
腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Attack ] #papertweet for #ccs16: "Prefetch Side-Channel Attacks: Bypassing SMAP and Kernel ASLR" https://gruss.cc/files/prefetch.pdf
" 通过 Prefetch 指令侧信道攻击的方式绕过 SMAP 和内核 ASLR: https://t.co/C9FNaQuvlX"
-
[ Browser ] CSP Evaluator and CSP Mitigator available for web app developers https://threatpost.com/new-google-tools-help-devs-improve-content-security-policy-protection/120894/ via @ threatpost
" Google 开发了一款工具,用于帮助开发者评估和缓解 CSP 策略相关的安全问题: https://t.co/BVD7fcd3fY "
-
[ Browser ] Introducing Windows Defender Application Guard for Microsoft Edge https://blogs.windows.com/msedgedev/2016/09/27/application-guard-microsoft-edge/ https://t.co/3XG4nOf9u6
" 微软称 Windows 10 下次重大更新将使用一个轻量级虚拟机隔离环境运行 Edge 浏览器,这项保护特性的名字为 Windows Defender Application Guard: https://t.co/s1Xkmss4IN "
-
[ Browser ] IE/Edge Workers SOP bypass using leaked script errors thanks to base href or importScripts) http://www.brokenbrowser.com/workers-sop-bypass-importscripts-and-basehref/ https://t.co/1kse7COZvJ
"利用泄漏的脚本错误 Bypass IE/Edge Workers SOP: https://t.co/XcXugVuzUV https://t.co/1kse7COZvJ"
-
[ Browser ] ZDI-16-527: Apple Safari HTMLVideoElement Use-After-Free Remote Code Execution Vulnerability http://www.zerodayinitiative.com/advisories/ZDI-16-527/
"ZDI-16-527︰ 苹果 Safari HTMLVideoElement UAF,来自 ZDI 的公告: https://t.co/pg4Ripa9ZT"
-
[ Hardware ] Code signing check is now in place to protect critical firmware of Tesla vehicles https://twitter.com/a_greenberg/status/780762975137361920
"在科恩实验室发现了特斯拉汽车的漏洞之后,特斯拉在固件中增加了代码签名检查特性: https://t.co/q078AHabmo "
-
[ iOS ] Local privilege escalation for OS X 10.11.6 via PEGASUS Write up: https://jaq.alibaba.com/community/art/show?articleid=532 Exp:… https://t.co/r56jxZ99Im
" iOS 冰与火之歌(番外篇) - 基于 PEGASUS(Trident 三叉戟)的 OS X 10.11.6 本地提权: http://jaq.alibaba.com/community/art/show?spm=a313e.7916648.0.0.6DZeUL&articleid=531 代码: https://github.com/zhengmin1989/OS-X-10.11.6-Exp-via-PEGASUS "
-
[ Linux ] Linux Kernel 4.6.3 Netfilter Privilege Escalation https://packetstormsecurity.com/files/138854/netfilter_priv_esc.rb.txt
" Ubuntu 16.04 Linux Kernel 4.6.3 Netfilter 提权 Exploit: https://t.co/vuL61qDM9n"
-
[ Linux ] My notes on Linux kernel security things continues with v4.5: https://outflux.net/blog/archives/2016/09/27/security-things-in-linux-v4-4/
" Linux 内核 4.4 版本的几项保护特性︰ https://t.co/jNrjd6nPHB"
-
[ MachineLearning ] Defeating n-gram Scores for HTTP Attack Detection http://scholarworks.sjsu.edu/cgi/viewcontent.cgi?article=1489&context=etd_projects
" 攻击基于 n-gram 的 HTTP 机器学习攻击检测: https://t.co/ZgknG7geWO "
-
[ Malware ] Threat Spotlight: GozNym http://blog.talosintel.com/2016/09/goznym.html
" Talos Blog 对 GozNym 恶意软件的分析: https://t.co/Rq5ciwkBxL"
-
[ Operating System ] #Include os - From bootloader to REST API with the new C++ - http://www.slideshare.net/IncludeOS/include-ltos-from-bootloader-to-rest-api-with-the-new-c
" #Include os - From bootloader to REST API with the new C++: https://t.co/jgVJnlNepY"
-
[ Others ] Introducing osquery for Windows - https://blog.trailofbits.com/2016/09/27/windows-network-security-now-easier-with-osquery/ - https://www.facebook.com/notes/protect-the-graph/introducing-osquery-for-windows/1775110322729111 nice job @ osquery @ trailofbits
" Facebook 基于 SQL 的检测工具 osquery 开始支持 Windows 了: https://blog.trailofbits.com/2016/09/27/windows-network-security-now-easier-with-osquery/ https://www.facebook.com/notes/protect-the-graph/introducing-osquery-for-windows/1775110322729111 "
-
[ Others ] RETracer: Triaging Crashes by Reverse Execution from Partial Memory Dumps http://softsec.kaist.ac.kr/~sangkilc/papers/cui-icse16.pdf https://t.co/SJZJKhpX2G
" RETracer - 通过反向执行部分内存 Dump 的方法诊断 Crash,常用于 Crash 报告系统,Paper: https://t.co/bCTqxQEKCz "
-
[ Others ] Adobe Flash local-with-filesystem sandbox bypass: end of the love story between Flash and local files http://lab.truel.it/flash-sandbox-bypass/
"Bypass Adobe Flash 的 local-with-filesystem 沙箱,访问本地文件: https://t.co/Wyro1nij1T"
-
[ Others ] malware-jail Sandbox for semi-automatic Javascript malware analysis, deobfuscation & payload extraction https://t.co/udWR2NWMnz
" malware-jail - 半自动的 JavaScript 恶意代码分析沙盒: https://t.co/udWR2NWMnz "
-
[ Others ] Great resource #javadeser Java deserialization portal by @ antyurin via @ Dinosn https://github.com/GrrrDog/Java-Deserialization-Cheat-Sheet [see also… https://t.co/7ObRsANiPb
" Java 反序列化漏洞相关的一份资源列表: https://github.com/GrrrDog/Java-Deserialization-Cheat-Sheet "
-
[ Tools ] dripcap Caffeinated packet analyzer https://dripcap.org/ https://t.co/KAAJX3xhrU
"dripcap 数据包分析工具: https://t.co/nQA0OLQpdw "
-
[ Windows ] Microsoft removed Windows Journal from its OSs due to security flaws http://securityaffairs.co/wordpress/51678/hacking/windows-journal-removal.html
" 由于安全问题太多,微软鼓励用户从 Windows 中删除记事本应用: https://t.co/eabUBVl4Fj "
-
[ Windows ] I am interested in sample code http://PackageNonOfficeFiles.zip published by @ jones206 in https://blogs.msdn.microsoft.com/brian_jones/2009/07/21/embedding-any-file-type-like-pdf-in-an-open-xml-file/ Link is dead. Anyone can help?
" 在 Open XML 文件中嵌入任何文件类型,比如在 Word 中嵌入 PDF: https://t.co/8jbEZCUO97 "
-
[ Android ] TaintART -通过修改编译器(dex2oat)来实现数据流分析的系统: http://securitygossip.com/blog/2016/09/27/2016-09-27/