1月7日-每日安全知识热点

阅读量110316

|

发布时间 : 2016-01-07 10:28:50

http://p3.qhimg.com/t012dfaf746e4fefbe3.jpg

1.使用Radare2和ruby写恶意软件配置文件解析

http://www.morphick.com/blog/2016/1/6/writing-a-malware-config-parser-using-radare2-and-ruby

2.另一款签名的恶意软件:Spymel

http://research.zscaler.com/2016/01/yet-another-signed-malware-spymel.html

3.Blackphone被暴可被接管的风险漏洞

https://www.sentinelone.com/blog/vulnerability-in-blackphone-puts-devices-at-risk-for-takeover/

4.Let's Encrypt项目被Malvertisers滥用

http://blog.trendmicro.com/trendlabs-security-intelligence/lets-encrypt-now-being-abused-by-malvertisers/

5.“逆向工程”真正的蜡烛

https://cpldcpu.wordpress.com/2016/01/05/reverse-engineering-a-real-candle/

6.GunCon3逆向和Linux驱动

https://beardypig.github.io/2016/01/06/guncon3/

7.从HTTPS到http的referer泄露

http://c0rni3sm.blogspot.com/2016/01/referrer-leakage-from-https-to-https.html

8.通过部署蜜罐捕捉0DAY第一部分

http://null-byte.wonderhowto.com/how-to/hack-like-pro-capturing-zero-day-exploits-wild-with-dionaea-honeypot-part-1-0165708/

9.使用idapython使你的逆向生活更轻松第四部分

http://researchcenter.paloaltonetworks.com/2016/01/using-idapython-to-make-your-life-easier-part-4/

10.cisco VLAN Trunking协议漏洞

http://tools.cisco.com/security/center/content/CiscoSecurityResponse/cisco-sr-20060913-vtp

11.Kaspersky Labs DLL Hijacking

https://cxsecurity.com/issue/WLB-2016010022

12.针对乌克兰网络攻击的恶意文件样本分析

https://ics.sans.org/blog/2016/01/01/potential-sample-of-malware-from-the-ukrainian-cyber-attack-uncovered

13.VoLTE安全分析第一部分

https://www.insinuator.net/2016/01/security-analysis-of-volte-part-1/

14.Kippo配置netscreen后门蜜罐

https://github.com/gregcmartin/Kippo_JunOS

本文由安全客原创发布

转载,请参考转载声明,注明出处: https://www.anquanke.com/post/id/83253

安全客 - 有思想的安全新媒体

分享到:微信
+12赞
收藏
安全客
分享到:微信

发表评论

内容需知
合作单位
  • 安全客
  • 安全客
Copyright © 北京奇虎科技有限公司 三六零数字安全科技集团有限公司 安全客 All Rights Reserved 京ICP备08010314号-66