
腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Android ] Suhide updated to bypass SafetyNet update - http://forum.xda-developers.com/showpost.php?p=69021494&postcount=1592 https://t.co/vv8wEvo9Sl
"Suhide 工具更新,增加对 SafetyNet 检测的绕过: https://t.co/XIsqtFrXxw https://t.co/vv8wEvo9Sl"
-
[ Android ] Qark - Android app (apk) static code analyzer. via @ sempf https://github.com/linkedin/qark
" Qark - LinkedIn 开源的一个 Android APK 静态代码分析工具: https://t.co/P9g8CHAQ0M"
-
[ Attack ] Atlassian HipChat Secret Key Disclosure https://cxsecurity.com/issue/WLB-2016100066
"Atlassian HipChat 的密钥泄漏: https://t.co/Ftgv3iflAy"
-
[ Attack ] Be #CyberAware! The top targeted #malware families in EMEA are Runback, DarkHotel & SCANBOX https://www2.fireeye.com/ATR-Cyberaware-EMEA_SM.html?utm_source=TWC&utm_campaign=cyberaware https://t.co/8j7g9qzHYh
" 来自 FireEye 的 APT 报告《那些遭到 APT 攻击的政府部门》: https://www2.fireeye.com/ATR-Cyberaware-EMEA_SM.html "
-
[ Browser ] Blogged! XSS小ネタです。 / XSS via Referrer After Anniversary Update http://masatokinugawa.l0.cm/2016/10/referrer-xss-win10.html (日本語) http://mksben.l0.cm/2016/10/xss-via-referrer.html (English)
" 基于 Referer 的 XSS: https://t.co/Qp8d3B2oWg "
-
[ IoTDevice ] Slides of my presentation at #VB2016 are available: https://www.virusbulletin.com/uploads/pdf/conference_slides/2016/Apvrille-vb-2016-mobileiot.pdf #IoT #smartwatch #toothbrush enjoy!
" 移动应用 - IoT 的后门,来自 VB2016 会议︰ https://t.co/gzknRE6LoB "
-
[ Linux ] Here are the slides from my #linuxcon eu talk on Linux Kernel Security - http://namei.org/presentations/linux_kernel_security_linuxconeu2016.pdf
" LinuxCon 峰会上一篇关于 Linux 内核安全的演讲: https://t.co/BlMNSzcBjb"
-
[ MachineLearning ] Graph-powered Machine Learning at Google https://research.googleblog.com/2016/10/graph-powered-machine-learning-at-google.html
" Google 基于图的机器学习: https://t.co/FwwzYlcnFj "
-
[ macOS ] Slides from my @virusbtn talk "Getting Duped: Piggybacking on Webcam Streams for Surreptitious Recordings" https://t.co/W21ihApPgi #VB2016
" macOS 上的恶意软件是如何实现偷摸地录制视频的,来自 VB2016 会议: https://t.co/W21ihApPgi "
-
[ Malware ] Slides from my presentation at #VB2016 - "Challenges and approaches of cracking #ransomware": https://drive.google.com/file/d/0Bzb5kQFOXkiSODBsZENxYmJ5WWs/view //cc @ virusbtn
" 勒索软件破解的挑战与方法,来自 VB2016 会议︰ https://t.co/nPDy8n0HNn "
-
[ Malware ] Web-Based Keylogger Used to Steal Credit Card Data from Popular Sites https://threatpost.com/web-based-keylogger-used-to-steal-credit-card-data-from-popular-sites/121141/
"基于 Web 的 Keylogger,专门盗取用户的信用卡数据,来自 ThreatPost 的报道: https://t.co/usrHLAJpcI"
-
[ Others ] Building a mini assembler with JavaScript : http://embeddednodejs.com/compiler/
" 用 JavaScript 写的一个迷你汇编器︰ https://t.co/HLPJbitCf3"
-
[ Others ] New post is out: The story of EV-SSL, AWS and trailing dot domains https://labs.detectify.com/2016/10/05/the-story-of-ev-ssl-aws-and-trailing-dot-domains/
" EV-SSL、AWS 和尾点域名的故事: https://t.co/gImYBtR6s2 "
-
[ Others ] Our #vb2016 slides (including demo videos) are now available at https://www.virusbulletin.com/uploads/pdf/conference_slides/2016/Ancel_Talbi-vb-2016-debug-with-haka.pdf cc @ benkow_
" 基于 HAKA 的 C&C 流量监控与调试,来自 VB2016 会议: https://t.co/xcUwb7kNuV "
-
[ Others ] Quite interesting preso (and probably #VB2016 talk) on Nymaim malware: https://lokalhost.pl/talks/vb2016/ https://t.co/IXwFXsNFyx
" VB2016 会议上一篇对 Nymaim 恶意软件分析的演讲︰ https://t.co/NN20tOYsn7 "
-
[ ReverseEngineering ] bypassing the (not so) Secure Boot to dump the BootROM (Amlogic S905 SoC) : http://www.fredericb.info/2016/10/amlogic-s905-soc-bypassing-not-so.html
"Bypass Amlogic S905 SoC 的安全启动保护,Dump BootROM: https://t.co/cG0Ots9RAE"
-
[ SCADA ] Industrial Control Systems 2016 Report: Connected and Vulnerable http://blog.ptsecurity.com/2016/10/industrial-control-systems-2016-report.html
" PTSecurity 发布的《2016 工控系统安全研究报告》: https://www.ptsecurity.com/upload/iblock/6bd/ics_vulnerability_2016_eng.pdf"
-
[ Tools ] Grab the code for PEAS on Github to access internal file shares via Exchange ActiveSync! https://github.com/mwrlabs/peas
" Peas - MWR Labs 新开源的一个工具,用于在 ActiveSync 服务器上执行命令的工具: https://t.co/bCq6MPITSX 关于这个工具的介绍: https://labs.mwrinfosecurity.com/blog/accessing-internal-fileshares-through-exchange-activesync "
-
[ Tools ] an IDAPython script to take screenshots of [large] IDA graphs in full resolution https://github.com/tmr232/GraphGrabber by @ tmr232
" GraphGrabber - 提供 IDA 全分辨率截图功能的 IDAPython 脚本: https://t.co/77OIrnpEmM"
-
[ Windows ] New post is up: https://www.proofpoint.com/us/threat-insight/post/windows-troubleshooting-platform-leveraged-deliver-malware Windows Troubleshooting Platform used to deliver LatentBot. https://t.co/VZZe9TZOaD
" Windows 疑难解答平台被用于传播恶意软件,来自 ProofPoint: https://t.co/xwrGwUt9ut "
-
[ WirelessSecurity ] Snagging Active Directory credentials over WiFi (Part 1) : https://zone13.io/post/Snagging-credentials-over-WiFi-Part1/
" 利用 WiFi 盗取活动目录(Active Directory)的认证凭据信息 Part 1︰ https://t.co/nHzCiJ8kxJ"