腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Crypto ] Mimikatz sekurlsa::tspkg 密码抓取原理分析: https://jetsecurity.github.io/post/mimikatz/walk-through_sekurlsa/
-
[ MalwareAnalysis ] Nymaim 恶意软件新型域名生成算法分析: https://johannesbader.ch/2018/04/the-new-domain-generation-algorithm-of-nymaim/
-
[ Others ] 使用 JEA 保护基础设施(PSCONF.EU 2018): https://github.com/psconfeu/2018/blob/master/Miriam%20Wiesner/SecuringYourInfrastructureWithJEA/SecuringYourInfrastructureWithJea.pdf
-
[ Pentest ] 滥用 DCOM 进行横向渗透的方法: https://bohops.com/2018/04/28/abusing-dcom-for-yet-another-lateral-movement-technique/
-
[ Pentest ] JSON Web Token 渗透测试: https://medium.com/@netscylla/json-web-token-pentesting-890bc2cf0dcd
-
[ Tools ] Invoke-ATTACKAPI - 与 MITRE ATT&CK 框架进行交互的 PowerShell 脚本: https://github.com/Cyb3rWard0g/Invoke-ATTACKAPI
-
[ Tools ] SmbScanner - 用于扫描 SMB 支持版本的 PowerShell 脚本: https://github.com/vletoux/SmbScanner
-
[ Tools ] pathbrute - Web 路径暴力破解工具: https://github.com/milo2012/pathbrute
-
[ Windows ] 如何通过 PDF 文件泄露 NTLM Hash: https://research.checkpoint.com/ntlm-credentials-theft-via-pdf-files/