技术类:
中间人攻击,反向工程一个加密的服务
http://www.theodo.fr/blog/2016/07/mitm-attack-reverse-engineering-an-encrypted-service/
使用DNS的AAAA记录实现命令执行和数据提取,技术文档在https://isc.sans.edu/forums/diary/Command+and+Control+Channels+Using+AAAA+DNS+Records/21301/
https://github.com/DShield-ISC/IPv6DNSExfil
ROOT ON THE PHILIPS HUE IOT BRIDGE
https://hackaday.com/2016/07/26/root-on-the-philips-hue-iot-bridge/?utm_content=buffer93ad9&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer
面对面比较CrypMIC和CryptXXX的感染过程
http://www.bleepingcomputer.com/news/security/side-by-side-comparisons-of-the-crypmic-and-cryptxxx-ransomware-infections/
burpsuite pro版1.7.04发行,增加一个叫Burp Infiltrator的工具,相关介绍在http://blog.portswigger.net/2016/07/introducing-burp-infiltrator.html
http://releases.portswigger.net/2016/07/1704.html
渗透测试中awk/sed/sort等脚本在处理数据时的使用
https://pentestarmoury.com/2016/07/26/finding-diamonds-in-the-rough-parsing-for-pentesters-post-1/
针对云服务的419示骗局
https://blog.malwarebytes.com/cybercrime/2016/07/the-little-419-scam-that-could/
如何逆向一个恶意软件
http://blog.devit.co/how-i-reverse-malware/
真实的渗透测试环境,在内网捕捉信用凭证
https://community.rapid7.com/community/services/blog/2016/07/26/capturing-credentials-on-an-internal-network
Studiometry:不安全的密码存储
https://labs.mwrinfosecurity.com/assets/BlogFiles/Studiometry-Insecure-password-storage-advisory.pdf
Studiometry:非认证管理员帐号创建
https://labs.mwrinfosecurity.com/assets/BlogFiles/Studiometry-unauthenticated-user-creation-advisory.pdf
对函数hooking库的比较
https://github.com/frida/frida/wiki/Comparison-of-function-hooking-libraries
用于学习javascript恶意软件的工具
https://github.com/CapacitorSet/box-js
通过机器学习算法对抗混淆过的程序恢复原数据
https://github.com/tum-i22/Oedipus
通过同一私钥的重复使用跟踪MAN1 勒索软件的制造者
http://www.threatgeek.com/2016/07/tracking-man1-crypter-actor.html
OPENSSH安全加固辅导
https://wiki.mozilla.org/Security/Guidelines/OpenSSH
对CVE-2016-3740漏洞的分析
https://0patch.blogspot.ch/2016/07/0patching-foxit-readers-heap-buffer.html
Xen安全公告XSA-182和XSA-183,中文的概述可以看http://bobao.360.cn/learning/detail/2925.html
https://xenbits.xen.org/xsa/advisory-182.html
https://xenbits.xen.org/xsa/advisory-183.html
使用硬盘驱动的服务区域隐藏数据
https://articles.forensicfocus.com/2016/07/22/hiding-data-from-forensic-imagers-using-the-service-area-of-a-hard-disk-drive/
针对中东的APT报告
../../upload/report/file/rmsxden20160721.html
资讯类:
新的攻击方法可以绕过macs/windows/linux平台上的https加密保护
http://arstechnica.com/security/2016/07/new-attack-that-cripples-https-crypto-works-on-macs-windows-and-linux/