腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Android ] 3 月份的 Android 漏洞补丁修复了一个可以通过耳机触发的 Nexus 9 漏洞(CVE-2017-0510)。作者研究之后发现补丁依然可以绕过(CVE-2017-0648),该漏洞在本月已经修复: https://alephsecurity.com/2017/06/13/nexus9-ephemeral-fiq/
-
[ Browser ] Internet Explorer add-on Installer 沙箱逃逸漏洞的利用(CVE-2015-1743): http://thomas-vanhoutte.blogspot.be/2017/06/one-of-my-first-sandbox-escapes-and-bugs.html
-
[ Browser ] 本月 Firefox 54 修复的 CVE-2017-7762: Addressbar spoofing in Reader mode 漏洞的 PoC: https://twitter.com/shhnjk/status/874712568824299522
-
[ Detect ] 在内存中检测恶意软件: https://www.endgame.com/blog/technical-blog/hunting-memory
-
[ Detect ] 使用 Sysmon 与 Splunk 进行高级事件检测与威胁捕获: http://security-research.dyndns.org/pub/slides/FIRST2017/FIRST-2017_Tom-Ueltschi_Sysmon_FINAL.pdf
-
[ Industry News ] 微软将在今年秋季的 Windows 10 RS3 中开始禁用 SMBv1 文件共享协议: https://www.bleepingcomputer.com/news/microsoft/microsoft-to-disable-smbv1-in-windows-starting-this-fall/
-
[ Linux ] 在 Kali Linux 下使用 mingw 编译 Windows 漏洞利用程序: http://www.hackingtutorials.org/exploit-tutorials/mingw-w64-how-to-compile-windows-exploits-on-kali-linux/
-
[ Malware ] 借助 Apache mod_rewrite,钓鱼站可以实现随机返回 Payloads: https://bluescreenofjeff.com/2017-06-13-serving-random-payloads-with-apache-mod_rewrite/
-
[ Malware ] Xavier - 趋势科技最近检测到一款会泄露用户信息的第三方木马广告库: http://blog.trendmicro.com/trendlabs-security-intelligence/analyzing-xavier-information-stealing-ad-library-android/
-
[ MalwareAnalysis ] 恶意软件反调试分析的对抗 - Anti-Anti-Analysis: http://resources.infosecinstitute.com/bypassing-malware-anti-analysis-techniques/
-
[ Operating System ] Tails 3.0 版本发布,同时发布了多个安全补丁: https://tails.boum.org/news/version_3.0/index.en.html
-
[ Others ] 针对 RSA Emergency Access Tokencode 的测试与研究: https://t.co/60wG4pjd3Q
-
[ Others ] 如何利用 WHID Injector 将一个新鼠标改装成恶意 HID 设备: http://securityaffairs.co/wordpress/60019/hacking/weaponize-mouse-whid-injector-fun-w00t.html
-
[ Others ] 编写兼容 base64 和纯字母数字的 Shellcode: https://blog.skullsecurity.org/2017/solving-b-64-b-tuff-writing-base64-and-alphanumeric-shellcode
-
[ SecurityReport ] 微软发布 6 月份的漏洞补丁公告,本月共修复了 92 漏洞,其中 17 个为高危级别。另外,其中有两个已经被用于实际攻击中,包括 LNK 的 RCE(CVE-2017-8464) 和 Windows 搜索服务的 RCE(CVE-2017-8543): https://portal.msrc.microsoft.com/en-US/security-guidance http://blog.talosintelligence.com/2017/06/ms-tuesday.html https://threatpost.com/microsoft-patches-two-critical-vulnerabilities-under-attack/126239/ 漏洞致谢信息: https://portal.msrc.microsoft.com/en-us/security-guidance/acknowledgments
-
[ SecurityReport ] Mozilla 发布 Firefox 54 版本,本次更新修复的漏洞列表: https://www.mozilla.org/en-US/security/advisories/mfsa2017-15/
-
[ SecurityReport ] Adobe 今天也发布了 6 月份的漏洞补丁公告,共修复了涵盖 4 个产品的 21 个漏洞,其中包括 Flash 的 9 个漏洞: https://threatpost.com/adobe-fixes-21-critical-vulnerabilities-with-june-patch-tuesday-update/126230/
-
[ SecurityReport ] 本月微软修复了几个 Device Guard Bypass 的漏洞: 1) https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2017-0215 2) https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2017-0216 3) https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2017-0218 4) https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2017-0219
-
[ SecurityReport ] 微软在本月的更新中,再次例外地推送了 Windows XP 的补丁,用于修复 WannaCry 勒索软件所用的 SMB 漏洞(MS17-010): https://blogs.technet.microsoft.com/msrc/2017/06/13/june-2017-security-update-release/ https://threatpost.com/risk-of-destructive-cyber-attacks-prompts-microsoft-to-update-xp-again/126235/
-
[ Tools ] EFI Swiss Knife - 研究员 fG 写了一个用于辅助 IDA UEFI 逆向的插件: https://reverse.put.as/2017/06/13/efi-swiss-knife-an-ida-plugin-to-improve-uefi-reversing/
-
[ Tools ] ground-control: 调试 SSRF / BLIND XSS / XXE 漏洞的脚本收集: https://t.co/mzBa7UAqgO
-
[ Tools ] WordSteal - 用于构造窃取远程机器 NetNTLM Hash 的 Word 文件的脚本: https://t.co/HoVYrXmLZm
-
[ Windows ] 利用 IEExec 实现 AppLocker Bypass: https://pentestlab.blog/2017/06/13/applocker-bypass-ieexec/
-
[ Industry News ] 微软本月的补丁更新中,开始封杀一款流氓软件捆绑器 - Xiazai,Xiazai 会捆绑安装第三方软件、强制绑定主页,看它的界面和来源,可能来自国内: https://blogs.technet.microsoft.com/mmpc/2017/06/13/msrt-june-2017-removing-sneaky-xiazai/
-
[ Linux ] Linux sudo漏洞(CVE-2017-1000367)复现和利用思路分析,来自 FreeBuf: http://www.freebuf.com/articles/system/136975.html
-
-
-
[ Windows ] 自动化挖掘 windows 内核信息泄漏漏洞,来自 IceSword Lab: http://www.iceswordlab.com/2017/06/14/Automatically-Discovering-Windows-Kernel-Information-Leak-Vulnerabilities_zh/
-
[ Windows ] 利用 Windows Defender 实现 SYSTEM 权限的任意文件删除能力: https://github.com/SandboxEscaper/Def/blob/master/README.md
-
[ Windows ] 利用 Sysinternals ProcDump 收集内核 Dump 数据(无需 Reboot): https://channel9.msdn.com/Shows/Defrag-Tools/Defrag-Tools-178-Sysinternals-ProcDump-v90