
腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ APT ] NCC Group 对 APT15 所用工具 RoyalCli 和 RoyalDNS 的分析: https://www.nccgroup.trust/uk/about-us/newsroom-and-events/blogs/2018/march/apt15-is-alive-and-strong-an-analysis-of-royalcli-and-royaldns/
-
[ Compiler ] “编译器炸弹”(Compiler Bomb)长什么样?16 字节的源码编译后变成 16GB: https://codeexplainer.wordpress.com/2018/01/20/how-dismantle-compiler-bomb/
-
[ Others ] 利用 INF 文件执行 SCT 脚本文件以绕过应用白名单策略限制并实现持久化(Part 2): https://bohops.com/2018/03/10/leveraging-inf-sct-fetch-execute-techniques-for-bypass-evasion-persistence-part-2/
-
[ Others ] Clang 控制流程完整性(CFI)绕过技术: https://github.com/0xcl/clang-cfi-bypass-techniques
-
[ Others ] 向音频隐写数据的工具 - DeepSound 的密码恢复研究: https://ryan.govost.es/2018/03/09/deepsound.html
-
[ Programming ] 用 Rust 来写一个 OS: https://github.com/phil-opp/blog_os
-
[ Tools ] DKMC 恶意 Payload 免杀工具的作者添加了新的远程下载执行 shellcode 的功能: https://govolution.wordpress.com/2018/03/02/download-exec-poc-and-dkmc/
-
[ Web Security ] Facebook 任意用户好友列表泄露以及支付卡信息泄露漏洞挖掘过程: https://www.josipfranjkovic.com/blog/facebook-friendlist-paymentcard-leak