腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Browser ] Man in the browser on Firefox - 基于 pydbg HOOK Firefox 相应的函数,实现 SSL Sniffer: https://www.shellcode.it/article/mitb-firefox/
-
[ Crypto ] Fun with self-decryption: https://x64dbg.com/blog/2018/02/25/fun-with-self-decryption.html
-
[ Firmware ] 利用符号执行的方法动态发现驱动的 IOCTL Codes,以 PyExZ3 处理 HackSysExtremeVulnerableDriver 驱动为例: https://gist.github.com/jthuraisamy/06a28d7ebb60dd47386477af68d8cbcf
-
[ Industry News ] Flash 漏洞 CVE-2018-4878 被发现在野利用: https://blog.morphisec.com/flash-exploit-cve-2018-4878-spotted-in-the-wild-massive-malspam-campaign
-
[ Others ] 通过 Instagram 点击劫持漏洞泄漏应用访问令牌: https://www.seekurity.com/blog/general/redressing-instagram-leaking-application-tokens-via-instagram-clickjacking-vulnerability/
-
[ Programming ] 研究员 Thomas Biege 分享的一些关于安全编码的 PPT: https://github.com/thomasbiege/slides/tree/master/Secure%20Programming
-
[ Tools ] FiOS - 基于 objection 框架可视化地审计 iOS APP: https://github.com/snooze6/FiOS
-
[ Tools ] CTTK - 常量执行时间代码片段收集,这些代码用来参考编写可以防御侧信道攻击的加解密代码: https://github.com/pornin/CTTK
-
[ Tools ] is_my_password_pwned - 判断密码是否出现在被黑账户数据库中的脚本: https://github.com/kevlar1818/is_my_password_pwned
-
[ Windows ] AppLocker Bypass via remote SCT code execution: https://twitter.com/i/web/status/967486047839014913
-
[ Windows ] Windows Exploit Development - Part 5 Return Oriented Programming Chains: http://www.shogunlab.com/blog/2018/02/11/zdzg-windows-exploit-5.html
-
[ Windows ] 如何利用 Debug Help Library 定位 Windows NT 内核未导出的函数和结构体: https://secrary.com/Random/unexported/