腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Browser ] Tor Browser 8.0a2 推出: https://twitter.com/i/web/status/968210337127370753
-
[ Industry News ] 苹果承认其使用了谷歌云存储 iCloud 数据: https://www.cnbc.com/2018/02/26/apple-confirms-it-uses-google-cloud-for-icloud.html
-
[ Industry News ] 为美国政府提供解锁服务的 Cellebrite 公司宣称其能解锁运行 iOS 11 的 iphone 设备: https://www.forbes.com/sites/thomasbrewster/2018/02/26/government-can-access-any-apple-iphone-cellebrite/#5aa1d77e667a
-
-
[ Linux ] Linux 内核动态模块加载(LKM Loading)相关的威胁分析以及相应的保护措施: https://xorl.wordpress.com/2018/02/17/lkm-loading-kernel-restrictions/
-
[ MachineLearning ] 为工程师写的简明机器学习入门介绍: https://arxiv.org/pdf/1709.02840.pdf
-
[ MalwareAnalysis ] Rig 漏洞利用工具包一年的转变:从勒索软件到加密货币挖矿和信息窃取: https://researchcenter.paloaltonetworks.com/2018/02/unit42-rig-ek-one-year-later-from-ransomware-to-coin-miners-and-information-stealers/
-
[ MalwareAnalysis ] 谁是 Olympic Destroyer 恶意软件的幕后黑手: http://blog.talosintelligence.com/2018/02/who-wasnt-responsible-for-olympic.html
-
[ Pentest ] Red Team Infrastructure - AWS Encrypted EBS : https://rastamouse.me/2018/02/red-team-infrastructure---aws-encrypted-ebs/
-
[ Pentest ] 深入研究数据库攻击 Part 2:通过 SQL 命令传递和执行恶意程序(SQL Server) https://www.imperva.com/blog/2018/02/deep-dive-database-attacks-part-ii-delivery-execution-malicious-executables-sql-commands-sql-server/
-
[ ReverseEngineering ] 三星 Gear VR 控制器逆向分析: http://jsyang.ca/hacks/gear-vr-rev-eng/
-
[ SecurityAdvisory ] Red Hat 产品安全公告索引: https://access.redhat.com/errata/#/
-
[ SecurityProduct ] 终端检测与防护产品收集列表更新: http://www.hexacorn.com/blog/2018/02/25/endpoint-detection-and-response-edr-solutions-sheet-update-2/
-
[ SecurityReport ] McAfee发布 2018 Q1 移动威胁报告 : https://www.mcafee.com/us/resources/reports/rp-mobile-threat-report-2018.pdf
-
[ Tools ] 使用 BloodHound 进行企业安全防御的方法介绍 Part 2: https://posts.specterops.io/introducing-the-adversary-resilience-methodology-part-two-279a1ed7863d
-
[ Tools ] shellen - 交互式 shellcode 开发环境: https://github.com/merrychap/shellen
-
[ Tools ] JShell - Get a JavaScript shell with XSS: https://github.com/UltimateHackers/JShell
-
[ Tools ] Harpoon - 开源情报收集工具,介绍: https://www.randhome.io/blog/2018/02/23/harpoon-an-osint-/-threat-intelligence-tool/ GitHub: https://github.com/Te-k/harpoon
-
[ Tools ] BloodHound.py - Python 编写的 BloodHound 活动目录信息提取工具: https://github.com/fox-it/BloodHound.py
-
[ Tools ] tweets_analyzer - 用于推文(Tweets)的元数据收集与活动分析工具: https://github.com/x0rz/tweets_analyzer
-
[ Tools ] nezha - 一款差分模糊测试工具: https://github.com/nezha-dt/nezha
-
[ Tools ] 基于 InstallUtil 的键盘记录器: https://gist.github.com/caseysmithrc/98ac65cfe47d9064f6b728be506ec5a6
-
[ Tools ] 虚拟化与取证分析学习所需要的虚拟机环境下载: https://www.dfir.training/tools/virtualization-and-forensics/virtual-machines-downloads
-
[ Tools ] MalShare-Toolkit - 与 Malshare 进行交互的一系列工具集合: https://github.com/Malshare/MalShare-Toolkit
-
[ Windows ] Chrome Build 时随机出现的错误分析:linker 导致了 Windows 内核的 Bug: https://randomascii.wordpress.com/2018/02/25/compiler-bug-linker-bug-windows-kernel-bug/
-
[ Windows ] 利用 LaunchINFSection 远程拉起 INF 文件中配置的 SCT 脚本,通过这种方法 Bypass 常见的检测: https://bohops.com/2018/02/26/leveraging-inf-sct-fetch-execute-techniques-for-bypass-evasion-persistence/
-
-
[ Windows ] Windows Internals 之 PEB 结构体分析: https://ntopcode.wordpress.com/2018/02/26/anatomy-of-the-process-environment-block-peb-windows-internals/