
腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Android ] Exploiting Android S-Boot: Getting Arbitrary Code Execution in the Samsung Bootloader (part 1) http://hexdetective.blogspot.com/2017/02/exploiting-android-s-boot-getting.html
"攻击 Android Secure Bootloader ︰ 在 Samsung Bootloader 上获取任意代码执行(part 1 ): https://t.co/NwvsCq9eos"
-
[ IoTDevice ] MMD-0062-207 | Credential Harvesting by SSH Direct TCP Forward Attack via IoT Botnet http://blog.malwaremustdie.org/2017/02/mmd-0062-2017-ssh-direct-tcp-forward-attack.html
"Credential Harvesting by SSH Direct TCP Forward Attack via IoT Botnet : https://t.co/6LpwIIyLaI "
-
[ macOS ] Two new Mac backdoors discovered https://blog.malwarebytes.com/cybercrime/2017/03/two-new-mac-backdoors-discovered/
"两种新 Mac 后门被发现: https://t.co/WW7qST1RHU"
-
[ MalwareAnalysis ] A technical analysis of a recent Gootkit upgrade, researched by Gadi O. https://securityintelligence.com/gootkit-developers-dress-it-up-with-web-traffic-proxy/
"针对近期 GootKit 银行木马的分析: https://t.co/q4vIIf87mM"
-
[ MalwareAnalysis ] Discover how the Spora ransomware infects ‘offline’—without talking to the control server: http://intel.ly/2mDeHcM https://t.co/0B0KZNd8Z0
"研究发现 Spora 勒索软件能影响离线计算机,可不与控制服务器通信︰ https://t.co/6cMtlExidH https://t.co/0B0KZNd8Z0"
-
[ Others ] Offensive Tools and Techniques http://countuponsecurity.com/2017/02/26/offensive-tools-and-techniques https://t.co/wdO1ViSHqf
"Offensive Tools and Techniques: https://t.co/4EQp9HuJvG"
-
[ Pentest ] RSA Asymmetric Polymorphic Shellcode : https://www.exploit-db.com/docs/41469.pdf (pdf)
"利用 RSA 非对称算法加密 shellcode︰ https://t.co/lvJzc05iKo "
-
[ Popular Software ] Million-plus @ WordPress sites exposed by vulnerable plugin - http://bit.ly/2lWmfrp
"拥有上百万用户的 WordPress 插件 NextGEN Gallery 已将其 SQL 注入漏洞修复 : https://t.co/eaCnTQjMNy"
-
[ SecurityReport ] Mobile Malware Evolution in 2016 #GooglePlay #Ransomware #Banking #Trojans https://securelist.com/analysis/kaspersky-security-bulletin/77681/mobile-malware-evolution-2016/ https://t.co/sOqVkZYKHS
" 2016 年移动恶意软件的演化: https://securelist.com/files/2017/02/Mobile_report_2016.pdf"
-
[ Tools ] Achievement unlocked. My Dirbuster smarter replacement tool is now in the Burp Suite Store! CC: @Burp_Suite… https://t.co/onHyfgwPae
"BurpSmartBuster -- 用于收集与发现文件,目录和后缀的Burpsuite插件: https://github.com/pathetiq/BurpSmartBuster"
-
[ Tools ] A modern, browser-based frontend to gdb (gnu debugger). https://github.com/cs01/gdbgui/
"gdbgui -- 基于浏览器前端的 GDB: https://t.co/0djghcXokZ"
-
[ Tools ] httplab : An interactive web server : https://github.com/gchaincl/httplab , Demo : https://asciinema.org/a/c613qjyikodunp72ox54irn2j
"httplab -- 一个交互式 Web 服务器,可检查 HTTP 请求与响应伪造︰ https://t.co/jfF6W7giEn"
-
[ Tools ] HiBeaver is an android plugin for modifying your library jars byte code. https://github.com/BryanSharp/hibeaver
"HiBeaver -- 一个用于修改库文件字节码的 android 插件 : https://t.co/wgNYWK433U"
-
[ Tools ] My Sysmon Threat Intelligence Dashboard for Graylog Available for Download: https://github.com/ion-storm/sysmon-config https://t.co/KfJUX9zTn3
"sysmon-config -- Sysmon 威胁情报配置模版,︰ https://t.co/M5yEr4LMMo"
-
[ Vulnerability ] Breaking Google’s ReCaptcha v2 : https://east-ee.com/2017/02/28/rebreakcaptcha-breaking-googles-recaptcha-v2-using-google/ ,Github : https://github.com/eastee/rebreakcaptcha
"利用 ReBreakCaptcha 绕过 Google ReCaptcha v2 : https://t.co/7uTr4mJ6DD,Github: https://t.co/k0J4PVVPhg"
-
[ Vulnerability ] VBulletin Issue Leaks Almost a Million Accounts From Various Forums http://bestsecuritysearch.com/vbulletin-issue-leaks-almost-a-million-accounts-from-various-forums/
"旧版 VBulletin 被利用,近 82 万用户数据遭泄露 : https://t.co/STXmIV1o6h"
-
[ Vulnerability ] [Technical Advisory] @ rapid7’s Nexpose Hard‐coded Java Key Store Passphrase Allows Decryption of Stored Credentials https://www.nccgroup.trust/us/about-us/newsroom-and-events/blog/2017/march/technical-advisory-nexpose-hardcoded-java-key-store-passphrase-allows-decryption-of-stored-credentials/?Year=2017
"Rapid7 四款产品共存在 8 个漏洞,漏洞详情: https://community.rapid7.com/community/infosec/blog/2017/03/01/multiple-vulnerabilities-affecting-four-rapid7-products"
-
[ Vulnerability ] RCE, Auth bypass etc in Veritas / Symantec NetBackup 6.x, 7.x, 8.x: http://seclists.org/fulldisclosure/2017/Feb/101 #attackercommunity
"Veritas NetBackup v6.x, v7.x, v8.0 和 NetBackup appliances v2.x, v3.0 存在多个严重漏洞︰ https://t.co/Puyrk3AciY "
-
[ Web Security ] Hacking Slack using postMessage and WebSocket-reconnect to steal your precious token : https://labs.detectify.com/2017/02/28/hacking-slack-using-postmessage-and-websocket-reconnect-to-steal-your-precious-token/ cc… https://twitter.com/i/web/status/836779481532616704
"利用 postMessage 和 WebSocket 重连窃取 Slack 的 token︰ https://t.co/xy4EqQeMiU "
-
[ Windows ] Curated list of Security Hardening techniques for Windows. https://github.com/PaulSec/awesome-windows-domain-hardening
"awesome windows domain hardening: Windows Domain 安全加固策略表: https://t.co/eK71zpbKLL"
-
[ SecurityReport ] 软件定义安全白皮书PPT解读: http://blog.nsfocus.net/software-definition-security-white-paper-ppt/
-
[ Web Security ] OWASP 发布的 XSS Filter 逃逸手册,每种方法都附有示例代码: https://www.owasp.org/index.php/XSS_Filter_Evasion_Cheat_Sheet