
腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Android ] In The Wild: Google Can’t Close the Door on Android Malware | Check Point Blog http://ow.ly/4n3wFH
"Google 也无法关上 Android 恶意软件的大门: https://t.co/Q6hD537mHC"
-
[ Android ] First weaponized #Towelroot exploits used in #Android #ransomware attacks https://threatpost.com/android-ransomware-attacks-using-towelroot-hacking-team-exploits/117655/ via @ threatpost
"Towelroot Exploits 被用于传播 Dogspectus Android 勒索软件, 来自 ThreatPost 的报道: https://t.co/aIxphXCyL3 来自 Blue Coat 的分析: https://www.bluecoat.com/security-blog/2016-04-25/android-exploit-delivers-dogspectus-ransomware "
-
[ Attack ] Personal info of 93.4 million Mexicans exposed on AWS through unpassworded MongoDB https://www.databreaches.net/personal-info-of-93-4-million-mexicans-exposed-on-amazon/ https://t.co/YYFfwgnsUP
" 9340 万墨西哥人的个人信息暴露在了 AWS 上: https://t.co/A8Df2YMoR3 https://t.co/YYFfwgnsUP"
-
[ Attack ] Two bytes to $951M : http://baesystemsai.blogspot.in/2016/04/two-bytes-to-951m.html https://t.co/YUh2Y7iyU1
"两字节与 9.51 亿的孟加拉国银行盗窃案: https://t.co/qLV5CPQW4x https://t.co/YUh2Y7iyU1"
-
[ Browser ] Exploiting Internet Explorer’s MS15-106, Part I: VBScript Filter Type Confusion Vulnerability (CVE-2015-6055) http://hubs.ly/H02MtX10
"Internet Explorer MS15-106 漏洞利用: Part 1︰ VBScript 过滤器类型混淆漏洞 (CVE-2015-6055), 来自 CoreSecurity Blog: https://t.co/lCSvKBZFgo"
-
[ Detect ] Building a Home Lab to Become a Malware Hunter - A Beginner’s Guide https://www.alienvault.com/blogs/security-essentials/building-a-home-lab-to-become-a-malware-hunter-a-beginners-guide
"自己搭建一个实验环境,成为 Malware Hunter: https://t.co/hRGfbQR1GE"
-
[ iOS ] C & C++ for OS - Filter Bypass & Persistent Vulnerability http://goo.gl/fb/77FOwC #FullDisclosure
"C & C++ for OS APP 存在过滤器绕过和永久型注入漏洞: https://t.co/d6OEuTGqof "
-
[ IoTDevice ] New blog post: AirPort Hacking Update http://embeddedideation.com/2016/04/24/airport-hacking-update/
"Hacking AirPort: https://t.co/M83UCigFGz AirPort 是苹果的一款无线基站(路由器)设备"
-
[ Linux ] Unlock up to an additional 4GB of system RAM : https://github.com/graphitemaster/moreram
"moreram - 在全系统范围替换 malloc, 允许你使用系统内存的额外 12GB ︰ https://t.co/xiYaIDF0Y7"
-
[ Linux ] Article on ELF shared-library injection #forensics analysis in #Linux and #FreeBSD http://backtrace.io/blog/blog/2016/04/22/elf-shared-library-injection-forensics/
"ELF 共享库代码注入取证分析: https://t.co/K7t2L6C9uD "
-
[ Linux ] Semaphores in the Linux kernel (Part 3) : https://github.com/0xAX/linux-insides/blob/master/SyncPrim/sync-3.md //linux-insides* series cont'd cc: @ 0xAX
"Linux 内核同步之信号量 (Part 3): https://t.co/QOd5j8s6RY "
-
[ Linux ] Randomized symbol order in libc in OpenBSD, randomized at boot time https://twitter.com/revskills/status/724625808103493632
"OpenBSD 的邮件列表中有人提出了一种对抗 ROP 的方法: 在启动时随机化 libc 中的符号顺序: https://t.co/eI7D7aRpWh 作者还贴出了实现代码: https://marc.info/?l=openbsd-tech&m=146159002802803&w=2 "
-
[ Mac OS X ] 'KextViewr' (view loaded kernel extensions) updated to version 1.1.0: https://objective-see.com/products/kextviewr.html minor ui & search improvements, bug fixes, etc
"KextViewr 更新 1.1.0 版本, KextViewr 用于查看 OS X 内核加载的所有模块: https://t.co/b0tQOcHRgR "
-
[ MachineLearning ] Leaf - Machine Learning for Hackers : http://autumnai.com/leaf/book/leaf.html
"Leaf - 面向黑客的一个机器学习框架 ︰ https://t.co/qEThHx5juR"
-
[ Malware ] Ransomware-as-a-service + Malicious Insiders = Deadly Threat http://blog.imperva.com/2016/04/ransomware-as-a-service-malicious-insiders-deadly-threat.html
"勒索软件即服务 + 恶意内部人员 = 致命威胁: https://t.co/0H3058OOqU"
-
[ Malware ] The 7ev3n-HONE$T ransomware encrypts and renames your files to R5A http://ow.ly/4n2VJ3
"7ev3n-HONE$T 勒索软件会加密文件,并且重命名为 R5A 扩展: https://t.co/mO3SYEPjii"
-
[ Malware ] MazarBOT Android Malware Distributed via SMS Spoofing Campaign http://feedproxy.google.com/~r/tripwire-state-of-security/~3/E878OeL0DDw/
"MazarBOT Android 恶意软件通过短信欺骗传播: https://t.co/2P0fCoFUFG"
-
[ Malware ] Yeabests[dot]cc malware uses a hidden WMI subscription to constantly re-infect Internet Explorer/Chrome shortcuts http://blog.zemana.com/2016/04/yeabestscc-fileless-browser-hijacker_24.html
"Yeabests.cc 恶意软件利用隐藏的 WMI 订阅持续感染 IE/Chrome 快捷方式: https://t.co/ezyUDBfMot"
-
[ NetworkDevice ] routersploit : The Router Exploitation Framework : https://github.com/reverse-shell/routersploit
"RouterSploit - 路由器漏洞利用框架, Github Repo ︰ https://t.co/jkO7OCQoJJ"
-
[ Others ] Adapting AngularJS Payloads to Exploit Real World Applications http://blog.portswigger.net/2016/04/adapting-angularjs-payloads-to-exploit.html
"调整 AngularJS Payloads, 攻击真实世界的应用(Piwik 和 Uber): https://t.co/NgC46eCntf"
-
[ Others ] Hacking Mattermost: From Unauthenticated to System Admin http://haxx.ml/post/142844845111/hacking-mattermost-from-unauthenticated-to-system
"Hacking Mattermost ︰ 从 Guest 到系统管理员: https://t.co/ghmye1gwJs Mattermost 是一款团队通讯产品, Go 语言开发,是 Slack 的开源替代品"
-
[ Others ] New post - Windows 10 Mobile artifacts (SMS/MMS/Calls/Contacts/Pics/Vids). TLDR = It hasn't changed that much. See http://cheeky4n6monkey.blogspot.com/2016/04/an-initial-peep-at-windows-10-mobile.html
"Windows 10 Mobile(Lumia 435)初探: https://t.co/JAMBEBoqgc"
-
[ Others ] Compiler Construction : http://c9x.me/compile/bib/wirthcc.pdf (pdf)
"构建编译器 ︰ https://t.co/XnHiB9pAcG "
-
[ Tools ] I've built The Oprah Proxy, a Python script which will fetch credentials and list proxies for #Opera #VPN #proxy https://github.com/spaze/oprah-proxy
" Opera 浏览器最新开发版提供的不是真正的 VPN,是个代理,既然是个代理,那就也可以让其他应用使用,这个工具就用于提取那个代理列表: https://t.co/1kG77yMvJ2"
-
[ Tools ] Poor man's ProTip: X's -tst option prevents keystroke injection via XTest http://gareus.org/oss/genxkey Snooping remains http://www.staff.uni-mainz.de/pommeren/DSVorlesung/Material/Xsecurity
"genXKey - 键盘击键事件生成器: https://t.co/WfjfmKdAeq https://t.co/3fTpCSnaCq"
-
[ Web Security ] Drag Drop XSS in Google ;) http://c0rni3sm.blogspot.com/2016/04/drag-drop-xss-in-google.html #bugbounty
"Google Mail 的拖拽 XSS: https://t.co/3bCWiqp4UU "
-
[ Web Security ] 原本丢掉的跨站漏洞 - JavaScript 特性利用 http://linux.im/2016/04/22/javascript_characteristic_utilization_xss.html
"原本丢掉的跨站漏洞 - JavaScript 特性利用 https://t.co/gvnbCfTxkJ"
-
[ Windows ] W32pServiceTable from windows 10 build 14316: http://redplait.blogspot.com/2016/04/w32pservicetable-from-windows-10-build.html
"从 Windows 10 Build 14316 版本导出的 W32pServiceTable : https://t.co/a16SGvBQmN"
-
[ Windows ] Group Policy Hijacking and LDAP Relay. New English docs. Please RT. http://intercepter-ng.blogspot.ru/2016/04/group-policy-hijacking-and-ldap-relay.html #mitm #security #networks #windows #ntlm
"组策略劫持与 LDAP 中继: https://t.co/9dXhbSb2ZM "