腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ APT ] FireEye 发布朝鲜 APT 团队 APT37 (Reaper) 的分析报告: https://www2.fireeye.com/rs/848-DID-242/images/rpt_APT37.pdf
-
[ Browser ] Chrome 平台也开始支持 Progressive Web Apps: https://medium.com/@kennethrohde/progressive-web-apps-coming-to-all-chrome-platforms-80e31272e2a8
-
[ Browser ] Mobile Pwn2Own 2017 V8 ZDI-CAN-5336 漏洞 PoC 公开了: https://bugs.chromium.org/p/chromium/issues/detail?id=780402&desc=2
-
[ Bug Bounty ] Bug Bounty Web 漏洞挖掘的几个小 Tips: https://medium.com/@prateek_0490/bug-bounty-tips-tricks-js-javascript-files-bdde412ea49d
-
[ Crypto ] 利用动态解密、隐式 CFI 的方法实现 JavaScript 的混淆加密: https://marcoramilli.blogspot.com/2018/02/control-flow-integrity-javascript.html
-
[ Hardware ] 英特尔为较新的处理器发布了 Spectre 固件修复程序: https://threatpost.com/intel-issues-updated-spectre-firmware-fixes-for-newer-processors/130025/
-
[ Industry News ] 一波针对财富 500 强公司的垃圾邮件袭来: https://threatpost.com/new-bec-spam-campaign-target-fortune-500-businesses/130012/
-
[ Industry News ] 洛杉矶时报网站被嵌入门罗币挖矿脚本: https://threatpost.com/cryptojacking-attack-found-on-los-angeles-times-website/130041/
-
[ Linux ] Linux ASLR 缓解措施的新绕过方法: http://blog.ptsecurity.com/2018/02/new-bypass-and-protection-techniques.html
-
[ Linux ] Linux 系统调用的过程剖析: https://lwn.net/Articles/604287/https://lwn.net/Articles/604515/
-
[ MalwareAnalysis ] Fortinet 对 Mirai 新变种 OMG 的分析,该变种在 Mirai 的基础上添加了网络代理功能: https://blog.fortinet.com/2018/02/21/omg-mirai-based-bot-turns-iot-devices-into-proxy-servers5a8e05ccc4f85
-
[ Mobile ] 华为发布漏洞公告,修复了 Mobile Pwn2Own 比赛中被使用的漏洞(CVE-2017-15308/CVE-2017-15309/CVE-2017-15310): https://twitter.com/i/web/status/966643689794793477http://www.huawei.com/uk/psirt/security-advisories/huawei-sa-20171120-01-hwreader-en
-
[ Others ] 使用 Facebook Accountkit 黑掉 Tinder 帐户: https://medium.com/appsecure/hacking-tinder-accounts-using-facebook-accountkit-d5cc813340d1
-
[ Popular Software ] CactusVPN for MacOS 本地提权漏洞披露(CVE-2018-7281): https://github.com/VerSprite/research/blob/master/advisories/VS-2018-003.md
-
[ Popular Software ] uTorrent 两个严重远程代码执行漏洞披露: https://threatpost.com/utorrent-users-warned-of-remote-code-execution-vulnerability/130030/
-
[ Popular Software ] npm 5.7.0 之前版本在执行 sudo npm --help 等命令时会随机修改 /etc /usr /boot 等目录的属主权限: https://github.com/npm/npm/issues/19883
-
[ Popular Software ] 远程桌面软件 NoMachine 6.0.66_2 变量未初始化提权漏洞的利用(CVE-2018-6947): https://www.fidusinfosec.com/nomachine-road-code-execution-without-fuzzing-cve-2018-6947/
-
[ SecurityReport ] Kaspersky Lab 发布的报告中指出,2017 年发生将近 2.5 亿次网络钓鱼尝试,比 2016 年多出 9100万起: https://securityintelligence.com/news/nearly-250-million-phishing-attempts-in-2017-study-shows/
-
[ SecurityReport ] Cisco 发布的 annual Cybersecurity Report: https://www.cisco.com/c/dam/m/digital/elq-cmcglobal/witb/acr2018/acr2018final.pdf
-
[ Tools ] drmine - 自动化检测网页是否包含挖矿脚本的工具: https://github.com/1lastBr3ath/drmine
-
[ Tools ] IDA Pro 6.5 版本,特殊构造的文本字符串可以触发 Protocol Handler,可以用来实现代码执行: http://riscy.business/2018/02/ida-remote-execution/
-
[ Tools ] BlackWidow - 基于 Python 实现的 Web 爬虫, 用于收集目标网站的情报信息并对 OWASP 漏洞进行模糊测试: https://github.com/1N3/BlackWidow
-
[ Tools ] Stryker - CPU-Z CVE-2017-15303 漏洞的利用工具,基于该漏洞,这个工具实现 DSE 特性的开关控制、受保护进程劫持、Driver loader: https://github.com/hfiref0x/Stryker
-
[ Tools ] sqlinator - 自动转发 HTTP 请求到 SQLMAP API 以进行 SQLi 和 XSS 漏洞测试的工具: https://github.com/Coalfire-Research/sqlinator
-
[ Tools ] theZoo - 恶意软件收集仓库: https://github.com/ytisf/theZoo
-
[ Virtualization ] Devirtualizing FinSpy 1-4: 1): http://www.msreverseengineering.com/blog/2018/2/21/wsbjxrs1jjw7qi4trk9t3qy6hr7dye 2): http://www.msreverseengineering.com/blog/2018/2/21/devirtualizing-finspy-phase-2-first-attempt-at-devirtualization 3): http://www.msreverseengineering.com/blog/2018/2/21/devirtualizing-finspy-phase-3-fixing-the-function-related-issues 4): http://www.msreverseengineering.com/blog/2018/2/21/devirtualizing-finspy-phase-4-second-attempt-at-devirtualization
-
[ Web Security ] OWASP 发布的一份《Web 应用自动化威胁手册(Automated Threat Handbook)》: https://www.owasp.org/images/3/33/Automated-threat-handbook.pdf
-
[ Web Security ] WebKit 为跨站认证用户提出新的解决方案 - Storage Access API: https://webkit.org/blog/8124/introducing-storage-access-api/
-
[ Windows ] Windows 平台用户态 API 监控与代码注入的检测: https://0x00sec.org/t/userland-api-monitoring-and-code-injection-detection/5565
-
[ Windows ] Windows StorSvc SvcMoveFileInheritSecurity Arbitrary File Security Descriptor Overwrite EoP: https://bugs.chromium.org/p/project-zero/issues/detail?id=1428
-
[ Windows ] 欺骗 LLMNR 请求窃取 Windows NetNTLM Hash: https://isc.sans.edu/diary/rss/23369
-
[ WirelessSecurity ] DIY ARM Debugger for Wi-Fi Chips: https://recon.cx/2018/brussels/resources/slides/RECON-BRX-2018-DIY-ARM-Debugger-for-Wi-Fi-Chips.pdf
-
-
[ ReverseEngineering ] 逆向工程之 Windows Defender 中的 JS 引擎: https://recon.cx/2018/brussels/resources/slides/RECON-BRX-2018-Reverse-Engineering-Windows-Defender-s-JavaScript-Engine.pdf
-
[ ReverseEngineering ] 消失的字节:对 MS Office RTF 解析器的逆向工程: https://securelist.com/disappearing-bytes/84017/
-
[ Tools ] 使用 BloodHound 进行企业安全防御的方法介绍,Part 1: https://posts.specterops.io/introducing-the-adversary-resilience-methodology-part-one-e38e06ffd604