1&sn=9aa118b745b703068af6a2c40e6a5f5d",
|
||
"description": null,
|
||
"author": "Echo Reply",
|
||
"category": "Echo Reply",
|
||
"pubDate": "2024-12-02T08:08:50"
|
||
},
|
||
{
|
||
"title": "Windows权限控制相关的防御与攻击技术",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkzMDQ5MDM3NA==&mid=2247487114&idx=1&sn=69890ae99784ecfdc8e9a4a7cf1225ad",
|
||
"description": null,
|
||
"author": "SecretTeam安全团队",
|
||
"category": "SecretTeam安全团队",
|
||
"pubDate": "2024-12-02T08:02:54"
|
||
},
|
||
{
|
||
"title": "利用js挖掘漏洞",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkwMzMwODg2Mw==&mid=2247509558&idx=1&sn=4ed77b8fbe43290b3fb889465673e9a3",
|
||
"description": "在漏洞挖掘中,通过对js的挖掘可发现诸多安全问题,此文章主要记录学习如何利用JS测试以及加密参数逆向相关的漏洞挖掘。",
|
||
"author": "李白你好",
|
||
"category": "李白你好",
|
||
"pubDate": "2024-12-02T08:02:42"
|
||
},
|
||
{
|
||
"title": "LLVM Pass转储类或结构的内存布局",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzUzMjQyMDE3Ng==&mid=2247487768&idx=1&sn=89d39255b09284433239ad822791febc",
|
||
"description": "面向LLVM Pass小白提供完整可操作示例",
|
||
"author": "青衣十三楼飞花堂",
|
||
"category": "青衣十三楼飞花堂",
|
||
"pubDate": "2024-12-02T08:00:35"
|
||
},
|
||
{
|
||
"title": "漏洞预警 | PAN-OS Web管理界面身份认证绕过漏洞",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkwMTQ0NDA1NQ==&mid=2247491620&idx=1&sn=bc353ebff4eec5172710bb052bc2c31b",
|
||
"description": "PAN-OS设备管理Web界面中存在身份认证绕过漏洞,未经身份验证的远程攻击者可以通过网络访问管理Web界面,从而进行后续活动,包括修改设备配置、访问其他管理功能。",
|
||
"author": "浅安安全",
|
||
"category": "浅安安全",
|
||
"pubDate": "2024-12-02T08:00:13"
|
||
},
|
||
{
|
||
"title": "AUTOSAR OS模块详解(二) Counter",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=Mzg2NTYxOTcxMw==&mid=2247492882&idx=1&sn=6c2df5be54cd336d31d3cb16e4924166",
|
||
"description": "本文主要介绍AUTOSAR OS的Counter,并对基于英飞凌Aurix TC3XX系列芯片的Vector Microsar代码和配置进行部分讲解。",
|
||
"author": "汽车电子嵌入式",
|
||
"category": "汽车电子嵌入式",
|
||
"pubDate": "2024-12-02T07:40:28"
|
||
},
|
||
{
|
||
"title": "DedeCMS v5.7 SP2后台SSTI到RCE再到GetShell",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=Mzg4MTU4NTc2Nw==&mid=2247493715&idx=1&sn=f7679c045644db006bb0c43afc218b0a",
|
||
"description": "影响范围DedeCMS v5.7 SP2利用条件登陆后台(有点鸡肋,但是可以结合DedeCMS的其他漏洞进行",
|
||
"author": "七芒星实验室",
|
||
"category": "七芒星实验室",
|
||
"pubDate": "2024-12-02T07:01:03"
|
||
},
|
||
{
|
||
"title": "Windows钓鱼演练工具 -- xiao_fishing",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzI4MDQ5MjY1Mg==&mid=2247515009&idx=1&sn=097c6fa033a767c9238b4b7b4a3d4891",
|
||
"description": null,
|
||
"author": "Web安全工具库",
|
||
"category": "Web安全工具库",
|
||
"pubDate": "2024-12-02T06:44:33"
|
||
},
|
||
{
|
||
"title": "文末获取 | 基于卡巴斯基虚拟化技术实现内核Hook",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkwNjczOTQwOA==&mid=2247491255&idx=1&sn=557595ed39256247197085690907cda6",
|
||
"description": null,
|
||
"author": "星落安全团队",
|
||
"category": "星落安全团队",
|
||
"pubDate": "2024-12-02T00:00:48"
|
||
},
|
||
{
|
||
"title": "什么CNVD证书批量化挖掘 ?",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzAwOTQzMjMwOQ==&mid=2247483890&idx=1&sn=a691603b482681117b33c8e20dcc55db",
|
||
"description": "借助fofa搜索引擎达到批量化收集通用网址的目的。",
|
||
"author": "思极安全实验室",
|
||
"category": "思极安全实验室",
|
||
"pubDate": "2024-12-01T22:20:43"
|
||
},
|
||
{
|
||
"title": "横向移动:远程服务",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzU1NjczNjA0Nw==&mid=2247485789&idx=1&sn=c6a19e4fa62e866815845b4169e95770",
|
||
"description": "在红队评估期间,在入侵完成后,攻击者倾向于在网络中横向移动,以获取有关其他系统的更多相关信息。这种横向移动可以通过使用许多二进制文件/服务/进程来实现。",
|
||
"author": "三沐数安",
|
||
"category": "三沐数安",
|
||
"pubDate": "2024-12-01T21:15:18"
|
||
},
|
||
{
|
||
"title": "由于缓存配置错误而绕过授权",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkwOTE5MDY5NA==&mid=2247503485&idx=1&sn=a4ed2402d78a8171463eb0e567952c15",
|
||
"description": "这篇文章是关于我最喜欢的发现之一,因为这是一个非常出乎意料的问题。",
|
||
"author": "安全狗的自我修养",
|
||
"category": "安全狗的自我修养",
|
||
"pubDate": "2024-12-01T21:14:16"
|
||
},
|
||
{
|
||
"title": "网工最容易搞混的三个概念:防火墙、网闸、堡垒机,一文让你轻松搞明白!",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzIyMzIwNzAxMQ==&mid=2649463267&idx=1&sn=f42714daafd3449fe284e3bc39c7b4aa",
|
||
"description": "学网络,尽在网络技术联盟站!",
|
||
"author": "网络技术联盟站",
|
||
"category": "网络技术联盟站",
|
||
"pubDate": "2024-12-01T21:08:04"
|
||
},
|
||
{
|
||
"title": "经验贴收稿分享3 | 一次XSS漏洞挖掘",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkxNTY4NTQwMg==&mid=2247484100&idx=1&sn=bd1389cc16246729ae15e078bee53d54",
|
||
"description": null,
|
||
"author": "励行安全",
|
||
"category": "励行安全",
|
||
"pubDate": "2024-12-01T19:22:27"
|
||
},
|
||
{
|
||
"title": "Python实现Telegram自动签到脚本",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkyNzUzMjM1NQ==&mid=2247484729&idx=1&sn=2c1a9677e1dd45759aba9526ff7b2d84",
|
||
"description": "Python脚本实现Telegram Bot自动签到",
|
||
"author": "在下小白",
|
||
"category": "在下小白",
|
||
"pubDate": "2024-12-01T18:02:20"
|
||
},
|
||
{
|
||
"title": "知名工业WiFi接入点被曝存在20多个漏洞",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzAxMjE3ODU3MQ==&mid=2650604309&idx=2&sn=da7af306259f84bf1d1eb30c34fe1963",
|
||
"description": null,
|
||
"author": "黑白之道",
|
||
"category": "黑白之道",
|
||
"pubDate": "2024-12-01T15:57:17"
|
||
},
|
||
{
|
||
"title": "记一次异常艰难的渗透测试",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzAxMjE3ODU3MQ==&mid=2650604309&idx=3&sn=1c41c06a6de2a958d41cc4f4502e8c83",
|
||
"description": null,
|
||
"author": "黑白之道",
|
||
"category": "黑白之道",
|
||
"pubDate": "2024-12-01T15:57:17"
|
||
},
|
||
{
|
||
"title": "NTLM 中继到 LDAP - The Hail Mary of Network Compromise",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzAxMjYyMzkwOA==&mid=2247525038&idx=1&sn=b063f27e3a567ec530e2a6b25923a759",
|
||
"description": null,
|
||
"author": "Ots安全",
|
||
"category": "Ots安全",
|
||
"pubDate": "2024-12-01T15:34:53"
|
||
},
|
||
{
|
||
"title": "SuperMega 是一个 shellcode 加载器,通过将其注入到真正的可执行文件(.exe 或 .dll)中来实现",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzAxMjYyMzkwOA==&mid=2247525038&idx=3&sn=b09654d60553ff0ce8ec87cbe74e1614",
|
||
"description": null,
|
||
"author": "Ots安全",
|
||
"category": "Ots安全",
|
||
"pubDate": "2024-12-01T15:34:53"
|
||
},
|
||
{
|
||
"title": "利用条件竞争绕过邮箱验证",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzI4NTcxMjQ1MA==&mid=2247614380&idx=1&sn=9c3b12946589d075bb2aef12392ea667",
|
||
"description": null,
|
||
"author": "白帽子左一",
|
||
"category": "白帽子左一",
|
||
"pubDate": "2024-12-01T12:03:04"
|
||
},
|
||
{
|
||
"title": "记一次接口fuzz+逻辑漏洞拿下证书站高危",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzUyODkwNDIyMg==&mid=2247545552&idx=1&sn=b685a20e7273ec1ae2e5a2282c2e475d",
|
||
"description": null,
|
||
"author": "掌控安全EDU",
|
||
"category": "掌控安全EDU",
|
||
"pubDate": "2024-12-01T12:00:34"
|
||
},
|
||
{
|
||
"title": "记录灯塔收集学校信息,攻击薄弱点站点,拿到5K+的敏感信息",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=Mzk0Mzc1MTI2Nw==&mid=2247485848&idx=1&sn=222a41a8479327fc886af5455fa8149a",
|
||
"description": "人若无名,便可专心练剑!",
|
||
"author": "神农Sec",
|
||
"category": "神农Sec",
|
||
"pubDate": "2024-12-01T11:51:40"
|
||
},
|
||
{
|
||
"title": "CVE-2024-42327|Zabbix SQL注入漏洞",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=Mzg2ODcxMjYzMA==&mid=2247485713&idx=1&sn=de263c85dbef17756b944853870cf207",
|
||
"description": "CVE-2024-42327|Zabbix SQL注入漏洞",
|
||
"author": "信安百科",
|
||
"category": "信安百科",
|
||
"pubDate": "2024-12-01T09:30:50"
|
||
},
|
||
{
|
||
"title": "CVE-2024-11477|7-Zip代码执行漏洞(POC)",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=Mzg2ODcxMjYzMA==&mid=2247485713&idx=2&sn=6b514f8a63ef9950e23b2b6671d555c2",
|
||
"description": "CVE-2024-11477|7-Zip代码执行漏洞",
|
||
"author": "信安百科",
|
||
"category": "信安百科",
|
||
"pubDate": "2024-12-01T09:30:50"
|
||
},
|
||
{
|
||
"title": "MSSQL 易受表情符号字符串攻击",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkzNDIzNDUxOQ==&mid=2247492773&idx=2&sn=356e6eb678864f0c70a40e74e70059a7",
|
||
"description": null,
|
||
"author": "独眼情报",
|
||
"category": "独眼情报",
|
||
"pubDate": "2024-12-01T09:01:33"
|
||
},
|
||
{
|
||
"title": "DOME - 子域枚举开源工具",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkyNzIxMjM3Mg==&mid=2247488427&idx=1&sn=ac04df3251c75fcf833990f391ea0cf5",
|
||
"description": null,
|
||
"author": "白帽学子",
|
||
"category": "白帽学子",
|
||
"pubDate": "2024-12-01T08:11:26"
|
||
},
|
||
{
|
||
"title": "实战 | 某院校小程序记录",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkxNjMwNDUxNg==&mid=2247486882&idx=1&sn=e671f66e3e175873a54dd828b009a94c",
|
||
"description": null,
|
||
"author": "进击的HACK",
|
||
"category": "进击的HACK",
|
||
"pubDate": "2024-12-01T07:55:21"
|
||
},
|
||
{
|
||
"title": "Advantech工业级Wi-Fi接入点多个安全漏洞",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzUxMjc0MTE3Mw==&mid=2247494775&idx=1&sn=663d228539b8c7d0207554d994968758",
|
||
"description": "Advantech EKI 系列工业级 Wi-Fi 接入点中,发现了多达 20 个安全漏洞,其中 6 个漏洞被标记为关键漏洞。这些漏洞可能允许攻击者绕过身份验证、执行恶意代码,并可能完全控制受影响的设备。",
|
||
"author": "锋刃科技",
|
||
"category": "锋刃科技",
|
||
"pubDate": "2024-12-01T02:13:29"
|
||
},
|
||
{
|
||
"title": "Java Filter型 Tomcat内存马",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzU2NDY2OTU4Nw==&mid=2247517399&idx=1&sn=678b5cf4e766af4700f802cebbed227b",
|
||
"description": null,
|
||
"author": "船山信安",
|
||
"category": "船山信安",
|
||
"pubDate": "2024-12-01T00:22:06"
|
||
},
|
||
{
|
||
"title": "免杀马为何无法在他人机器上线?",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzAwMjQ2NTQ4Mg==&mid=2247495843&idx=2&sn=b4b42603bfc2c59f9c71ebb1e6eb471d",
|
||
"description": "编写好的免杀马本地双击执行运行没有问题,但是通过webshell传输或远程下载到对方主机后,执行却没有任何上线反应。",
|
||
"author": "Khan安全攻防实验室",
|
||
"category": "Khan安全攻防实验室",
|
||
"pubDate": "2024-12-01T00:01:16"
|
||
},
|
||
{
|
||
"title": "一款内存马检测工具",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=Mzg2NTk4MTE1MQ==&mid=2247486188&idx=1&sn=6d66d60b58ab897f28653e3d8d6b060d",
|
||
"description": null,
|
||
"author": "TtTeam",
|
||
"category": "TtTeam",
|
||
"pubDate": "2024-11-30T22:46:18"
|
||
},
|
||
{
|
||
"title": "攻防实战-fuzz上传接口到内网",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzIzMTIzNTM0MA==&mid=2247496445&idx=1&sn=5dada7b97b53d2949eda0c804ef64b96",
|
||
"description": null,
|
||
"author": "迪哥讲事",
|
||
"category": "迪哥讲事",
|
||
"pubDate": "2024-11-30T22:36:52"
|
||
},
|
||
{
|
||
"title": "针对中文和越南语用户的新型恶意软件“CleverSoar”",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzI0MTE4ODY3Nw==&mid=2247492444&idx=1&sn=c1acace85acaab5c9d17e390fbe5fa27",
|
||
"description": "近日,一起大规模的数据泄露事件震动了网络安全界。名为“HikkI-Chan”的黑客在臭名昭著的Breach Forums上泄露了超过3.9亿VK用户的个人信息。",
|
||
"author": "白泽安全实验室",
|
||
"category": "白泽安全实验室",
|
||
"pubDate": "2024-11-30T20:46:16"
|
||
},
|
||
{
|
||
"title": "从 LFI 到 RCE 的旅程!!!",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=Mzg3NTk4MzY0MA==&mid=2247487651&idx=1&sn=a9782b91db81e5ea2f469639d77d348d",
|
||
"description": null,
|
||
"author": "琴音安全",
|
||
"category": "琴音安全",
|
||
"pubDate": "2024-11-30T19:19:04"
|
||
},
|
||
{
|
||
"title": "CVE-2024-48307|JeecgBoot SQL 注入漏洞(POC)",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=Mzg2ODcxMjYzMA==&mid=2247485712&idx=1&sn=34d09311081e1ccdcc96464b3824f719",
|
||
"description": "CVE-2024-48307|JeecgBoot SQL 注入漏洞(POC)",
|
||
"author": "信安百科",
|
||
"category": "信安百科",
|
||
"pubDate": "2024-11-30T18:00:13"
|
||
},
|
||
{
|
||
"title": "微信4.0聊天记录数据库文件解密分析",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MjM5NTc2MDYxMw==&mid=2458584587&idx=1&sn=bd672102f10e062f90cd9276a1d2ca2f",
|
||
"description": "看雪论坛作者ID:techliu",
|
||
"author": "看雪学苑",
|
||
"category": "看雪学苑",
|
||
"pubDate": "2024-11-30T17:59:42"
|
||
},
|
||
{
|
||
"title": "CVE-2024-11477: 7Zip 中的“代码执行”漏洞 Writeup",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzAxODM5ODQzNQ==&mid=2247485494&idx=1&sn=c9d6028a35da67abc3c0a4ae39c4383d",
|
||
"description": null,
|
||
"author": "securitainment",
|
||
"category": "securitainment",
|
||
"pubDate": "2024-11-30T17:17:00"
|
||
},
|
||
{
|
||
"title": "PE文件结构-DOS头部&DOS stub",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=Mzk0MjY1ODE5Mg==&mid=2247484743&idx=1&sn=ff670183241515ace4f11069609c870a",
|
||
"description": null,
|
||
"author": "风铃Sec",
|
||
"category": "风铃Sec",
|
||
"pubDate": "2024-11-30T16:23:56"
|
||
},
|
||
{
|
||
"title": "免杀—Sysmon Bypass",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkyODY3NjkyNQ==&mid=2247484329&idx=1&sn=97180b4e66f5712766311ebdd90312ba",
|
||
"description": "免杀之Sysmon Bypass",
|
||
"author": "Ting丶的安全笔记",
|
||
"category": "Ting丶的安全笔记",
|
||
"pubDate": "2024-11-30T15:51:31"
|
||
},
|
||
{
|
||
"title": "Docker Registry 未授权访问漏洞利用(工具+利用思路)",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=Mzg2MTg2NzI5OA==&mid=2247484746&idx=1&sn=fc5e8cfb4ee4912ca505e0adde2012ea",
|
||
"description": "Docker Registry 未授权访问漏洞利用(工具+利用思路)",
|
||
"author": "黑熊安全",
|
||
"category": "黑熊安全",
|
||
"pubDate": "2024-11-30T15:09:07"
|
||
},
|
||
{
|
||
"title": "从 LFI 到 RCE 的旅程!!!",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkxNzY5MTg1Ng==&mid=2247484119&idx=1&sn=c39d95f9cf5532ea16ca05fd549f5fcb",
|
||
"description": null,
|
||
"author": "富贵安全",
|
||
"category": "富贵安全",
|
||
"pubDate": "2024-11-30T12:15:57"
|
||
},
|
||
{
|
||
"title": "基于DNS CNAME类型记录的XSS",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkxNTY3MTE5MA==&mid=2247485547&idx=1&sn=95919c9b7c476e946d3440b27dea7083",
|
||
"description": null,
|
||
"author": "星空网络安全",
|
||
"category": "星空网络安全",
|
||
"pubDate": "2024-11-30T12:08:38"
|
||
},
|
||
{
|
||
"title": "记一次框架利用接管学工系统",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzUyODkwNDIyMg==&mid=2247545536&idx=1&sn=1896fad11838d044b00a64c75dfdb7cf",
|
||
"description": null,
|
||
"author": "掌控安全EDU",
|
||
"category": "掌控安全EDU",
|
||
"pubDate": "2024-11-30T12:02:46"
|
||
},
|
||
{
|
||
"title": "知名工业WiFi接入点被曝存在20多个漏洞",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MjM5NjA0NjgyMA==&mid=2651308588&idx=3&sn=507f9cfa85259269aad5b20cdc369747",
|
||
"description": "Advantech工业级无线接入点设备被曝光存在近二十个安全漏洞。",
|
||
"author": "FreeBuf",
|
||
"category": "FreeBuf",
|
||
"pubDate": "2024-11-30T10:02:13"
|
||
},
|
||
{
|
||
"title": "DICOMHawk:用于检测和记录未经授权访问尝试的蜜罐系统",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MjM5NjA0NjgyMA==&mid=2651308588&idx=4&sn=e8d31b9dfca8249e83e10d731c975e7a",
|
||
"description": "该工具可以帮助广大研究人员检测和记录未经授权的访问尝试。",
|
||
"author": "FreeBuf",
|
||
"category": "FreeBuf",
|
||
"pubDate": "2024-11-30T10:02:13"
|
||
},
|
||
{
|
||
"title": "Windows驱动程序暴整数溢出漏洞可致权限提升",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MjM5OTk4MDE2MA==&mid=2655260600&idx=2&sn=d45fcadd0c225f99fa9553f8b67beeb0",
|
||
"description": null,
|
||
"author": "计算机与网络安全",
|
||
"category": "计算机与网络安全",
|
||
"pubDate": "2024-11-30T09:57:46"
|
||
},
|
||
{
|
||
"title": "记一次autodecode aes解密渗透实战",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzIwMjUyNDM0OA==&mid=2247485758&idx=1&sn=ceb53d7f248bdb6829047e68ea8c3b56",
|
||
"description": null,
|
||
"author": "ListSec",
|
||
"category": "ListSec",
|
||
"pubDate": "2024-11-30T09:37:41"
|
||
},
|
||
{
|
||
"title": "某众测记录|细心 = or ≠ 漏洞 ?",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzU0MTc2NTExNg==&mid=2247491120&idx=1&sn=8db3b58d4bf3b995f085d9bb757a355f",
|
||
"description": null,
|
||
"author": "实战安全研究",
|
||
"category": "实战安全研究",
|
||
"pubDate": "2024-11-30T09:03:22"
|
||
},
|
||
{
|
||
"title": "网络钓鱼服务“Rockstar 2FA”利用 AiTM 攻击瞄准 Microsoft 365 用户",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzI2NzAwOTg4NQ==&mid=2649793322&idx=2&sn=825623d5d2889860d29af04cc1f4a6e9",
|
||
"description": "足以以假乱真的钓鱼网络服务利用中间人攻击。",
|
||
"author": "军哥网络安全读报",
|
||
"category": "军哥网络安全读报",
|
||
"pubDate": "2024-11-30T09:01:02"
|
||
},
|
||
{
|
||
"title": "漏洞预警 | 西迪特Wi-Fi Web管理系统远程命令执行和登录绕过漏洞",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkwMTQ0NDA1NQ==&mid=2247491603&idx=3&sn=677995c6d32ab004efcf3e5216b28147",
|
||
"description": "西迪特Wi-Fi Web管理系统存在远程命令执行和登录绕过漏洞,攻击者可通过该漏洞执行任意命令、接管该服务,建议相关用户及时更新。",
|
||
"author": "浅安安全",
|
||
"category": "浅安安全",
|
||
"pubDate": "2024-11-30T08:00:24"
|
||
},
|
||
{
|
||
"title": "Ubuntu Linux 受到“需要重启”漏洞的影响,该漏洞会导致本地提权到 root",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=Mzg3ODY0NTczMA==&mid=2247491684&idx=1&sn=a4cd67263f4e366037fdcace8843b6c2",
|
||
"description": null,
|
||
"author": "犀牛安全",
|
||
"category": "犀牛安全",
|
||
"pubDate": "2024-11-30T00:01:29"
|
||
},
|
||
{
|
||
"title": "安卓逆向 -- 某萌新APP破解永久激活",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzA4MzgzNTU5MA==&mid=2652037061&idx=1&sn=53432d35bcfd6bce4f20a0d6692f0cb6",
|
||
"description": null,
|
||
"author": "逆向有你",
|
||
"category": "逆向有你",
|
||
"pubDate": "2024-11-30T00:00:48"
|
||
},
|
||
{
|
||
"title": "【已复现】7-Zip 代码执行漏洞(CVE-2024-11477)安全风险通告",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzU5NDgxODU1MQ==&mid=2247502523&idx=1&sn=a831935fa92e1ff34b2ffa0bc192aeb7",
|
||
"description": "致力于第一时间为企业级用户提供权威漏洞情报和有效解决方案。",
|
||
"author": "奇安信 CERT",
|
||
"category": "奇安信 CERT",
|
||
"pubDate": "2024-11-30T00:00:35"
|
||
},
|
||
{
|
||
"title": "某地级市三甲医院从sql注入到内网漫游",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=Mzg5NTIxNDE3NQ==&mid=2247484602&idx=1&sn=c7e84d32368ad2fc5153e7489122c26b",
|
||
"description": "记一次外网打点到内网漫游",
|
||
"author": "Mo60",
|
||
"category": "Mo60",
|
||
"pubDate": "2024-11-29T23:32:19"
|
||
},
|
||
{
|
||
"title": "一个平平无奇的登录接口竟能引发账号密码泄露。。。",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzIzMTIzNTM0MA==&mid=2247496438&idx=1&sn=d53243ba4bf0182e7a21b76f1e963801",
|
||
"description": null,
|
||
"author": "迪哥讲事",
|
||
"category": "迪哥讲事",
|
||
"pubDate": "2024-11-29T23:27:23"
|
||
},
|
||
{
|
||
"title": "记一次小程序渗透测试到通杀RCE(0day)",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzU0MTc2NTExNg==&mid=2247491118&idx=1&sn=2a8cd53472ffeabe46dd0aa8ddcb820f",
|
||
"description": "后台的接口比小程序前端的接口多了十数倍,遂打开经典的SuperSearchPlusTools,开始寻找能利用的接口,sql注入已经不需要了,只需要找上传的接口,花了挺久的时间寻找.",
|
||
"author": "实战安全研究",
|
||
"category": "实战安全研究",
|
||
"pubDate": "2024-11-29T22:39:47"
|
||
},
|
||
{
|
||
"title": "【漏洞预警】H3C SecCenter SMP未授权输入验证不当漏洞可导致远程代码执行",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzI3NzMzNzE5Ng==&mid=2247489245&idx=1&sn=3f922cee40f94bcc5d8936ebb8bd1259",
|
||
"description": null,
|
||
"author": "飓风网络安全",
|
||
"category": "飓风网络安全",
|
||
"pubDate": "2024-11-29T21:15:44"
|
||
},
|
||
{
|
||
"title": "【漏洞预警】Apache Arrow R package反序列化漏洞(CVE-2024-52338)",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzI3NzMzNzE5Ng==&mid=2247489245&idx=2&sn=9ba5ffd1d4f95444d590dd16f0b59623",
|
||
"description": null,
|
||
"author": "飓风网络安全",
|
||
"category": "飓风网络安全",
|
||
"pubDate": "2024-11-29T21:15:44"
|
||
},
|
||
{
|
||
"title": "【漏洞预警】Zyxel ZLD防火墙路径遍历漏洞(CVE-2024-11667)",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzI3NzMzNzE5Ng==&mid=2247489245&idx=3&sn=08443a5512e58139bc61e318ba68fd64",
|
||
"description": null,
|
||
"author": "飓风网络安全",
|
||
"category": "飓风网络安全",
|
||
"pubDate": "2024-11-29T21:15:44"
|
||
},
|
||
{
|
||
"title": "广联达OA系统漏洞批量检测工具 - GlodonScan",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzIzNTE0Mzc0OA==&mid=2247485971&idx=1&sn=8b767002024a7edacf192d5f42041df6",
|
||
"description": "广联达OA系统漏洞批量检测工具",
|
||
"author": "GSDK安全团队",
|
||
"category": "GSDK安全团队",
|
||
"pubDate": "2024-11-29T19:00:35"
|
||
},
|
||
{
|
||
"title": "速修复!Advantech 工业WiFi 访问点中存在20个漏洞",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzI2NTg4OTc5Nw==&mid=2247521633&idx=1&sn=479bf08551e7f1c208c83e877ab89f34",
|
||
"description": "速修复",
|
||
"author": "代码卫士",
|
||
"category": "代码卫士",
|
||
"pubDate": "2024-11-29T18:27:45"
|
||
},
|
||
{
|
||
"title": "funbox5复现",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=Mzg2NDY2MTQ1OQ==&mid=2247523427&idx=1&sn=dd1123e0af7c000e04f67383a2af0d82",
|
||
"description": null,
|
||
"author": "红队蓝军",
|
||
"category": "红队蓝军",
|
||
"pubDate": "2024-11-29T18:01:58"
|
||
},
|
||
{
|
||
"title": "百家讲坛 | 张飞:SAST基础原理及五款主流工具对比",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=Mzg4Nzk3MTg3MA==&mid=2247487648&idx=1&sn=95a801789968877e078c246af7b5cea6",
|
||
"description": "详细对比五款主流SAST工具的优势与劣势,助您选择工具时快速决策。",
|
||
"author": "洞源实验室",
|
||
"category": "洞源实验室",
|
||
"pubDate": "2024-11-29T18:00:34"
|
||
},
|
||
{
|
||
"title": "浅析_IO_FILE相关利用、FSOP与House_of_Orange技术",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MjM5NTc2MDYxMw==&mid=2458584586&idx=1&sn=c14c9df12deb9d8b04c597dae49adfc8",
|
||
"description": "看雪论坛作者ID:是气球呀",
|
||
"author": "看雪学苑",
|
||
"category": "看雪学苑",
|
||
"pubDate": "2024-11-29T17:59:50"
|
||
},
|
||
{
|
||
"title": "APT-C-60 黑客在 SpyGlace 恶意软件活动中利用 StatCounter 和 Bitbucket",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzAxMjYyMzkwOA==&mid=2247524872&idx=3&sn=8a68547a11c354c52dafc228eeb01509",
|
||
"description": null,
|
||
"author": "Ots安全",
|
||
"category": "Ots安全",
|
||
"pubDate": "2024-11-29T17:28:27"
|
||
},
|
||
{
|
||
"title": "警惕APT-C-01(毒云藤)组织的钓鱼攻击",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzUyMjk4NzExMA==&mid=2247504897&idx=1&sn=af87dbf964532694d3489d71bbfb1615",
|
||
"description": "我们在日常威胁狩猎中观察到该组织持续活动,其模仿官方网站制作钓鱼网页进行定向钓鱼,当受害者访问这类网站时会自动下恶意载荷,该载荷会进一步加载Sliver RAT进行窃密和远程控制行动",
|
||
"author": "360威胁情报中心",
|
||
"category": "360威胁情报中心",
|
||
"pubDate": "2024-11-29T17:18:30"
|
||
},
|
||
{
|
||
"title": "『CTF』DFA分析白盒AES",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=Mzg4NTA0MzgxNQ==&mid=2247489663&idx=1&sn=18b89b3dd8d19cbfde1dee84fa71130e",
|
||
"description": "比赛中遇到的一次白盒AES",
|
||
"author": "宸极实验室",
|
||
"category": "宸极实验室",
|
||
"pubDate": "2024-11-29T17:03:38"
|
||
},
|
||
{
|
||
"title": "【实战小技巧系列】前端 JS 解密:一次简单高危漏洞案例",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkzNTUwNzIxNA==&mid=2247484491&idx=1&sn=5b3201c62060ef45a4d7fdd941051766",
|
||
"description": "前端 JS 解密:一次简单高危漏洞案例",
|
||
"author": "小呆安全",
|
||
"category": "小呆安全",
|
||
"pubDate": "2024-11-29T16:45:24"
|
||
},
|
||
{
|
||
"title": "【漏洞通告】ProjectSend身份验证绕过漏洞安全风险通告",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzU4NjY4MDAyNQ==&mid=2247496830&idx=1&sn=4550017de10cbb9463e78d91a1472b71",
|
||
"description": "近日,嘉诚安全监测到ProjectSend修复了一个身份验证绕过漏洞,鉴于漏洞危害较大,嘉诚安全提醒相关用户尽快更新至安全版本,避免引发漏洞相关的网络安全事件。",
|
||
"author": "嘉诚安全",
|
||
"category": "嘉诚安全",
|
||
"pubDate": "2024-11-29T15:50:40"
|
||
},
|
||
{
|
||
"title": "【漏洞通告】Zabbix SQL注入漏洞安全风险通告",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzU4NjY4MDAyNQ==&mid=2247496830&idx=2&sn=32feb8d3794ac11cdf54df8999ee1ce1",
|
||
"description": "近日,嘉诚安全监测到Zabbix中修复了一个SQL注入漏洞,鉴于漏洞危害较大,嘉诚安全提醒相关用户尽快更新至安全版本,避免引发漏洞相关的网络安全事件。",
|
||
"author": "嘉诚安全",
|
||
"category": "嘉诚安全",
|
||
"pubDate": "2024-11-29T15:50:40"
|
||
},
|
||
{
|
||
"title": "Shiro漏洞利用工具",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzAxMjE3ODU3MQ==&mid=2650604261&idx=4&sn=89ded4cfd4566918dd520488c54f250e",
|
||
"description": null,
|
||
"author": "黑白之道",
|
||
"category": "黑白之道",
|
||
"pubDate": "2024-11-29T14:18:32"
|
||
},
|
||
{
|
||
"title": "通过 CcmExec 实现 Windows 会话劫持",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzAxODM5ODQzNQ==&mid=2247485420&idx=1&sn=beebe3a60a52c95f450fc19fcfaa5433",
|
||
"description": null,
|
||
"author": "securitainment",
|
||
"category": "securitainment",
|
||
"pubDate": "2024-11-29T13:37:33"
|
||
},
|
||
{
|
||
"title": "Spear-V4渗透工具箱Windows版本",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=Mzg5MzMzNTUzMA==&mid=2247485547&idx=1&sn=b5191a49555a71211561697327e0ee79",
|
||
"description": null,
|
||
"author": "SSP安全研究",
|
||
"category": "SSP安全研究",
|
||
"pubDate": "2024-11-29T12:52:57"
|
||
},
|
||
{
|
||
"title": "edusrc 某中学Swagger接口泄露未授权漏洞挖掘",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=Mzg4MTkwMTI5Mw==&mid=2247486304&idx=1&sn=8f7f768fcd81251b6ece478f82fb5172",
|
||
"description": "SpringBoot-Scan是作用于探测Spring Boot的敏感信息泄露端点,并可以直接测试Spring的相关高危漏洞",
|
||
"author": "星悦安全",
|
||
"category": "星悦安全",
|
||
"pubDate": "2024-11-29T12:52:27"
|
||
},
|
||
{
|
||
"title": "记一次认证绕过接管平台",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzUyODkwNDIyMg==&mid=2247545514&idx=1&sn=6910dfcb102c6e9e7ecc01ae931ac28e",
|
||
"description": null,
|
||
"author": "掌控安全EDU",
|
||
"category": "掌控安全EDU",
|
||
"pubDate": "2024-11-29T12:03:16"
|
||
},
|
||
{
|
||
"title": "【免杀】基于fscan 过360核晶、火绒的xlscan v1.2 介绍!",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkwOTIzODg0MA==&mid=2247491254&idx=1&sn=c35616149c8030f8b99d24d8dd617c1e",
|
||
"description": "新增Todesk/向日葵账号密码提取功能\\\\x0d\\\\x0a新增导出Lsass 内存功能 \\\\x0d\\\\x0a目前以保持近一个月的免杀效果",
|
||
"author": "爱喝酒烫头的曹操",
|
||
"category": "爱喝酒烫头的曹操",
|
||
"pubDate": "2024-11-29T11:49:58"
|
||
},
|
||
{
|
||
"title": "【免杀】基于fscan 过360核晶、火绒的xlscan v1.2 介绍!",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=Mzg4Mzg4OTIyMA==&mid=2247485837&idx=1&sn=fd67a1bd46e71ede5d5f924f83946e34",
|
||
"description": "新增Todesk/向日葵账号密码提取功能\\\\x0d\\\\x0a新增导出Lsass 内存功能 \\\\x0d\\\\x0a目前以保持近一个月的免杀效果",
|
||
"author": "威零安全实验室",
|
||
"category": "威零安全实验室",
|
||
"pubDate": "2024-11-29T11:49:32"
|
||
},
|
||
{
|
||
"title": "绕过CDN查找真实IP方法",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzAwMjA5OTY5Ng==&mid=2247525053&idx=1&sn=bb6ee36b8b001af0e5bf0cdf64a0f382",
|
||
"description": null,
|
||
"author": "乌雲安全",
|
||
"category": "乌雲安全",
|
||
"pubDate": "2024-11-29T11:40:09"
|
||
},
|
||
{
|
||
"title": "“银狐”又又又变种了!新“银狐”木马样本分析在此",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=Mzg2NjgzNjA5NQ==&mid=2247523917&idx=1&sn=89d9e4cb1792b419f46b7516de333a3b",
|
||
"description": "深盾终端实验室发现了一起利用微信等其它IM软件钓鱼的相关样本",
|
||
"author": "深信服千里目安全技术中心",
|
||
"category": "深信服千里目安全技术中心",
|
||
"pubDate": "2024-11-29T11:39:55"
|
||
},
|
||
{
|
||
"title": "仍未出补丁,Windows新的PE漏洞及完整利用代码",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkxOTUyOTc0NQ==&mid=2247492639&idx=1&sn=443bb480a80ca6b2fa33ab02f3161461",
|
||
"description": "在 ksthunk.sys 的 CKSAutomationThunk::ThunkEnableEventIrp 中存在一个整数溢出漏洞,本地攻击者可以利用该漏洞提升在 Windows 操作系统中的权限。",
|
||
"author": "二进制空间安全",
|
||
"category": "二进制空间安全",
|
||
"pubDate": "2024-11-29T11:34:57"
|
||
},
|
||
{
|
||
"title": "【企业数据泄露】IP欺骗攻防实战指南,打造铜墙铁壁级安全防线!",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzI5MjY4MTMyMQ==&mid=2247488190&idx=1&sn=e8350d40fdb0826b878493ba1901cbe5",
|
||
"description": "随着互联网技术的飞速发展,网络安全威胁也在不断升级。其中,IP地址欺骗(IP Spoofing)作为一种古老但依然有效的攻击手段,一直是黑客最常用的工具之一。",
|
||
"author": "HW安全之路",
|
||
"category": "HW安全之路",
|
||
"pubDate": "2024-11-29T11:01:44"
|
||
},
|
||
{
|
||
"title": "src|简简单单验证码回显",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=Mzk0NTY5Nzc1OA==&mid=2247484154&idx=1&sn=a6b331a4a8c9fb60981dbe343a3b6ae4",
|
||
"description": "验证码回显漏洞",
|
||
"author": "simple学安全",
|
||
"category": "simple学安全",
|
||
"pubDate": "2024-11-29T10:27:31"
|
||
},
|
||
{
|
||
"title": "干货|一文搞懂加密流量检测的解决方法和技术细节",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzI1OTA1MzQzNA==&mid=2651247074&idx=2&sn=b91c2d4d4010393e571ee883fabbb8ef",
|
||
"description": null,
|
||
"author": "e安在线",
|
||
"category": "e安在线",
|
||
"pubDate": "2024-11-29T10:24:17"
|
||
},
|
||
{
|
||
"title": "GitLab漏洞汇总",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzAxNzkyOTgxMw==&mid=2247493727&idx=1&sn=52aabdb46b51bc552492cba49750ce09",
|
||
"description": "本文汇总了gitlab从2016到2023年的一些常见漏洞。",
|
||
"author": "哈拉少安全小队",
|
||
"category": "哈拉少安全小队",
|
||
"pubDate": "2024-11-29T10:13:29"
|
||
},
|
||
{
|
||
"title": "一款内存马检测工具",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzIwMzIyMjYzNA==&mid=2247517067&idx=1&sn=196e72e8809271f1be30f67e1021c368",
|
||
"description": null,
|
||
"author": "HACK之道",
|
||
"category": "HACK之道",
|
||
"pubDate": "2024-11-29T09:59:13"
|
||
},
|
||
{
|
||
"title": "如何挖掘更多子域",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MjM5Mzc4MzUzMQ==&mid=2650260190&idx=1&sn=669156696f3677e8b239618b0a6492df",
|
||
"description": null,
|
||
"author": "骨哥说事",
|
||
"category": "骨哥说事",
|
||
"pubDate": "2024-11-29T09:54:07"
|
||
},
|
||
{
|
||
"title": "Java反序列化漏洞之JNDI注入原理及利用IDEA漏洞复现",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=Mzk0Mzc1MTI2Nw==&mid=2247485787&idx=1&sn=1f202987e42634743b29aeea66916628",
|
||
"description": "人若无名,便可专心练剑!",
|
||
"author": "神农Sec",
|
||
"category": "神农Sec",
|
||
"pubDate": "2024-11-29T09:38:35"
|
||
},
|
||
{
|
||
"title": "黑客组织Matrix部署巨型IoT僵尸网络,超3500万设备或被控制",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzIwNzAwOTQxMg==&mid=2652250908&idx=1&sn=11b34e988080f71a535d7f011ee7c871",
|
||
"description": "安全研究机构Aqua Nautilus最新发现,黑客组织Matrix正在部署大规模IoT僵尸网络,并利用大量互联网设备发起分布式拒绝服务(DDoS)攻击。",
|
||
"author": "汇能云安全",
|
||
"category": "汇能云安全",
|
||
"pubDate": "2024-11-29T09:35:37"
|
||
},
|
||
{
|
||
"title": "【技术分享】关于C-Lodop打印服务文件读取漏洞修复方式",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkxMTY1MTIzOA==&mid=2247484433&idx=1&sn=14e3f8fdb875a41434afc1cef578dc42",
|
||
"description": "C-Lodop云打印服务器是一款云打印工具,如何修复C-Lodop打印服务系统文件读取漏洞(CNVD-2019-43826)。",
|
||
"author": "剁椒Muyou鱼头",
|
||
"category": "剁椒Muyou鱼头",
|
||
"pubDate": "2024-11-29T09:17:40"
|
||
},
|
||
{
|
||
"title": "APT-C-60组织利用正规系统服务进行复杂的网络攻击活动——每周威胁情报动态第202期(11.22-11.28)",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzI0MTE4ODY3Nw==&mid=2247492442&idx=1&sn=f70de2e177ec7a44e326abd600938b7f",
|
||
"description": "APT组织Lazarus 在Rootkit(获取内核权限)攻击中使用了微软的0day漏洞;APT组织Kimsuky利用软件公司产品安装程序进行伪装展开攻击;NoName057(16)组织DDoSia项目持续更新;",
|
||
"author": "白泽安全实验室",
|
||
"category": "白泽安全实验室",
|
||
"pubDate": "2024-11-29T09:02:34"
|
||
},
|
||
{
|
||
"title": "安卓app抓包总结",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkzMjIxNjExNg==&mid=2247485886&idx=1&sn=9e399e37895b283dec4804d27dfb675b",
|
||
"description": "非双向认证的安卓APP抓包姿势,你都会了么?",
|
||
"author": "沃克学安全",
|
||
"category": "沃克学安全",
|
||
"pubDate": "2024-11-29T09:02:24"
|
||
},
|
||
{
|
||
"title": "从 LFI 到 RCE 的旅程!!!",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkxNzY5MTg1Ng==&mid=2247484117&idx=1&sn=bf7670789433856ad64160e7db78afd9",
|
||
"description": null,
|
||
"author": "富贵安全",
|
||
"category": "富贵安全",
|
||
"pubDate": "2024-11-29T08:55:32"
|
||
},
|
||
{
|
||
"title": "Cloudflare_WAF_Bypass",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=Mzg2NTk4MTE1MQ==&mid=2247486182&idx=1&sn=43addd0d2027fe3a4b5fad59c63b344e",
|
||
"description": null,
|
||
"author": "TtTeam",
|
||
"category": "TtTeam",
|
||
"pubDate": "2024-11-29T08:55:04"
|
||
},
|
||
{
|
||
"title": "资产管理运营系统mobilefront2接口处存在前台文件上传漏洞【漏洞复现|附nuclei-POC】",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkyOTcwOTMwMQ==&mid=2247484577&idx=1&sn=2cc88f0347850a9a6f074438afe107e5",
|
||
"description": null,
|
||
"author": "脚本小子",
|
||
"category": "脚本小子",
|
||
"pubDate": "2024-11-29T08:30:13"
|
||
},
|
||
{
|
||
"title": "Burp插件nowafpls",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkyNzIxMjM3Mg==&mid=2247488347&idx=1&sn=c4e4e6527645b9d66caf3ed0e740b5e2",
|
||
"description": null,
|
||
"author": "白帽学子",
|
||
"category": "白帽学子",
|
||
"pubDate": "2024-11-29T08:11:59"
|
||
},
|
||
{
|
||
"title": "疑似针对东亚国家的APT-C-60组织利用正規服务进行恶意攻击",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=Mzg4MDYwNDc5Nw==&mid=2247486421&idx=1&sn=ba020c32a47c737340966fe476477d84",
|
||
"description": "\\\\x0a正規サービスを悪用した攻撃グループAPT-C-60による攻撃\\\\x0a2024-11-26, APT组织:伪猎者,",
|
||
"author": "狼蛛安全实验室",
|
||
"category": "狼蛛安全实验室",
|
||
"pubDate": "2024-11-29T08:02:09"
|
||
},
|
||
{
|
||
"title": "还有人没有用上Mac的渗透浏览器?",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=Mzg3NTk4MzY0MA==&mid=2247487649&idx=1&sn=a59d99711b007ddf26ce93117437a5c9",
|
||
"description": null,
|
||
"author": "琴音安全",
|
||
"category": "琴音安全",
|
||
"pubDate": "2024-11-29T08:01:19"
|
||
},
|
||
{
|
||
"title": "漏洞预警 | TamronOS IPTV系统任意用户创建漏洞",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkwMTQ0NDA1NQ==&mid=2247491585&idx=3&sn=3febf83e42ab74481bebf264334e9eca",
|
||
"description": "TamronOS IPTV系统的/api/manager/submit接口存在任意用户创建漏洞,未经身份验证的攻击者可以通过该漏洞创建用户,从而登录后台。",
|
||
"author": "浅安安全",
|
||
"category": "浅安安全",
|
||
"pubDate": "2024-11-29T08:00:15"
|
||
},
|
||
{
|
||
"title": "构建 Spectre:用于 XSS 漏洞利用的红队工具(第 1 部分)",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkwOTE5MDY5NA==&mid=2247503484&idx=1&sn=e3eb5a40d0988c77c33d974008df4c8d",
|
||
"description": "每个红队成员都有他们最喜欢的工具集,但有时当它们都没有完全满足你的需求时,你会碰壁。这就是我在处理基于浏览器的攻击时发现自己遇到的情况,尤其是围",
|
||
"author": "安全狗的自我修养",
|
||
"category": "安全狗的自我修养",
|
||
"pubDate": "2024-11-29T07:12:01"
|
||
},
|
||
{
|
||
"title": "[03]应急响应-Linux 计划任务与 DFIR 排查实践(三)",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzI4MDcxODc4MQ==&mid=2247485042&idx=1&sn=ced4b346475c8b191142e0bc9af77ce5",
|
||
"description": "终于不用再怀疑自己排查计划任务漏看了!",
|
||
"author": "Y1X1n安全",
|
||
"category": "Y1X1n安全",
|
||
"pubDate": "2024-11-29T07:04:54"
|
||
},
|
||
{
|
||
"title": "【神兵利器】高危漏洞EXP实用性工具",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=Mzg4MTU4NTc2Nw==&mid=2247493702&idx=1&sn=2186fab30eaee576dbca5c54e3bf00e6",
|
||
"description": null,
|
||
"author": "七芒星实验室",
|
||
"category": "七芒星实验室",
|
||
"pubDate": "2024-11-29T07:01:21"
|
||
},
|
||
{
|
||
"title": "Windows凭证钓鱼方式面面观",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=Mzg4MTU4NTc2Nw==&mid=2247493702&idx=2&sn=979f270438f5c2df55597b887cc3b755",
|
||
"description": null,
|
||
"author": "七芒星实验室",
|
||
"category": "七芒星实验室",
|
||
"pubDate": "2024-11-29T07:01:21"
|
||
},
|
||
{
|
||
"title": "命令注入 / CSRF 绕过漏洞(cve-2024-51567)",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzU3NzY3MzYzMw==&mid=2247498719&idx=1&sn=cb3e59215e78406f6926c5b9877e75b0",
|
||
"description": null,
|
||
"author": "网络安全者",
|
||
"category": "网络安全者",
|
||
"pubDate": "2024-11-29T00:00:10"
|
||
},
|
||
{
|
||
"title": "黑客滥用 Avast 反 rootkit 驱动程序来禁用防御措施",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=Mzg3ODY0NTczMA==&mid=2247491683&idx=1&sn=0198d8ee157a94f1bd5d2a42e21b03c3",
|
||
"description": null,
|
||
"author": "犀牛安全",
|
||
"category": "犀牛安全",
|
||
"pubDate": "2024-11-29T00:00:00"
|
||
},
|
||
{
|
||
"title": "病毒木马应急措施",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzUzMDgwMjY1Mg==&mid=2247485487&idx=1&sn=c71b01658d5c3850fcfb08f751f1dfc6",
|
||
"description": null,
|
||
"author": "网络安全工作室",
|
||
"category": "网络安全工作室",
|
||
"pubDate": "2024-11-28T21:56:54"
|
||
},
|
||
{
|
||
"title": "必应主站www.bing.com惊现蠕虫XSS漏洞",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkwODI1ODgzOA==&mid=2247506224&idx=1&sn=e83970b0c4d3942d269e688628784f1c",
|
||
"description": "非常经典的大厂XSS漏洞,高危级别漏洞!",
|
||
"author": "一个不正经的黑客",
|
||
"category": "一个不正经的黑客",
|
||
"pubDate": "2024-11-28T21:31:19"
|
||
},
|
||
{
|
||
"title": "利用gitRepo卷在Node上RCE(CVE-2024-10220)",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkwMDQ4MDU2MA==&mid=2247484417&idx=1&sn=6f4cc0766411a4efe0a5ba648a80f51f",
|
||
"description": "集群安全:利用gitRepo卷在Node上RCE(CVE-2024-10220)",
|
||
"author": "安全小将李坦然",
|
||
"category": "安全小将李坦然",
|
||
"pubDate": "2024-11-28T21:18:32"
|
||
},
|
||
{
|
||
"title": "【漏洞预警】Zabbix SQL注入漏洞(CVE-2024-42327)",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzI3NzMzNzE5Ng==&mid=2247489233&idx=1&sn=813b669371f32694d48087f9e54af5f8",
|
||
"description": null,
|
||
"author": "飓风网络安全",
|
||
"category": "飓风网络安全",
|
||
"pubDate": "2024-11-28T21:17:59"
|
||
},
|
||
{
|
||
"title": "网安瞭望台第6期xa0:XMLRPC npm 库被恶意篡改、API与SDK的区别",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=Mzg2NTkwODU3Ng==&mid=2247513365&idx=1&sn=9234d982b7b3ef30d2c507746b4fea0a",
|
||
"description": "网安资讯分享\\\\x0d\\\\x0aDAILY NEWS AND KNOWLEDGE",
|
||
"author": "东方隐侠安全团队",
|
||
"category": "东方隐侠安全团队",
|
||
"pubDate": "2024-11-28T20:50:07"
|
||
},
|
||
{
|
||
"title": "如何检测 LD_PRELOAD rootkit 以及如何从 ldd 和 proc 隐藏",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzAxODM5ODQzNQ==&mid=2247485410&idx=1&sn=bb7ed2e93fe3652bdc01797020557ee8",
|
||
"description": null,
|
||
"author": "securitainment",
|
||
"category": "securitainment",
|
||
"pubDate": "2024-11-28T20:31:00"
|
||
},
|
||
{
|
||
"title": "内网穿透工具 - grs",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzIzNTE0Mzc0OA==&mid=2247485970&idx=1&sn=1df7f9faefa1e07a144d4c4267a34ee9",
|
||
"description": "grs是一个反向socks5代理,其中grss和grsc和grsu是通过REALITY协议通信",
|
||
"author": "GSDK安全团队",
|
||
"category": "GSDK安全团队",
|
||
"pubDate": "2024-11-28T19:59:36"
|
||
},
|
||
{
|
||
"title": "解密还原被BitLocker加密的数据",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkxOTUyOTc0NQ==&mid=2247492631&idx=1&sn=040fddbaa96b7bfef0c29aecf78b5c9b",
|
||
"description": "许多企业笔记本电脑使用 BitLocker 提供全磁盘加密(FDE),以保护敏感数据免遭笔记本电脑被盗后的暴露。但默认的 BitLocker 实现能在这种情况下多大程度上保护静态数据?所有加密的安全性都依赖于密钥材料的保护。",
|
||
"author": "二进制空间安全",
|
||
"category": "二进制空间安全",
|
||
"pubDate": "2024-11-28T18:50:58"
|
||
},
|
||
{
|
||
"title": "漏洞预警 | 7-Zip代码执行漏洞CVE-2024-11477",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=Mzg3NzUyMTM0NA==&mid=2247487694&idx=2&sn=4cbf3f73698e15a3d4134fe9c293a674",
|
||
"description": null,
|
||
"author": "Eonian Sharp",
|
||
"category": "Eonian Sharp",
|
||
"pubDate": "2024-11-28T18:50:44"
|
||
},
|
||
{
|
||
"title": "N1CTF-ezapk 解题思路",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MjM5NTc2MDYxMw==&mid=2458584139&idx=1&sn=356e4f25ebf567cce4a702e88dfdad3d",
|
||
"description": "看雪论坛作者ID:SleepAlone",
|
||
"author": "看雪学苑",
|
||
"category": "看雪学苑",
|
||
"pubDate": "2024-11-28T18:02:41"
|
||
},
|
||
{
|
||
"title": "【漏洞通告】Zabbix 服务器SQL注入漏洞(CVE-2024-42327)",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=Mzg2NjgzNjA5NQ==&mid=2247523865&idx=1&sn=a85f1659ccbd217fd246c088babf8a97",
|
||
"description": "2024年11月28日,深瞳漏洞实验室监测到一则Zabbix组件存在SQL注入漏洞的信息,漏洞编号:CVE-2024-42327,漏洞威胁等级:严重。",
|
||
"author": "深信服千里目安全技术中心",
|
||
"category": "深信服千里目安全技术中心",
|
||
"pubDate": "2024-11-28T18:01:43"
|
||
},
|
||
{
|
||
"title": "开源文件共享软件存在严重漏洞CVE-2024-11680,已有公开的PoC",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkyOTQzNjIwNw==&mid=2247490220&idx=2&sn=d1d013adb3a9540504c23b2930e6f846",
|
||
"description": "开源文件共享软件存在严重漏洞CVE-2024-11680,已有公开的PoC",
|
||
"author": "棉花糖fans",
|
||
"category": "棉花糖fans",
|
||
"pubDate": "2024-11-28T17:55:01"
|
||
},
|
||
{
|
||
"title": "\\\"Yaker,你可以全局配置插件环境变量!\\\"",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=Mzk0MTM4NzIxMQ==&mid=2247525652&idx=1&sn=91301a8c65604e8229d69f54ed2707bd",
|
||
"description": "插件商店功能上新!配置全局插件环境变量新方法",
|
||
"author": "Yak Project",
|
||
"category": "Yak Project",
|
||
"pubDate": "2024-11-28T17:30:34"
|
||
},
|
||
{
|
||
"title": "几种勒索病毒及排查方式",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzU3MzU4NjI4OQ==&mid=2247515526&idx=1&sn=15016ac5686041b6ed097fa1d79afefc",
|
||
"description": "勒索病毒。",
|
||
"author": "河北镌远网络科技有限公司",
|
||
"category": "河北镌远网络科技有限公司",
|
||
"pubDate": "2024-11-28T17:29:57"
|
||
},
|
||
{
|
||
"title": "新的 AMSI 绕过技术修改内存中的 CLR.dll",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzAxMjYyMzkwOA==&mid=2247524738&idx=1&sn=30e4829d4998feb199debdeca3e41014",
|
||
"description": null,
|
||
"author": "Ots安全",
|
||
"category": "Ots安全",
|
||
"pubDate": "2024-11-28T17:06:17"
|
||
},
|
||
{
|
||
"title": "macOS 上的横向移动:独特且流行的技术以及实际示例",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzAxMjYyMzkwOA==&mid=2247524738&idx=2&sn=cf5d79105235fc099c8a6079ad3553d1",
|
||
"description": null,
|
||
"author": "Ots安全",
|
||
"category": "Ots安全",
|
||
"pubDate": "2024-11-28T17:06:17"
|
||
},
|
||
{
|
||
"title": "利用 Spring Properties 实现远程代码执行",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzAxMjYyMzkwOA==&mid=2247524738&idx=3&sn=f8d5f578a23e85792133e1e32f6f504b",
|
||
"description": null,
|
||
"author": "Ots安全",
|
||
"category": "Ots安全",
|
||
"pubDate": "2024-11-28T17:06:17"
|
||
},
|
||
{
|
||
"title": "macOS 磁盘仲裁中的 TOCTOU 漏洞可通过利用符号链接进行沙箱逃逸和权限升级攻击",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzAxMjYyMzkwOA==&mid=2247524738&idx=4&sn=b31c451cdd0b6f7219abff8f78b19210",
|
||
"description": null,
|
||
"author": "Ots安全",
|
||
"category": "Ots安全",
|
||
"pubDate": "2024-11-28T17:06:17"
|
||
},
|
||
{
|
||
"title": "【APP小程序】APP抓包绕过-双向校验和绕过系统代理检测",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzU5NTEwMTMxMw==&mid=2247485455&idx=1&sn=6a22a6bc1b9525a4b8d8d97bd9db5d22",
|
||
"description": null,
|
||
"author": "小C学安全",
|
||
"category": "小C学安全",
|
||
"pubDate": "2024-11-28T17:01:55"
|
||
},
|
||
{
|
||
"title": "macOS 上的横向移动:独特且流行的技术以及实际示例",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=Mzg4MzA4NTM0OA==&mid=2247492928&idx=1&sn=70668f560508c08d880c2751e1806219",
|
||
"description": null,
|
||
"author": "OSINT研习社",
|
||
"category": "OSINT研习社",
|
||
"pubDate": "2024-11-28T16:45:38"
|
||
},
|
||
{
|
||
"title": "Firefox和Tor浏览器遭遇神秘0Day漏洞攻击",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkwMTQyODI4Ng==&mid=2247494942&idx=2&sn=1126c4b20f4c21941b695f0588b1c62c",
|
||
"description": null,
|
||
"author": "网络安全与人工智能研究中心",
|
||
"category": "网络安全与人工智能研究中心",
|
||
"pubDate": "2024-11-28T16:11:43"
|
||
},
|
||
{
|
||
"title": "伪造调用栈来迷惑EDR和杀软",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkyMjM0ODAwNg==&mid=2247488266&idx=1&sn=8db9cd092f30fafaab615f6bf495e9c7",
|
||
"description": "EDR BYPASS",
|
||
"author": "TIPFactory情报工厂",
|
||
"category": "TIPFactory情报工厂",
|
||
"pubDate": "2024-11-28T15:58:47"
|
||
},
|
||
{
|
||
"title": "去中心化的噩梦:隐藏在 P2P 网络下的后门 alphatronBot",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzI2MDc2MDA4OA==&mid=2247513129&idx=1&sn=5723225dc5a665d7f8137559b2eafc8d",
|
||
"description": "alphatronBot是一款基于p2p协议的后门程序,拥有远控功能,并且会下发特定的payload。该恶意软件通过PubSub聊天室的形式进行控制,后门内置了700多个受感染的p2p C2节点,影响linux和windows双平台。",
|
||
"author": "奇安信威胁情报中心",
|
||
"category": "奇安信威胁情报中心",
|
||
"pubDate": "2024-11-28T15:39:13"
|
||
},
|
||
{
|
||
"title": "RomCom 黑客利用 Firefox 和 Windows 零日漏洞",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzI0MDY1MDU4MQ==&mid=2247579846&idx=1&sn=0bb37a38ab5998f595038709b86b4063",
|
||
"description": "RomCom 现在还针对乌克兰、欧洲和北美的组织进行跨行业的间谍攻击,包括政府、国防、能源、制药和保险。",
|
||
"author": "嘶吼专业版",
|
||
"category": "嘶吼专业版",
|
||
"pubDate": "2024-11-28T14:00:35"
|
||
},
|
||
{
|
||
"title": "记一次异常艰难的渗透测试",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=Mzk0MTIzNTgzMQ==&mid=2247518498&idx=1&sn=891c4b9401699de8d77b2426851a620e",
|
||
"description": null,
|
||
"author": "亿人安全",
|
||
"category": "亿人安全",
|
||
"pubDate": "2024-11-28T13:21:22"
|
||
},
|
||
{
|
||
"title": "【在野利用】ProjectSend 身份认证绕过漏洞(CVE-2024-11680)安全风险通告",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzU5NDgxODU1MQ==&mid=2247502502&idx=1&sn=874d1d96ffd31643476939deced0fd4f",
|
||
"description": "致力于第一时间为企业级用户提供权威漏洞情报和有效解决方案。",
|
||
"author": "奇安信 CERT",
|
||
"category": "奇安信 CERT",
|
||
"pubDate": "2024-11-28T11:45:15"
|
||
},
|
||
{
|
||
"title": "20万个 WordPress 网站存在严重漏洞",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzA5NzQxMTczNA==&mid=2649166866&idx=2&sn=9f83cb58e03863413ba9d68e7a84850a",
|
||
"description": "CleanTalk 的 WordPress 反垃圾邮件插件存在两个漏洞,攻击者可借此远程执行任意代码。",
|
||
"author": "黑客联盟l",
|
||
"category": "黑客联盟l",
|
||
"pubDate": "2024-11-28T11:38:46"
|
||
},
|
||
{
|
||
"title": "使用 Cynthion 对 VNA ECal 接口进行逆向工程",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=Mzk0NzI3ODU0Mg==&mid=2247483879&idx=1&sn=2932a290c50d704fa3287230efbf49fe",
|
||
"description": null,
|
||
"author": "网络安全知识",
|
||
"category": "网络安全知识",
|
||
"pubDate": "2024-11-28T11:11:13"
|
||
},
|
||
{
|
||
"title": "【系统安全告急】深入理解防火墙工作原理,企业级防护方案大公开!",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzI5MjY4MTMyMQ==&mid=2247488149&idx=1&sn=5ab4a708dc431804cc0a2ecb0c39123c",
|
||
"description": "防火墙是网络安全的基石,但它需要正确配置和持续维护才能发挥最大作用。在当今复杂的网络环境中,建立全面的安全防护体系,让防火墙与其他安全措施协同工作,才能真正保障网络安全。",
|
||
"author": "HW安全之路",
|
||
"category": "HW安全之路",
|
||
"pubDate": "2024-11-28T11:00:28"
|
||
},
|
||
{
|
||
"title": "干货|一文搞懂加密流量检测的解决方法和技术细节",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzI1OTA1MzQzNA==&mid=2651247066&idx=2&sn=8be3d507735cb334738f930061f1094b",
|
||
"description": null,
|
||
"author": "e安在线",
|
||
"category": "e安在线",
|
||
"pubDate": "2024-11-28T10:47:18"
|
||
},
|
||
{
|
||
"title": "Java 安全 | 反序列化 URLDNS+CC+自己挖一条链+CB",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkwMzQyMTg5OA==&mid=2247485098&idx=1&sn=1e7ace694e4e86e1d2421539ce5ef4c8",
|
||
"description": "手把手入门反序列化漏洞",
|
||
"author": "Heihu Share",
|
||
"category": "Heihu Share",
|
||
"pubDate": "2024-11-28T10:29:43"
|
||
},
|
||
{
|
||
"title": "速速查看 | 不使用时请关闭这个Burp插件,否则可能导致异常…",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=Mzk0NzQxNzY2OQ==&mid=2247487313&idx=1&sn=f9b28c8bfa12fb8fe0157c2aefc9f8c6",
|
||
"description": "犀利猪安全,带你上高速~",
|
||
"author": "犀利猪安全",
|
||
"category": "犀利猪安全",
|
||
"pubDate": "2024-11-28T10:22:33"
|
||
},
|
||
{
|
||
"title": "Bing搜索引擎爆出严重XSS漏洞",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=Mzg3NTY0MjIwNg==&mid=2247484954&idx=1&sn=10bb386657c8c1482377a8a4c8c31464",
|
||
"description": "最近在 Bing.com 上发现的跨站点脚本 (XSS) 漏洞引发了严重的安全问题,可能允许攻击者在 Microsoft 的互连应用程序之间发送精心设计的恶意请求。",
|
||
"author": "星尘安全",
|
||
"category": "星尘安全",
|
||
"pubDate": "2024-11-28T10:00:59"
|
||
},
|
||
{
|
||
"title": "u200bJmeter工具(一):Jmeter安装配置",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzUxMjc0MTE3Mw==&mid=2247494711&idx=1&sn=ab5104b574d368e9c40dd138d14da865",
|
||
"description": null,
|
||
"author": "锋刃科技",
|
||
"category": "锋刃科技",
|
||
"pubDate": "2024-11-28T10:00:45"
|
||
},
|
||
{
|
||
"title": "通过USB设备感染传播的恶意软件Raspberry Robin深度分析",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzI0MTE4ODY3Nw==&mid=2247492438&idx=1&sn=ddbd62d5303ea7775fcfff9eeb7ee294",
|
||
"description": "近日,一起大规模的数据泄露事件震动了网络安全界。名为“HikkI-Chan”的黑客在臭名昭著的Breach Forums上泄露了超过3.9亿VK用户的个人信息。",
|
||
"author": "白泽安全实验室",
|
||
"category": "白泽安全实验室",
|
||
"pubDate": "2024-11-28T09:55:53"
|
||
},
|
||
{
|
||
"title": "记两次内网入侵溯源的真实案例",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzAxMjE3ODU3MQ==&mid=2650604219&idx=3&sn=e9aa326b1cb56f365582767e912245d3",
|
||
"description": null,
|
||
"author": "黑白之道",
|
||
"category": "黑白之道",
|
||
"pubDate": "2024-11-28T09:47:55"
|
||
},
|
||
{
|
||
"title": "IP网络广播服务平台upload接口处存在任意文件上传漏洞【漏洞复现|附nuclei-POC】",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkyOTcwOTMwMQ==&mid=2247484562&idx=1&sn=d0c1257debb5b76f190d73e1385db92e",
|
||
"description": null,
|
||
"author": "脚本小子",
|
||
"category": "脚本小子",
|
||
"pubDate": "2024-11-28T09:45:00"
|
||
},
|
||
{
|
||
"title": "【2024年全国职业技能大赛“信息安全与评估”赛项】任务1-XSC3-Windows应急响应",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=Mzk0Mzc1MTI2Nw==&mid=2247485692&idx=1&sn=9cfddbb0d988bcb4110322a762d41b4a",
|
||
"description": null,
|
||
"author": "神农Sec",
|
||
"category": "神农Sec",
|
||
"pubDate": "2024-11-28T09:42:19"
|
||
},
|
||
{
|
||
"title": "【含源码】利用SysWhispers3直接系统调用绕过杀软加载shellcode上线CobaltStrike",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=Mzg4Mzg4OTIyMA==&mid=2247485835&idx=1&sn=54b48417c412c5604edf1b1cabde3c40",
|
||
"description": null,
|
||
"author": "威零安全实验室",
|
||
"category": "威零安全实验室",
|
||
"pubDate": "2024-11-28T09:18:10"
|
||
},
|
||
{
|
||
"title": "Linux LKM 内核模块持久化",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzAxODM5ODQzNQ==&mid=2247485384&idx=1&sn=9c654de343de37f033200f7f34cb7b5d",
|
||
"description": null,
|
||
"author": "securitainment",
|
||
"category": "securitainment",
|
||
"pubDate": "2024-11-28T09:17:49"
|
||
},
|
||
{
|
||
"title": "【含源码】利用SysWhispers3直接系统调用绕过杀软加载shellcode上线CobaltStrike",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkwOTIzODg0MA==&mid=2247491252&idx=1&sn=7a2fcd03333cc35923afc7a4e224984e",
|
||
"description": null,
|
||
"author": "爱喝酒烫头的曹操",
|
||
"category": "爱喝酒烫头的曹操",
|
||
"pubDate": "2024-11-28T09:08:34"
|
||
},
|
||
{
|
||
"title": "一种新型内核马/WebShell",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=Mzg2NTk4MTE1MQ==&mid=2247486176&idx=1&sn=94bd38e33c0e149efd7174f1aea21555",
|
||
"description": null,
|
||
"author": "TtTeam",
|
||
"category": "TtTeam",
|
||
"pubDate": "2024-11-28T09:01:57"
|
||
},
|
||
{
|
||
"title": "韩国黑客组织 APT-C-60 攻击日本目标",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzI2NzAwOTg4NQ==&mid=2649793293&idx=2&sn=d635a6a3d66ad8f58b882f77a9c09210",
|
||
"description": "韩国黑客组织攻击日本。",
|
||
"author": "军哥网络安全读报",
|
||
"category": "军哥网络安全读报",
|
||
"pubDate": "2024-11-28T09:00:50"
|
||
},
|
||
{
|
||
"title": "又一款红队资产收集工具",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkyMDM4NDM5Ng==&mid=2247488816&idx=1&sn=0992b30142dfe20b17015208f755143f",
|
||
"description": "MoonLight是一款使用 go1.20.2 语言进行开发的红队资产收集工具,图形界面为GoQt,使用Qtdesigner进行界面绘制",
|
||
"author": "安全洞察知识图谱",
|
||
"category": "安全洞察知识图谱",
|
||
"pubDate": "2024-11-28T08:30:33"
|
||
},
|
||
{
|
||
"title": "【MalDev-06】提权基础与实战-2",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzIzODMyMzQxNQ==&mid=2247484255&idx=1&sn=77115801ceb65bdfee1d5e005c789206",
|
||
"description": "本章主要介绍密码窃取、DLL加载顺序劫持和供应链攻击、UAC绕过原理及代码实战",
|
||
"author": "高级红队专家",
|
||
"category": "高级红队专家",
|
||
"pubDate": "2024-11-28T08:13:49"
|
||
},
|
||
{
|
||
"title": "X-Recon",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkyNzIxMjM3Mg==&mid=2247488346&idx=1&sn=336f1c7c082778d6d0c87e61396b45e2",
|
||
"description": null,
|
||
"author": "白帽学子",
|
||
"category": "白帽学子",
|
||
"pubDate": "2024-11-28T08:11:19"
|
||
},
|
||
{
|
||
"title": "[02]应急响应-Linux 计划任务与 DFIR 排查实践(二)",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzI4MDcxODc4MQ==&mid=2247484954&idx=1&sn=d80ae18591e41ccdda0c2bbd573cf7c9",
|
||
"description": "原来如此!Linux计划任务-速学cron、at、anacron 和 systemd timers!",
|
||
"author": "Y1X1n安全",
|
||
"category": "Y1X1n安全",
|
||
"pubDate": "2024-11-28T08:00:49"
|
||
},
|
||
{
|
||
"title": "漏洞预警 | Wget服务器端请求伪造漏洞",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkwMTQ0NDA1NQ==&mid=2247491570&idx=1&sn=0acfe5c899673a3bfc780a6df4d6a88b",
|
||
"description": "Wget存在服务器端请求伪造漏洞,由于其在处理HTTP简写格式URL时解析不当,错误地将包含冒号的用户输入解析为FTP请求,导致将原本应为HTTP请求的URL错误地解析为FTP请求。",
|
||
"author": "浅安安全",
|
||
"category": "浅安安全",
|
||
"pubDate": "2024-11-28T08:00:15"
|
||
},
|
||
{
|
||
"title": "JWT sign 未校验导致未授权用户登录",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkxNjMwNDUxNg==&mid=2247486862&idx=1&sn=2e0bbc1f67930c8ae0dd31032e4bad4f",
|
||
"description": "JWT sign 未校验导致未授权用户登录",
|
||
"author": "进击的HACK",
|
||
"category": "进击的HACK",
|
||
"pubDate": "2024-11-28T07:55:20"
|
||
},
|
||
{
|
||
"title": "『红蓝对抗』记一次某网站劫持跳转菠菜站点事件的分析",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkxNjMwNDUxNg==&mid=2247486862&idx=2&sn=cbc0714c8d3a865b2666f68735457f8d",
|
||
"description": "某天在搜索引擎查找资料的时候,发现其中一条结果点开后,打开的官网会跳转到菠菜站点,但手动输入官网......",
|
||
"author": "进击的HACK",
|
||
"category": "进击的HACK",
|
||
"pubDate": "2024-11-28T07:55:20"
|
||
},
|
||
{
|
||
"title": "HTB-Chemistry靶机渗透教程",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=Mzg2Nzk0NjA4Mg==&mid=2247496165&idx=1&sn=5a16f7bc8dc1280d8636752d8dc817af",
|
||
"description": null,
|
||
"author": "泷羽Sec",
|
||
"category": "泷羽Sec",
|
||
"pubDate": "2024-11-28T07:45:13"
|
||
},
|
||
{
|
||
"title": "绕过 Mozilla 中的电子邮件验证",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkwOTE5MDY5NA==&mid=2247503483&idx=1&sn=5dfd6cfaeedbf89dbe45a42c2fe27dd5",
|
||
"description": "我最近在 Mozilla 的一个产品中发现的一个有趣的业务逻辑漏洞。",
|
||
"author": "安全狗的自我修养",
|
||
"category": "安全狗的自我修养",
|
||
"pubDate": "2024-11-28T07:25:04"
|
||
},
|
||
{
|
||
"title": "漏洞挖掘—越权更改、删除信息",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkyNjczNzgzMA==&mid=2247484294&idx=1&sn=945aa5d3f04bd25e27bf79f75bab0812",
|
||
"description": "漏洞挖掘—越权更改、删除信息",
|
||
"author": "网安日记本",
|
||
"category": "网安日记本",
|
||
"pubDate": "2024-11-28T07:00:30"
|
||
},
|
||
{
|
||
"title": "sql注入报错分享(mssql+mysql)",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzU2NDY2OTU4Nw==&mid=2247517319&idx=1&sn=350fe80f1fd8fb2b45d158a0c5367433",
|
||
"description": null,
|
||
"author": "船山信安",
|
||
"category": "船山信安",
|
||
"pubDate": "2024-11-28T00:03:04"
|
||
},
|
||
{
|
||
"title": "信息安全手册:系统加固指南",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzA5MzU5MzQzMA==&mid=2652112835&idx=2&sn=ae35d2644ecde80b1c106eb50f1a0516",
|
||
"description": null,
|
||
"author": "祺印说信安",
|
||
"category": "祺印说信安",
|
||
"pubDate": "2024-11-28T00:00:57"
|
||
},
|
||
{
|
||
"title": "最新AWVS/Acunetix Premium V24.10高级版漏洞扫描器Windows/Linux下载",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=Mzg3ODE2MjkxMQ==&mid=2247489168&idx=1&sn=3edfc728444f2b7af121bf0e04b0bcae",
|
||
"description": "最新Acunetix Premium v24.10高级版,Acunetix Premium 是Web 应用程序安全解决方案,用于管理多个网站、Web 应用程序和 API 的安全。集成功能允许您自动化 DevOps 和问题管理基础架构。",
|
||
"author": "渗透安全HackTwo",
|
||
"category": "渗透安全HackTwo",
|
||
"pubDate": "2024-11-28T00:00:39"
|
||
},
|
||
{
|
||
"title": "【含源码】利用SysWhispers3直接系统调用绕过杀软加载shellcode上线CobaltStrike",
|
||
"link": "https://mp.weixin.qq.com/s?__biz=MzkwNjczOTQwOA==&mid=2247491097&idx=1&sn=58815fc3daf30d71d48ac6598a0ff5a0",
|
||
"description": null,
|
||
"author": "星落安全团队",
|
||
"category": "星落安全团队",
|
||
"pubDate": "2024-11-28T00:00:30"
|
||
}
|
||
] |