
腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ APT ] 卡巴斯基实验室对至少活跃了6年的 Slingshot APT 做得分析报告: https://s3-eu-west-1.amazonaws.com/khub-media/wp-content/uploads/sites/43/2018/03/09133534/The-Slingshot-APT_report_ENG_final.pdf
-
[ Industry News ] ProtonMail 发布 OpenPGPjs v3.0: https://protonmail.com/blog/openpgpjs-3-release/
-
[ Industry News ] Apache SOLR 服务器成为加密货币矿工攻击的新目标: https://isc.sans.edu/diary/23425
-
[ MalwareAnalysis ] Donot 团伙使用新型模块化恶意软件框架 - yty 攻击南亚地区,ASERT 对此做出了技术分析: https://www.arbornetworks.com/blog/asert/donot-team-leverages-new-modular-malware-framework-south-asia/
-
[ Others ] 二进制级别大规模 Diff 的艺术: http://www.debasish.in/2018/03/the-art-of-large-scale-cumulative.html
-
[ ReverseEngineering ] 用 IDA Pro 的 REobjc 模块逆向 Objective-C 二进制文件: https://duo.com/blog/reversing-objective-c-binaries-with-the-reobjc-module-for-ida-pro
-
[ Tools ] VirtualXposed 是基于VirtualApp 和 epic 在非 ROOT 环境下运行 Xposed 模块的实现(支持5.0~8.1): https://github.com/android-hacker/VirtualXposed/blob/exposed/CHINESE.md
-
[ Tools ] memcachedump - 调用 Shodan API 快速导出暴露在公网的 memcached 服务器缓存的所有内容的脚本: https://github.com/JLospinoso/memcachedump
-
[ Tools ] go-internals: https://github.com/teh-cmc/go-internals
-
[ Tools ] password_pwncheck - 企业账户密码质量检测工具: https://github.com/CboeSecurity/password_pwncheck
-
-
[ Tools ] XPin Clip - Android/iOS 手机 PIN 码硬件爆破工具: http://xpinclip.com/index.php
-
-
[ Tools ] scrcpy - 在电脑上操控安卓设备的工具,无需 root 权限: https://github.com/Genymobile/scrcpy/blob/master/README.md
-
[ Tools ] 卡巴斯基实验室发布 Klara 项目,旨在协助研究人员使用 Yara 规则快速寻找恶意软件: https://github.com/KasperskyLab/klara
-
[ Tools ] DCSYNCMonitor -部署在域控上用于监视 DCSYNC 和 DCSHADOW 攻击的工具: https://github.com/shellster/DCSYNCMonitor
-
[ Windows ] win32k.sys NtGdiQueryFonts 信息泄露漏洞的分析(CVE-2016-3354/ZDI-16-507): https://www.zerodayinitiative.com/blog/2018/3/9/testing-for-truthiness-exploiting-improper-checks
-
[ Windows ] 使用 CoGetInterceptor 进行 COM 拦截 - Part 2: https://github.com/zodiacon/Blog/blob/master/COM%20Interception%20with%20CoGetInterceptor-Part%202.pdf
-
[ Windows ] 反射式 DLL 注入研究: https://0x00sec.org/t/reflective-dll-injection/3080