CyborgSecurity安全动态(3-13)



  • video-games-movies-resident-evil-umbrella-corp-logos-wallpaper-515092.jpg

    1.https://cflaws.blog/2019/03/10/ramblings-about-mitre-attck-carbonblack-response-and-powershell/amp/?__twitter_impression=true
    关于MITER ATT&CK,CarbonBlack Response和Powershell的Ramblings
    2.https://medium.com/@slowmist/slowmist-red-alert-false-top-up-vulnerability-attack-of-eos-d7eb20c88e5f
    SlowMist红色警报:EOS的“虚假充值”漏洞攻击
    3.https://zhuanlan.zhihu.com/p/58910752
    48小时逃逸Virtualbox虚拟机——记一次CTF中的0day之旅
    4.https://modexp.wordpress.com/2019/03/07/process-injection-print-spooler/
    Windows进程注入:打印后台处理程序
    5.https://github.com/RhinoSecurityLabs/CVEs/tree/master/CVE-2018-1335?utm_content=87008901&utm_medium=social&hss_channel=tw-1184539364&utm_source=twitter
    Apache Tika服务器中的命令注入
    6.https://blog.xpnsec.com/undersanding-and-evading-get-injectedthread/
    了解和规避Get-InjectedThread
    7.https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2019-0678
    CVE-2019-0678 | Microsoft Edge特权提升漏洞
    8.https://www.zdnet.com/article/microsoft-march-patch-tuesday-comes-with-fixes-for-two-windows-zero-days/
    Microsoft March Patch Tuesday附带了两个Windows零日修复程序
    9.https://modexp.wordpress.com/2019/03/07/process-injection-print-spooler/
    Windows进程注入:打印后台处理程序
    10.https://github.com/Rurik/Noriben
    Noriben恶意软件分析沙箱
    11.https://cysinfo.com/13th-quarterly-meetup-understanding-malware-persistence-techniques/
    恶意软件持久性技术
    

Log in to reply