每周蓝军技术推送(2024.10.19-10.25) | CTF导航
Tags
attack-pattern: | Models Server - T1583.004 Server - T1584.004 Vnc - T1021.005 |
Common Information
Type | Value |
---|---|
UUID | b3af23ab-ce6b-4679-a4b3-19964e7f6489 |
Fingerprint | e7c7691c729ed46 |
Analysis status | DONE |
Considered CTI value | -2 |
Text language | |
Published | Oct. 19, 2024, midnight |
Added to db | Oct. 25, 2024, 5:34 p.m. |
Last updated | Nov. 17, 2024, 7:44 p.m. |
Headline | 每周蓝军技术推送(2024.10.19-10.25) |
Title | 每周蓝军技术推送(2024.10.19-10.25) | CTF导航 |
Detected Hints/Tags/Attributes | 25/1/73 |
Source URLs
Redirection | Url | |
---|---|---|
Details | Source | https://www.ctfiot.com/211780.html |
URL Provider
RSS Feed
Details | Id | Enabled | Feed title | Url | Added to db |
---|---|---|---|---|---|
Details | 426 | ✔ | CTF导航 | https://www.ctfiot.com/feed | 2024-08-30 22:08 |
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | CVE | 23 | cve-2024-43532 |
|
Details | CVE | 87 | cve-2024-47575 |
|
Details | CVE | 31 | cve-2024-37383 |
|
Details | CVE | 4 | cve-2023-22098 |
|
Details | Domain | 1 | www.netero1010-securitylab.com |
|
Details | Domain | 4127 | github.com |
|
Details | Domain | 1 | sabotagesec.com |
|
Details | Domain | 1 | cicada-8.medium.com |
|
Details | Domain | 10 | trustedsec.com |
|
Details | Domain | 768 | www.youtube.com |
|
Details | Domain | 1 | lolesxi-project.github.io |
|
Details | Domain | 35 | www.akamai.com |
|
Details | Domain | 98 | www.ncsc.gov.uk |
|
Details | Domain | 1 | zeroclick.sh |
|
Details | Domain | 1 | www.infernux.no |
|
Details | Domain | 1 | www.anthropic.com |
|
Details | Domain | 154 | arxiv.org |
|
Details | Domain | 194 | drive.google.com |
|
Details | Domain | 1 | cohere.com |
|
Details | Domain | 9 | start.me |
|
Details | Domain | 1 | doublespeak.chat |
|
Details | Domain | 1 | kknowl.es |
|
Details | Domain | 1 | www.edr-telemetry.com |
|
Details | Domain | 112 | docs.google.com |
|
Details | File | 384 | www.inf |
|
Details | Github username | 2 | netero1010 |
|
Details | Github username | 1 | maldev-academy |
|
Details | Github username | 1 | hulkoperator |
|
Details | Github username | 1 | octoberfest7 |
|
Details | Github username | 1 | cicada8-research |
|
Details | Github username | 1 | cocomelonc |
|
Details | Github username | 1 | akamai |
|
Details | Github username | 1 | nullenc0de |
|
Details | Github username | 2 | otterhacker |
|
Details | Github username | 1 | protectai |
|
Details | Github username | 1 | ngalongc |
|
Details | Github username | 1 | momo5502 |
|
Details | Url | 1 | https://www.netero1010-securitylab.com/red-team/abuse-sccm-remote-control-as-native-vnchttps://github.com/netero1010/sccmvnc终端对抗embedpayloadin... |
|
Details | Url | 1 | https://www.netero1010-securitylab.com/red-team/abuse-sccm-remote-control-as-native-vnc |
|
Details | Url | 1 | https://github.com/netero1010/sccmvnc |
|
Details | Url | 1 | https://github.com/maldev-academy/embedpayloadinpng |
|
Details | Url | 1 | https://github.com/hulkoperator/authstager |
|
Details | Url | 1 | https://github.com/octoberfest7/secure_stager |
|
Details | Url | 1 | https://sabotagesec.com/i-hate-you-com-pitfalls-of-com-object-activation |
|
Details | Url | 1 | https://cicada-8.medium.com/hijack-the-typelib-new-com-persistence-technique-32ae1d284661 |
|
Details | Url | 1 | https://github.com/cicada8-research/typelibwalker |
|
Details | Url | 1 | https://trustedsec.com/blog/spec-tac-ula-deserialization-deploying-specula-with-net |
|
Details | Url | 11 | https://www.youtube.com/watch?v= |
|
Details | Url | 1 | https://www.youtube.com/watch?v=gw8v270hjxi |
|
Details | Url | 1 | https://github.com/cocomelonc/hack-process-hacker2 |
|
Details | Url | 1 | https://lolesxi-project.github.io/lolesxi |
|
Details | Url | 1 | https://www.akamai.com/blog/security-research/winreg-relay-vulnerability |
|
Details | Url | 1 | https://github.com/akamai/akamai-security-research/tree/main/pocs/cve-2024-43532 |
|
Details | Url | 4 | https://cloud.google.com/blog/topics/threat-intelligence/fortimanager-zero-day-exploitation-cve-2024-47575 |
|
Details | Url | 1 | https://www.shadowserver.org/what-we-do/network-reporting/fortinet-fortimanager-cve-2024-47575-special-report |
|
Details | Url | 1 | https://www.ncsc.gov.uk/news/vulnerability-fortinet-fortimanager |
|
Details | Url | 1 | https://global.ptsecurity.com/analytics/pt-esc-threat-intelligence/fake-attachment-roundcube-mail-server-attacks-exploit-cve-2024-37383-vulnerability |
|
Details | Url | 1 | https://zeroclick.sh/blog/cve-2023-22098 |
|
Details | Url | 1 | https://github.com/nullenc0de/servicelens |
|
Details | Url | 1 | https://github.com/otterhacker/sharefouine |
|
Details | Url | 1 | https://www.infernux.no/entraid-generalhardening |
|
Details | Url | 1 | https://www.anthropic.com/news/3-5-models-and-computer-use |
|
Details | Url | 1 | https://github.com/protectai/vulnhuntr |
|
Details | Url | 1 | https://github.com/ngalongc/authzai |
|
Details | Url | 1 | https://arxiv.org/abs/2311.13721 |
|
Details | Url | 1 | https://drive.google.com/file/d/15dta-3mftfstex6iyo3gjigxqa0aixer |
|
Details | Url | 1 | https://cohere.com/blog/enterprise-ai-security-deploying-llm-applications-safely |
|
Details | Url | 1 | https://start.me/p/9ojvxx/applying-llms-genai-to-cyber-security |
|
Details | Url | 1 | https://doublespeak.chat/# |
|
Details | Url | 1 | https://kknowl.es/posts/stratus-contributor |
|
Details | Url | 1 | https://www.edr-telemetry.com |
|
Details | Url | 1 | https://github.com/momo5502/emulator |
|
Details | Url | 1 | https://docs.google.com/presentation/d/1pha4tffdmpvzj_ehjj21sa_hawkufqbvyqvh1ifhvls |