腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Browser ] Microsoft Edge: ACG bypass using UnmapViewOfFile: https://bugs.chromium.org/p/project-zero/issues/detail?id=1435
-
[ Bug Bounty ] Google Service Management 服务 7.5K Bounty 奖金漏洞的分析: https://sites.google.com/site/testsitehacking/-7-5k-Google-services-mix-up
-
[ Conference ] BAR2018 paper 下载: http://ruoyuwang.me/files/BAR_2018_papers_without_DOI.7z
-
[ Industry News ] 加密货币的挖矿团队开始考虑攻击不安全部署的 Docker 容器挖矿: https://blog.aquasec.com/cryptocurrency-miners-abusing-containers-anatomy-of-an-attempted-attack
-
[ Linux ] Digging passwords in Linux swap: http://blog.sevagas.com/?Digging-passwords-in-Linux-swap
-
[ Linux ] 使用 hashcat 暴力破解 Linux 全盘加密(LUKS): https://blog.pnb.io/2018/02/bruteforcing-linux-full-disk-encryption.html
-
[ macOS ] 利用 CGDisplayCreateImage 和 OCR 绕过 MacOS 应用沙盒: https://malwaresec.github.io/RogueApp.html
-
[ Others ] 通过指定父进程的方式获得 SYSTEM 权限: https://decoder.cloud/2018/02/02/getting-system/ GitHub: https://github.com/decoder-it/psgetsystem
-
[ Pentest ] 使用 InternetExplorer.Application COM 对象进行横向渗透: https://homjxi0e.wordpress.com/2018/02/15/lateral-movement-using-internetexplorer-application-object-com/
-
[ Programming ] Windows on ARM 汇编语言手册: http://codemachine.com/article_armasm.html
-
[ Tools ] PcapXray - 网络取证工具,用于可视化展示网络通信详情: https://github.com/Srinivas11789/PcapXray
-
[ Tools ] Parat - Python 实现的远程控制工具: https://github.com/micle-fm/Parat
-
[ Windows ] PE 内存注入技术详解: http://blog.sevagas.com/?PE-injection-explained