腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Android ] Bypassing Android’s Network Security Configuration: https://www.nccgroup.trust/uk/about-us/newsroom-and-events/blogs/2017/november/bypassing-androids-network-security-configuration/
-
[ Industry News ] GooglePlay 应用市场上一款假 WhatsAPP 下载量达到了 100 万,而这款假 WhatsAPP 的作者与真实作者只差一个 Unicode 空格: https://twitter.com/virqdroid/status/926437790140772362 https://www.reddit.com/r/Android/comments/7ahujw/psa_two_different_developers_under_the_same_name/
-
-
-
[ Network ] 《Your State is Not Mine: A Closer Look at Evading Stateful Internet Censorship》,通过破坏某特殊中间设备的 TCB(TCP Control Block) 的方式来 Bypass 该设备的 TCP reset attack。Paper: http://www.cs.ucr.edu/~krish/imc17.pdf https://github.com/seclab-ucr/INTANG
-
[ Others ] 企业中常用的自签名证书相关的安全性问题: https://securingtomorrow.mcafee.com/mcafee-labs/self-signed-certificates-secure-so-why-ban/
-
[ SecurityReport ] 卡巴斯基 2017 第3季度垃圾邮件与网络钓鱼分析报告: https://securelist.com/spam-and-phishing-in-q3-2017/82901/
-
[ Tools ] DriverMon - 监控驱动活动的工具,最近更新的版本可以记录 DeviceIoControl 和 IRP Data: https://github.com/zodiacon/DriverMon/releases/tag/0.2-alpha
-
[ Tools ] MachOExplorer,与 MachOView 类似,用于可视化查看 MachO 文件结构细节的工具: https://github.com/everettjf/MachOExplorer
-
[ Vulnerability ] Avaya OfficeScan IPO 远程缓冲区溢出(CVE-2017-12969): http://seclists.org/fulldisclosure/2017/Nov/18?utm_source=feedburner&utm_medium=twitter&utm_campaign=Feed%3A+seclists%2FFullDisclosure+%28Full+Disclosure%29
-
[ Web Security ] blockchain.info 中的 CRLF injection: http://blog.shashank.co/2017/11/crlf-injection-in-bockchaininfo.html
-
[ Windows ] Application Introspection & Hooking With Frida: http://www.fuzzysecurity.com/tutorials/29.html
-
[ Windows ] 利用 BDF 向 EXE 和 DLL 文件植入后门: https://3gstudent.github.io/3gstudent.github.io/%E5%88%A9%E7%94%A8BDF%E5%90%91EXE%E6%96%87%E4%BB%B6%E6%A4%8D%E5%85%A5%E5%90%8E%E9%97%A8/ https://3gstudent.github.io/3gstudent.github.io/%E5%88%A9%E7%94%A8BDF%E5%90%91DLL%E6%96%87%E4%BB%B6%E6%A4%8D%E5%85%A5%E5%90%8E%E9%97%A8/
-
[ Windows ] 编写管道服务端(Named Pipe Server)时,一个必须要考虑的问题就是占坑攻击(squatting)。除了用标志位 FILE_FLAG_FIRST_PIPE_INSTANCE 的方法解决外,最近 Windows 新引入了 Named Pipe Secure Prefixes: https://tyranidslair.blogspot.com/2017/11/named-pipe-secure-prefixes.html