2015-12-25 10:45:40 来源:360安全播报 阅读:10次 点赞(0) 收藏
分享到:
1.OLEOutlook - 号称绕过几乎所有企业安全控制的.如果嵌入exe,WIN7下点击的时候还是有提示的,需要其他漏洞配合利用
https://medium.com/@networksecurity/oleoutlook-bypass-almost-every-corporate-security-control-with-a-point-n-click-gui-37f4cbc107d0#.pv8bftlbx
https://github.com/NullArray/PyCat
3.使用windows crash dump对远程事件进行鉴定
https://www.sans.org/reading-room/whitepapers/forensics/windows-crash-dumps-remote-incident-identification-36012
4.IEFuzz:一个静态IE fuzzer
http://www.debasish.in/2015/12/iefuzz-static-internet-explorer-fuzzer.html
https://www.demisto.com/category/tools/memoryanalysis/
6.VBoxAntiVMDetectHardened UEFI 补丁辅导
http://www.kernelmode.info/forum/viewtopic.php?f=11&p=27460#p27460
7.Azure安全中心
http://zigmax.net/azure-security-center/
8.Email Tracking入门
https://blog.rootshell.be/2015/12/07/email-tracking-for-dummies/
9.有些人想影响百万的树梅派计算机,在出厂的时候就预装好恶意软件
http://securityaffairs.co/wordpress/43024/malware/pay-to-infect-raspberry-devices.html
10.VB Decompiler v10.2 发行
https://www.vb-decompiler.org/vb_decompiler_102.htm
11.Nivdort代码混淆和DGA
http://www.neutralizethreat.com/2015/12/nivdort-code-obfuscation-and-dga.html
本文由 360安全播报 原创发布,如需转载请注明来源及本文地址。本文地址:http://bobao.360.cn/news/detail/2538.html