腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Android ] 解决 Android 自定义权限的困境,Slides: http://soterisdemetriou.com/blog/wp-content/uploads/2018/02/ndss2018_release_slides.pdf Paper: http://seclab.illinois.edu/wp-content/uploads/2017/12/tuncay2018resolving.pdf
-
[ Challenges ] H1-202 CTF - Writeup: https://pwning.re/2018/02/23/h1-202-writeup/
-
[ Conference ] lpeworkshop - Windows / Linux 本地提权 Workshop: https://github.com/sagishahar/lpeworkshop
-
[ Industry News ] Drupal 修复两个严重漏洞,一个评论越权访问,一个 XSS: http://blog.talosintelligence.com/2018/02/vulnerability-spotlight-adobe-acrobat.html
-
[ iOS ] 基于麒麟(QiLin)套件,自己制作越狱工具: http://exceptionlevelone.blogspot.com/2018/02/creating-your-own-ios-1112-jailbreak.html
-
[ MachineLearning ] 修改一个像素,迫使深度神经网络得出错误的图片分类结果,这个 Repo 是 "One pixel attack for fooling deep neural networks" Paper 的代码实现: https://github.com/Hyperparticle/one-pixel-attack-keras
-
[ MalwareAnalysis ] 中国的 drive-by 下载攻击活动用于传播 Avzhan DDoS 木马: https://blog.malwarebytes.com/threat-analysis/2018/02/avzhan-ddos-bot-dropped-by-chinese-drive-by-attack/
-
[ MalwareAnalysis ] OilRig 团伙使用 ThreeDollars 恶意文档分销新型木马 OopsIE: https://researchcenter.paloaltonetworks.com/2018/02/unit42-oopsie-oilrig-uses-threedollars-deliver-new-trojan/
-
[ MalwareAnalysis ] Satori 僵尸网络感染分析: https://401trg.pw/analysis-of-active-satori-botnet-infections/
-
[ MalwareAnalysis ] Malwarebytes 对中国网站上 Drive-by 下载攻击活动的分析: https://blog.malwarebytes.com/threat-analysis/2018/02/chinese-criminal-experiments-with-exploits-in-drive-by-download-campaign/
-
[ Pentest ] 如何辨别可用于 Domain-Front 攻击的 CloudFront 域名: https://www.peew.pw/blog/2018/2/22/how-i-identified-93k-domain-frontable-cloudfront-domains
-
[ Popular Software ] Drupal 修复两个严重漏洞,一个评论越权访问,另一个 XSS: https://threatpost.com/drupal-patches-critical-bug-that-leaves-platform-open-to-xss-attack/130070/
-
[ Popular Software ] Hacking 成人应用 SinVR,获得免费的内容: https://www.digitalinterruption.com/single-post/2018/02/22/Hacking-SinVR-for-fun-and-profit-and-free-adult-content
-
[ Tools ] AutoRepeater - 自动化进行 HTTP 重放测试的 BurpSuite 插件: https://www.nccgroup.trust/us/our-research/AutoRepeater-Automated-HTTP-Request-Repeating-With-Burp-Suite/?research=Public+tools
-
[ Tools ] Mill - 一款 Scala 构建工具: http://www.lihaoyi.com/post/MillBetterScalaBuilds.html
-
[ Windows ] Windows 主机中使用自带工具 Netsh 实现端口转发: http://woshub.com/port-forwarding-in-windows/
-
[ Windows ] 从 Windows 10 TH2 版本开始,NTDLL 的系统调用指令开始支持使用 SYSCALL 指令陷入内核态: http://blog.amossys.fr/windows10_TH2_int2E_mystery.html
-
[ Windows ] PE 文件结构中 DOS Header 和 PE Headers 中间未文档化的 "Rich" Header 分析: http://bytepointer.com/articles/the_microsoft_rich_header.htm
-
[ IoTDevice ] THE CAR HACKER'S HANDBOOK: A Guide for the Penetration Tester: http://opengarages.org/handbook/ebook/
-
[ Popular Software ] 利用 ithare::kscope 工具挖掘 GCC 编译器(CLANG/GCC/MSVC)的 Bugs: http://ithare.com/c17-compiler-bug-hunt-very-first-results-12-bugs-reported-3-already-fixed/
-
-
[ Vulnerability ] LibVNCServer/vncterm 整数溢出漏洞: http://www.openwall.com/lists/oss-security/2018/02/22/4 http://www.openwall.com/lists/oss-security/2018/02/18/2
-
[ Web Security ] <script> 标签的 src 可以通过 data:;base64,xxxx 的方式内联脚本。<audio> 也可以通过这种方式内联 mp3 文件: https://twitter.com/itscachemoney/status/966480136802525185