http://p1.qhimg.com/t01ee0ded1a480b06ce.jpg

1、aol desktop可通过中间人攻击导致远程文件写和代码执行漏洞(这个漏洞1993年就存在了)

http://lizardhq.org/2015/12/05/aol-desktop.html

2、非ROOT权限使用chroot()

http://go-beyond.org/post/chroot-as-non-root-user/


3、hashcat和oclHashCat宣布开源

https://hashcat.net/forum/thread-4880.html

4、DEFCon23会议视频

https://www.youtube.com/playlist?list=PL9fPq3eQfaaDklWsccFlIi280YsCwY_fz


5、一周渗透测试系列第五部分:防护以及一些其他的讨论

http://www.labofapenetrationtester.com/2015/12/week-of-continuous-intrusion-tools-day-5.html

6、Between a Rock and a Hard Link

http://googleprojectzero.blogspot.tw/2015/12/between-rock-and-hard-link.html


7、seduce:基于cpu仿真检测shellcode

https://rainbow.cs.unipi.gr/projects/seduce

8、使用activeX controls绕过windows aslr

http://www.greyhathacker.net/?p=894


9、DNS隧道取证

https://www.vthreat.com/2015/12/04/dns-tunnelling-forensics/

10、使用powershell编写的基于主机的ids

https://github.com/Invoke-IR/Uproot


11、联想解决中心(3.1.004以及以下版本)本地提权漏洞

http://rum.supply/2015/12/05/lenovo.html

12、DELL系统检测(DSD)应用的UAC绕过漏洞 

http://rum.supply/2015/12/05/dell-system-detect.html


13、微软Edge's的Javascript脚本引擎开源

https://blogs.windows.com/msedgedev/2015/12/05/open-source-chakra-core/

14、dockoo:使用docker做恶意软件分析

https://github.com/open-nsm/dockoo


15、使用模拟技术进行网络级多态shellcode检测

https://www.fp6-noah.org/publications/papers/polychronakis-emulation.pdf

16、empire,powerUp,powerView的cheatsheet

https://github.com/HarmJ0y/CheatSheets/


17、andorid木马rootnik滥用商业root工具窃取隐私信息

http://researchcenter.paloaltonetworks.com/2015/12/rootnik-android-trojan-abuses-commercial-rooting-tool-and-steals-private-information/

18、fuzzing安全测试ppt

http://slides.com/revskills/fz#/


19、仅仅8步从损坏的SD卡里恢复文件

http://techspanda.com/recover-files-from-corrupted-sd-card-in-just-8-steps/

20、你是否尝试建立你自己的恶意软件沙箱系统?

https://isc.sans.edu/diary/Are+you+looking+to+setup+your+own+Malware+Sandbox%3F/20443


21、一个提供在线证书过期监控与提醒的服务

https://certificatemonitor.org/

22、滥用android clipdata

https://rotlogix.com/2015/12/06/abusing-android-clipdata/


23、把树莓派zero集成到usbHub

http://www.h-i-r.net/2015/12/raspberry-pi-zero-in-usb-hub-part-1.html

24、stgers和metasploit payload体积

http://ungineers.com/2015/11/28/metasploit-exploit-payload-sizes.html


25、使用powershell进行windows api低级别访问

http://www.fuzzysecurity.com/tutorials/24.html

文章原文链接:https://www.anquanke.com/post/id/83054