7月27日每日安全热点 - OilRig瞄准了中东电信组织

admin 2023-11-30 00:16:05 AnQuanKeInfo 来源:ZONE.CI 全球网 0 阅读模式

漏洞 Vulnerability dxgkrnl.sys 整数溢出漏洞PoC https://github.com/k0keoyo/my_vulnerabilities/tree/master/dxgkrnl_integer_overflow CVE-2020–2950:将AMF反序列化漏洞转换为Java反序列化漏洞 https://medium.com/@peterjson/cve-2020-2950-turning-amf-deserialize-bug-to-java-deserialize-bug-2984a8542b6f Tor 0day分析 https://www.hackerfactor.com/blog/index.php?/archives/888-Tor-0day-Stopping-Tor-Connections.html CVE-2020-8207:Citrix Workspace App高危漏洞分析 https://www.pentestpartners.com/security-blog/raining-system-shells-with-citrix-workspace-app/ 恶意软件 Malware 针对印度和香港的恶意软件MgBot变种分析 https://blog.malwarebytes.com/threat-analysis/2020/07/chinese-apt-group-targets-india-and-hong-kong-using-new-variant-of-mgbot-malware/ 恶意样本CruLoader详细分析 https://0x00sec.org/t/zero2auto-cruloader/22420 OilRig瞄准了中东电信组织,并增加了隐写的新C2地址 https://unit42.paloaltonetworks.com/oilrig-novel-c2-channel-steganography/ 安全研究 Security Research 在IBM WEBSPHERE中滥用JAVA远程协议 https://www.zerodayinitiative.com/blog/2020/7/20/abusing-java-remote-protocols-in-ibm-websphere 分析DJI 的消息验证机制 https://blog.grimm-co.com/2020/07/dji-privacy-analysis-validation.html 利用 Ghidra 、 Jupyter Notebooks 和 Graphframes分析Windows RPC https://medium.com/threat-hunters-forge/extending-the-exploration-and-analysis-of-windows-rpc-methods-calling-other-functions-with-ghidra-e4cdaa9555bd DNS重绑定攻击分析 https://medium.com/bugbountywriteup/dns-rebinding-the-treacherous-attack-it-can-be-b367c61b4372 关于如何通过EMFI绕过 Secure Boot 的研究 https://raelize.com/posts/espressif-systems-esp32-bypassing-sb-using-emfi/ 如何挖掘virtualbox的漏洞,以挖到的3个CVE为例 http://blog.paulch.ru/2020-07-26-hunting-for-bugs-in-virtualbox-first-take.html 安全工具 Security Tools SpaceRunner:用于执行任意PowerShell的C#工具 https://github.com/Mr-B0b/SpaceRunner
weinxin
版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
评论:0   参与:  0