
腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Industry News ] 谷歌修复了安卓中的 KRACK 漏洞: https://threatpost.com/google-patches-krack-vulnerability-in-android/128818/
-
[ Malware ] Windows 平台多个 Crypter 恶意软件样本的收集: https://github.com/malwares/Crypter
-
[ MalwareAnalysis ] Paloalto 研究员发现 OilRig 团伙在最近的攻击中使用了一款名为 "ALMA Communicator" 的 基于 DNS Tunneling 的木马: https://researchcenter.paloaltonetworks.com/2017/11/unit42-oilrig-deploys-alma-communicator-dns-tunneling-trojan/
-
[ MalwareAnalysis ] 基于混沌密码算法的硬件木马检测技术(Paper): https://www.degruyter.com/downloadpdf/j/bpasts.2017.65.issue-5/bpasts-2017-0078/bpasts-2017-0078.pdf
-
[ MalwareAnalysis ] 在 Google Play Store 中发现几款加密货币挖矿 APP: https://www.ixiacom.com/company/blog/everythings-better-blockchain
-
[ Others ] Automated Detection, Exploitation, and Elimination of Double-Fetch Bugs using Modern CPU Features(paper): https://arxiv.org/pdf/1711.01254.pdf
-
[ Tools ] Striker - 信息收集与漏洞扫描工具: https://github.com/UltimateHackers/Striker
-
[ Vulnerability ] 昨天推送了一条 "以太区块链平台(Ethereum )的 Bug 造成 2.8 亿美金被冻结" 的消息。今天有另一位研究员写了一篇 Blog,分析该 Bug 的成因以及如何检测类似的问题: https://hackernoon.com/what-caused-the-latest-100-million-ethereum-bug-and-a-detection-tool-for-similar-bugs-7b80f8ab7279 https://threatpost.com/hundreds-of-millions-in-digital-currency-remains-frozen/128821/
-
[ Vulnerability ] 滥用某服务器的[付款声明保存成 PDF 下载]功能,在动态生成的 PDF 中找到 XSS 漏洞实现服务器本地文件任意读: http://www.noob.ninja/2017/11/local-file-read-via-xss-in-dynamically.html
-
[ Vulnerability ] Shopware 5.3.3: PHP 任意对象实例化漏洞进一步利用转换为 Blind XXE 漏洞: https://blog.ripstech.com/2017/shopware-php-object-instantiation-to-blind-xxe/
-
[ Windows ] 劫持 Windows 系统数字签名的 PowerShell 脚本: https://pentestlab.blog/2017/11/08/hijack-digital-signatures-powershell-script/
-
[ Windows ] 利用 FwCplLua COM 接口和 mscfile 注册表键劫持的方法 Bypass UAC,来自 hfiref0x 分享的 PoC 代码: https://gist.github.com/hfiref0x/a044cb0ad425488e38556408b179cb61
-
[ Browser ] console.log 不是 JavaScript 调试器,Firefox Devtools Playground 才是,来自 Mozilla Blog: https://hacks.mozilla.org/2017/11/go-beyond-console-log-with-the-firefox-debugger/
-
-
[ Malware ] IBM X-Force 研究团队监测到一款利用 AutoIt 脚本 Bypass 杀毒软件的远控(RAT)样本: https://securityintelligence.com/overlay-rat-malware-uses-autoit-scripting-to-bypass-antivirus-detection/
-
-
-
-
-
[ MalwareAnalysis ] 针对 DarkVNC 攻击链的简单分析:https://reaqta.com/2017/11/short-journey-darkvnc/
-
-
[ Pentest ] 通过像素颜色值编码数据以实现渗透测试中的数据回传: https://www.pentestpartners.com/security-blog/exfiltration-by-encoding-data-in-pixel-colour-values/
-
[ Tools ] SSRF-Testing - SSRF 漏洞测试资源整合:https://github.com/cujanovic/SSRF-Testing/
-
[ Web Security ] auth.uber.com 网站的 DOM XSS 漏洞分析:http://stamone-bug-bounty.blogspot.com.es/2017/10/dom-xss-auth_14.html
-
[ Windows ] Windows 10 NtUserDefSetText() 如果设置 ansi 标志位不正确会导致 Crash: https://gist.github.com/taviso/9e673add738de0da6534cbd20e705d3b
-