
腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Conference ] 10 月份举办的 Ruxcon 2017 会议的 PPT 公开了: https://ruxcon.org.au/slides/
-
[ Tools ] Azeria Labs 分享的用于学习 ARM 二进制逆向和漏洞利用的虚拟机: https://azeria-labs.com/arm-lab-vm/
-
[ Tools ] Tiny-URL-Fuzzer - 台湾研究员 Orange Tsai 开源的一款 URL Fuzzer,之前他在 BlackHat 会议分享了一个相关的议题: https://github.com/orangetw/Tiny-URL-Fuzzer
-
[ Vulnerability ] Polycom HDX 远程视频会议设备的 RCE 漏洞分析: https://staaldraad.github.io/2017/11/12/polycom-hdx-rce/
-
[ Android ] ANDROID勒索软件黑产研究 ——恶意软件一键生成器: http://blogs.360.cn/360mobile/2017/11/10/analysis_of_mobile_malware_factories/
-
-
-
[ Industry News ] 美国国土安全部承认曾远程 hack 了一架波音 757:https://www.csoonline.com/article/3236721/security/homeland-security-team-remotely-hacked-a-boeing-757.html
-
-
[ Linux ] 利用 Linux 内核 3.9 版本新引入的 SO_REUSEPORT socket 选项可以实现进程的无缝更新: https://twitter.com/i/web/status/929186475232649217 https://speakerdeck.com/joewalnes/linux-port-sharding
-
[ Malware ] 利用合法工具来隐藏恶意代码: https://securelist.com/using-legitimate-tools-to-hide-malicious-code/83074/
-
-
[ Malware ] NotPetya still roils company's finances, costing organizations $1.2 billion in revenue: https://www.cybereason.com/blog/notpetya-costs-companies-1.2-billion-in-revenue
-
[ MalwareAnalysis ] EXPENSIVEWALL家族变种再现GOOGLE PLAY: http://blogs.360.cn/360mobile/2017/11/10/analysis_of_expensivewall/
-
[ SecurityReport ] 卡巴斯基 2017 年第三季度 IT威胁演变报告: https://securelist.com/it-threat-evolution-q3-2017/83076/ 数据: https://securelist.com/it-threat-evolution-q3-2017-statistics/83131/
-
-
-
[ Tools ] 使用 LLVM 编译 Android userspace 和 Linux kernel (Video): https://www.youtube.com/watch?v=6l4DtR5exwo
-
[ Tools ] pwnjs - Theori 团队开源了一个用于辅助浏览器漏洞利用的 JavaScript lib 套件,为浏览器 Exploit 编写提供模板,譬如辅助实现导入函数的解析: https://github.com/theori-io/pwnjs
-
[ Vulnerability ] Java/Python 在处理 FTP URL 时存在注入漏洞,最近这个漏洞被修复了,所以作者公开了 Exploit PoC: http://blog.blindspotsecurity.com/2017/02/advisory-javapython-ftp-injections.html https://github.com/ecbftw/poc/blob/master/java-python-ftp-injection/ftp-injection-server.py
-
-
-
-
-
[ Web Security ] Passive Fingerprinting of HTTP/2 Clients: https://www.akamai.com/uk/en/multimedia/documents/white-paper/passive-fingerprinting-of-http2-clients-white-paper.pdf