技术类:
国际事件:讲述通过dns欺骗获取.int域名控制权的故事
Anti Ransom:通过蜜罐来打击恶意欺诈软件
http://www.security-projects.com/?Anti_Ransom
web中的条件竞争漏洞
https://www.josipfranjkovic.com/blog/race-conditions-on-web
恶意软件分析,隐藏在位图中的代码
https://www.pelock.com/articles/code-of-destruction-malware-analysis
通过dns Rebinding实现Rails Developer Webconsole RCE
http://benmmurphy.github.io/blog/2016/07/11/rails-webconsole-dns-rebinding/
我的vba僵尸网络
https://dl.packetstormsecurity.net/papers/general/My_VBA_Bot.pdf
MS16-016 mrxdav.sys WebDav 本地提权poc
https://www.exploit-db.com/exploits/40085/
实践练习解析ntds.dit文件第一部分
https://blog.didierstevens.com/2016/07/12/practice-ntds-dit-file-part-1/
Gootkit银行木马的最近一些改动
https://securityintelligence.com/gootkit-bobbing-and-weaving-to-avoid-prying-eyes/
2016乌云白帽大会-0709 录像
http://v.youku.com/v_show/id_XMTYzODMwMzkyMA==.html
Jigsaw恶意欺诈勒索软件再次被解密
https://threatpost.com/jigsaw-ransomware-decrypted-again/119186/
win10不同版本的安全策略列表
https://msdn.microsoft.com/library/windows/hardware/dn904962.aspx
PoshC2:一个powershell写的C2框架
http://www.hackwhackandsmack.com/?p=693
windows内核驱动 (IGDKMD64) 的代码执行漏洞
http://www.talosintelligence.com/reports/TALOS-2016-0087/
word文档与嵌入payload的分析
https://isc.sans.edu/diary/21227
KeeThief:攻击KeePass第二部分
http://www.harmj0y.net/blog/redteaming/keethief-a-case-study-in-attacking-keepass-part-2/
IP feeds:提供恶意软件,僵尸网络,C2等IP信息
理解/dev/urandom
http://www.2uo.de/myths-about-urandom/
通过7个命令来安装 Lair Framework
http://jerrygamblin.com/2016/07/08/installing-lair-framework-with-7-commands/
资讯类:
波兰电信巨头Netia被乌克兰黑客黑了,并泄漏海量数据
https://www.hackread.com/ukranian-hacker-hacks-polish-telecom-netia/
Kim Dotcom计划2017年重启Megaupload
http://www.bbc.com/news/technology-36763522
匿名者泄露南非的武器采购局的数据