
腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Android ] Android bluetooth remote heap disclosure PoC(CVE-2017-13259) : https://github.com/ScottyBauer/Android_Kernel_CVE_POCs/commit/7c164cca56aae19edd417f597f92423965415f50
-
[ Industry News ] 惠普的多功能打印机仍然在使用将要被废弃的 SMBv1 协议: https://blog.rootshell.be/2018/03/06/smbv1-phoenix-protocols/
-
[ Industry News ] VirusTotal 的 macOS 沙盒分析环境升级到了 OSX 10.11 El Capitan,且功能有所增强: http://blog.virustotal.com/2018/03/additional-crispiness-on-macos-box-of.html
-
-
[ Malware ] 在 160 个 Applebee 餐厅发现了 POS 机恶意软件: https://threatpost.com/pos-malware-found-at-160-applebees-restaurant-locations/130281/
-
[ MalwareAnalysis ] 使用 Pin 和 Cuckoo 自动化追踪恶意软件: http://blog.fernandodominguez.me/automating-malware-tracing-with-pin-and-cuckoo/
-
[ MalwareAnalysis ] TSCookie 恶意软件分析报告: http://blog.jpcert.or.jp/2018/03/malware-tscooki-7aa0.html
-
[ MalwareAnalysis ] OSX/Coldroot 恶意软件分析: https://www.intego.com/mac-security-blog/osxcoldroot-and-the-rat-invasion/
-
[ OpenSourceProject ] Rocket.Chat 存在 NoSQL 注入导致管理员账户密码泄露或被重置(影响0.57.3,0.58.3及以下版本): http://blog.sbarbeau.fr/2018/03/nosql-injection-leading-to.html
-
[ Others ] PKI基础知识:如何管理证书存储: https://blogs.technet.microsoft.com/askpfeplat/2018/03/05/pki-basics-how-to-manage-the-certificate-store/
-
[ Others ] Take Your Employees Phishing,内部网络邮件钓鱼技巧: https://www.trustedsec.com/2018/03/take-employees-phishing/
-
[ Others ] 解析《命令与征服》的游戏存档文件(.rep): http://timjones.io/blog/archive/2018/03/06/parsing-command-and-conquer-generals-replay-files
-
[ Popular Software ] 从应用层审计私密通信应用 Wire 的安全性: https://medium.com/@wireapp/wire-application-level-security-audits-98324d1f211biOS Client: https://www.x41-dsec.de/reports/X41-Kudelski-Wire-Security-Review-iOS.pdfAndroid Client: https://www.x41-dsec.de/reports/X41-Kudelski-Wire-Security-Review-Android.pdfWeb, Calling: https://www.x41-dsec.de/reports/X41-Kudelski-Wire-Security-Review-Web-Calling.pdf
-
[ Tools ] InsecurePowerShell - PowerShell without System.Management.Automation.dll: https://cobbr.io/InsecurePowershell-PowerShell-Without-System-Management-Automation.html
-
[ Tools ] Droid-Application-Fuzz-Framework - 在真实 Android 设备上 Fuzzing Android 浏览器和 PDF 阅读器内存破坏漏洞的框架: https://github.com/ajinabraham/Droid-Application-Fuzz-Framework
-
[ Tools ] dotdotslash - 目录穿越漏洞辅助测试工具: https://github.com/jcesarstef/dotdotslash
-
[ Tools ] VMAttack - 通过动静态分析,反混淆基于虚拟化实现的二进制加壳,papaer: https://www1.cs.fau.de/filepool/publications/unpacking-dynamic-static.pdfGitHub: https://github.com/anatolikalysch/VMAttack
-
[ Tools ] judas - 钓鱼工具,可克隆网站和配置上级代理: https://github.com/JonCooperWorks/judas
-
[ Tools ] CrawlBox - Web 目录暴力破解工具: https://github.com/abaykan/crawlbox
-
[ Vulnerability ] 邮件传输服务 Exim 的 base64 解码模块溢出漏洞(CVE-2018-6789)的利用,利用这个漏洞可以实现 RCE: https://devco.re/blog/2018/03/06/exim-off-by-one-RCE-exploiting-CVE-2018-6789-en/
-
[ Web Security ] 提升 self-xss 攻击效果的方法介绍: https://silentbreaksecurity.com/weaponizing-self-xss/
-
[ Windows ] 精简版 UMCI 保护机制的旧漏洞,来自 James Forshaw 在 BlueHat 会议的演讲: http://www.bluehatil.com/files/New%20and%20Improved%20UMCI%2C%20Same%20Old%20Bugs.pdf
-
[ Backdoor ] 利用VSTO实现的office后门: https://3gstudent.github.io/3gstudent.github.io/%E5%88%A9%E7%94%A8VSTO%E5%AE%9E%E7%8E%B0%E7%9A%84office%E5%90%8E%E9%97%A8/
-
[ Pentest ] Password Filter DLL在渗透测试中的应用: https://3gstudent.github.io/3gstudent.github.io/Password-Filter-DLL%E5%9C%A8%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95%E4%B8%AD%E7%9A%84%E5%BA%94%E7%94%A8/
-