3月4日-每日安全知识热点

http://p7.qhimg.com/t012dfaf746e4fefbe3.jpg

1.明白虚拟环境中的块大小

http://vmpete.com/2016/03/03/understanding-block-sizes-in-a-virtualized-environment/

2.全面分析TDSS僵尸网络 

http://www.nobunkum.ru/analytics/en-tdss-botnet

3.WINRT PDF渲染库是个潜在攻击Edge浏览器的捷径 

https://securityintelligence.com/winrt-pdf-a-potential-route-for-attacking-edge/

4.使用syzkaller进行内核fuzzing 

https://lwn.net/SubscriberLink/677764/02236e45d8b181f0/

5.Triada:Andorid上的有组织的犯罪 

https://blog.kaspersky.com/triada-trojan/11481/

6.为什么说你的安全工具(安全产品本身的漏洞)反而会增加你的安全风险? 

http://www.darkreading.com/operations/why-your-security-tools-are-exposing-you-to-added-risks/a/d-id/1324503

7.DTD Cheat Sheet (XXE) 

http://web-in-security.blogspot.tw/2016/03/xxe-cheat-sheet.html

8.Cisco Nexus 3000 系列和 3500 平台的交换机包含不安全的默认密码 

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160302-n3k

9.关键的基础设施是黑客日益关注的网络目标 

https://defensesystems.com/articles/2016/02/23/trend-micro-critical-infrastructure-threats.aspx

10.在Debian Jessie平台使用Fail2Ban和Tinyhoneypot增加你的IPv4安全 

https://www.howtoforge.com/tutorial/increase-ipv4-security-with-fail2ban-and-tinyhoneypot-on-debian-jessie/

11.idataco:载入 Cuckoo 沙盒分析的结果进IDA的插件 

https://github.com/arbor-jjones/idataco

12.我从Rowhammer(DRAM bug)漏洞中学到的3件事 

https://docs.google.com/presentation/d/1x7syhRv8Kxi78fpbcp4vSsslriGOj5cuHUgCUuZcZ3U/edit?pref=2&pli=1#slide=id.p

13.AppLocker执行保护绕过的metasploit利用模块 

https://packetstormsecurity.com/files/136057/applocker_bypass.rb.txt

14.在Intel Edison(基于Atom处理器的Arduino兼容控制器)上建立kali镜像 

http://www.hackgnar.com/2016/02/building-kali-linux-for-intel-edison.html

15.PE和ELF的完整之旅:第一部分 

http://resources.infosecinstitute.com/complete-tour-of-pe-and-elf-part-1/

16.如何构建一个优秀的redteam(redteam一般在攻防对抗中指攻击方) 

http://www.subliminalhacking.net/2016/02/26/corporate-red-teaming-to-me/

17.宏恶意软件使用Forms来存储他的代码 

http://blog.trendmicro.com/trendlabs-security-intelligence/macro-malware-strides-new-direction-uses-forms-store-code/

18.来自巴西的跨平台的银行木马 

https://securelist.com/blog/research/74051/first-step-in-cross-platform-trojan-bankers-from-brazil-done

免责声明:文章内容不代表本站立场,本站不对其内容的真实性、完整性、准确性给予任何担保、暗示和承诺,仅供读者参考,文章版权归原作者所有。如本文内容影响到您的合法权益(内容、图片等),请及时联系本站,我们会及时删除处理。查看原文

为您推荐