¡¶Î¬ËûÃü¡·ÖðÈÕÇå¾²¼òѶ20180627

Ðû²¼Ê±¼ä 2018-06-27

¡¾Çå¾²²¥±¨¡¿Wi-FiͬÃËÕýʽÐû²¼ÐÂÒ»´úÇå¾²±ê×¼WPA3£¬£¬£¬£¬£¬¿É½øÒ»²½Ìá¸ßÍøÂçÇå¾²ÐÔ


±¾ÖÜÒ»Wi-FiͬÃËÕýʽÐû²¼ÐÂÒ»´úÇå¾²±ê×¼WPA3£¬£¬£¬£¬£¬WPA3ÊÇÓÃÓÚWi-FiÅþÁ¬µÄÓû§Éí·ÝÑéÖ¤ÊÖÒÕµÄ×îа汾¡£¡£¡£WPA3ÓÐÁ½ÖÖÇ徲ģʽ£¬£¬£¬£¬£¬WPA3-PersonalºÍWPA3-Enterprise£¬£¬£¬£¬£¬ÕâÁ½ÖÖÇ徲ģʽµÄÖ÷񻂿±ðÔÚÓÚÉí·ÝÑéÖ¤½×¶Î¡£¡£¡£¹ØÓÚÆóÒµ¡¢Õþ¸®ºÍ½ðÈÚÍøÂçÖÐʹÓõÄ×°±¸£¬£¬£¬£¬£¬½¨ÒéʹÓÃWPA3-EnterpriseÇ徲ģʽ£¬£¬£¬£¬£¬WPA3-PersonalÔòÊÇÃæÏòͨË×СÎÒ˽¼ÒÓû§¡£¡£¡£Wi-FiͬÃËÌåÏÖWPA3µÄSAEËã·¨Äܹ»µÖÓù±©Á¦¹¥»÷£¬£¬£¬£¬£¬WPA3½«ÔÚ¶à´Îʧ°ÜʵÑéºó×èÖ¹ÈÏÖ¤ÇëÇ󡣡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/new-wpa3-wi-fi-standard-released/


¡¾ÍþвÇ鱨¡¿Çå¾²Ñо¿ÍŶӷ¢Ã÷Ö÷ÒªÕë¶Ô¶«ÄÏÑǵĹ¥»÷»î¶¯Rancor


Palo Alto NetworksµÄUnit 42Ñо¿ÍŶÓÊӲ쵽Õë¶Ô¶«ÄÏÑǵÄһϵÁй¥»÷»î¶¯£¬£¬£¬£¬£¬Æä¶ñÒâÈí¼þµÄ·Ö·¢ºÍÄ¿µÄµÄÑ¡Ôñ¾ßÓи߶ÈÕë¶ÔÐÔ¡£¡£¡£Ñо¿Ö°Ô±ÒÔΪ¸Ã¹¥»÷ÕßÊÇÒ»¸öδ֪µÄ×éÖ¯Rancor£¬£¬£¬£¬£¬RancorÖ÷ҪʹÓÃÁ½¸ö¶ñÒâÈí¼þ¼Ò×壬£¬£¬£¬£¬DDKONGºÍPLAINTEE¡£¡£¡£DDKONGÊÇÆäÖ÷ÒªµÄ¶ñÒâÈí¼þ¹¤¾ß£¬£¬£¬£¬£¬PLAINTEEËÆºõÊÇÐÂÔöÌíµÄ¹¤¾ß¡£¡£¡£Æä¹¥»÷Ä¿µÄ°üÀ¨µ«²»ÏÞÓÚÐÂ¼ÓÆÂºÍ¼íÆÒÕ¯¡£¡£¡£ÕâЩ¹¥»÷»î¶¯´Ó´¹ÂÚÐÅÏ¢×îÏÈ£¬£¬£¬£¬£¬Ñо¿Ö°Ô±ÒÔΪÆäÖ÷ÒªÕë¶ÔÕþÖÎʵÌå¡£¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://researchcenter.paloaltonetworks.com/2018/06/unit42-rancor-targeted-attacks-south-east-asia-using-plaintee-ddkong-malware-families/


¡¾ÍþвÇ鱨¡¿Ñо¿Ö°Ô±³Æ2017ÄêµÄÿһ¸ö¼ÓÃÜÇ®±ÒICOƽ¾ù°üÀ¨5¸öÇå¾²Îó²î


Positive.com·¢Ã÷2017ÄêµÄÿһ¸ö¼ÓÃÜÇ®±ÒICOƽ¾ù±£´æ5¸öÇå¾²Îó²î£¬£¬£¬£¬£¬´ó´ó¶¼Îó²î¶¼ÊÇÔÚICO×Ô¼ºµÄÖÇÄܺÏÔ¼Öз¢Ã÷µÄ¡£¡£¡£¸Ã¹«Ë¾ÌåÏÖ2017ÄêËùÓеÄICOÒÆ¶¯Ó¦Óö¼±£´æÇå¾²Îó²î£¬£¬£¬£¬£¬ÁíÍâÈý·ÖÖ®Ò»µÄÎó²î·ºÆðÔÚICOµÄwebÓ¦ÓÃÖУ¬£¬£¬£¬£¬Îó²î¹æÄ£°üÀ¨´úÂë×¢È롢ЧÀÍÆ÷Ãô¸ÐÊý¾Ýй¶¡¢²»Çå¾²µÄÊý¾Ý´«ÊäÒÔ¼°í§ÒâÎļþ¶ÁÈ¡µÈ¡£¡£¡£ICO×éÖ¯ÕßÍùÍùûÓÐΪÆäÏîĿע²áÉ罻ýÌåÕË»§£¬£¬£¬£¬£¬Ê¹ÆäÓû§Ò×ÊÜÉç½»¹¤³ÌºÍ´¹ÂÚ¹¥»÷¡£¡£¡£×îºó£¬£¬£¬£¬£¬ICO×éÖ¯ÕßÍùÍùδÄÜΪÆäÃô¸ÐÕË»§ÆôÓÃË«ÒòËØÈÏÖ¤£¬£¬£¬£¬£¬µ¼Ö¹¥»÷Õß¿ÉÄÜÐ®ÖÆ¹Ù·½ÍøÕ¾»òÇ®°ü¡£¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/researchers-last-year-s-icos-had-five-security-vulnerabilities-on-average/


¡¾ÍþвÇ鱨¡¿Çå¾²Ñо¿ÍŶÓÐû²¼ÀÕË÷Èí¼þThanatosµÄ½âÃܹ¤¾ß


˼¿ÆTalosÐû²¼ÀÕË÷Èí¼þThanatosµÄÃ⺬»ìÃܹ¤¾ß£¬£¬£¬£¬£¬¸Ã¹¤¾ßÔÚThanatos°æ±¾1ºÍ1.1ÒÔ¼°ÆäËüÒÑÖª°æ±¾É϶¼ÓÐÓᣡ£¡£Thanatosͨ¹ýŲÓÃGetTickCount»ñȡϵͳÔËÐÐʱ¼äµÄºÁÃëÊý£¬£¬£¬£¬£¬È»ºóÌìÉú¼ÓÃÜÃÜÔ¿£¬£¬£¬£¬£¬²¢Ê¹ÓÃ(AES)-256¾ÙÐмÓÃÜ¡£¡£¡£Òò´ËÆäÃÜÔ¿ÊÇÒ»¸ö32λµÄÖµ£¬£¬£¬£¬£¬ÔÚÆ½¾ùÿÃë10Íò´ÎµÄ±©Á¦ÆÆ½âÏ£¨²âÊÔÐéÄâ»úµÄ»ù×¼£©£¬£¬£¬£¬£¬»ñµÃÃÜÔ¿ÐèÒªÔ¼14·ÖÖÓµÄʱ¼ä¡£¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://blog.talosintelligence.com/2018/06/ThanatosDecryptor.html


¡¾ÆÊÎö±¨¸æ¡¿Ñо¿ÍŶÓÐû²¼¹ØÓÚ¹ã¸æÈí¼þPbotµÄбäÌåµÄÆÊÎö±¨¸æ


¿¨°Í˹»ùʵÑéÊÒ·¢Ã÷¹ã¸æÈí¼þPBot£¨PythonBot£©µÄбäÌ壬£¬£¬£¬£¬¸Ã±äÌåÊÔͼÔÚÓû§µÄä¯ÀÀÆ÷ÉÏ×°ÖÃ¹ã¸æ²å¼þ£¬£¬£¬£¬£¬ÕâЩ²å¼þ»áÔÚÍøÒ³ÉÏÌí¼ÓÖÖÖÖ¹ã¸æ£¬£¬£¬£¬£¬²¢½«Óû§Öض¨Ïòµ½¹ã¸æÍøÕ¾¡£¡£¡£PBotµÄ¿ª·¢Ö°Ô±Ò»Ö±Ðû²¼¸Ã±äÌåµÄа汾£¬£¬£¬£¬£¬Ã¿¸ö°æ±¾¶¼»áʹ¾ç±¾»ìÏý±äµÃÔ½·¢Öش󡣡£¡£ÔÚ4Ô·ݿ¨°Í˹»ù¼ì²âµ½Áè¼Ý5Íò´Î×°ÖÃPBotµÄʵÑ飬£¬£¬£¬£¬ÔÚ5Ô·ÝÕâÒ»Êý×ÖÉõÖÁ»¹ÔÚÔöÌí¡£¡£¡£PBotÖ÷ÒªÕë¶Ô¶íÂÞ˹¡¢ÎÚ¿ËÀ¼ºÍ¹þÈø¿Ë˹̹µÄÓû§¡£¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://securelist.com/pbot-evolving-adware/86242/


¡¾Çå¾²Îó²î¡¿Ñо¿Ö°Ô±³ÆJolokiaµÄ¹ýʧÉèÖÿÉÄܵ¼ÖÂÐÅϢй¶»òDoS


Çå¾²Ñо¿Ö°Ô±Mat Mannion·¢Ã÷Jolokia Java Management Extensions£¨JMX£©±£´æÒ»Ð©Çå¾²Îó²î£¬£¬£¬£¬£¬¿ÉÄܵ¼Ö¾ܾøÐ§ÀÍ¡¢ÐÅϢй¶µÈÕë¶ÔJava WebЧÀÍÆ÷µÄDZÔÚ¹¥»÷¡£¡£¡£Mannion³ÆJolokiaµÄĬÈÏÉèÖò¢²»Çå¾²£¬£¬£¬£¬£¬Ã»ÓоÙÐÐÊʵ±ÉèÖõÄJolokia¿ÉÄܸøÍøÕ¾´øÀ´Î£º¦£¬£¬£¬£¬£¬ÉõÖÁ°üÀ¨Ò»Ð©½ðÈÚ»ú¹¹µÄÍøÕ¾¡£¡£¡£Mannion»¹Ðû²¼ÁËÕë¶ÔApache Tomcat 8µÄPoC¡£¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://matmannion.com/jolokiapwn/