
腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Conference ] Black Hat Asia 2018 议程: https://www.blackhat.com/asia-18/briefings/schedule/
-
[ Firmware ] 固件逆向介绍(Video): https://www.youtube.com/watch?v=GIU4yJn2-2A
-
[ Fuzzing ] ELF 二进制中的定向函数 Fuzzing: https://blahcat.github.io/2018/03/11/fuzzing-arbitrary-functions-in-elf-binaries/
-
[ iOS ] 逆向工程 iOS 应用 - iOS 11(第1部分): https://ivrodriguez.com/reverse-engineer-ios-apps-ios-11-edition-part1/
-
[ IoTDevice ] DJI Spark 无人机的研究: https://embedi.com/blog/dji-spark-hijacking/
-
[ Linux ] Unix system calls Part1 : https://t.co/fgbGGVoohH , Part 2 : https://t.co/PYzlbUTpWB
-
[ MalwareAnalysis ] Hunting Down Gooligan - 第一款专偷 oauth 信息的 Botnet: https://www.elie.net/static/files/hunting-down-gooligan-a-retrospective-analysis/hunting-down-gooligan-a-retrospective-analysis-slides.pdf
-
[ Operating System ] Kindle FireOS 文件系统分析: http://newandroidbook.com/Articles/KindleFS.html
-
[ Others ] HOW TO WRITE ARM 32-BIT SHELLCODE IN SIX MINUTES,ARM 汇编编写反弹 Shell 的 shellcode 并编写对应的 Yara 检测规则: https://azeria-labs.com/downloads/SAS-v1.0-Azeria.pdf
-
[ Popular Software ] 对 CCleaner 事件的新调查,可能存在键盘记录: https://blog.avast.com/new-investigations-in-ccleaner-incident-point-to-a-possible-third-stage-that-had-keylogger-capacities
-
[ Tools ] XBruteForcer - 自动化暴力破解 WordPress, Joomla, DruPal, OpenCart, Magento 等站点账户密码的脚本: https://github.com/Moham3dRiahi/XBruteForcer
-
-
[ Tools ] PESecurity - 检测程序是否开启 ASLR, DEP, SafeSEH 等多种防御的 PowerShell 脚本: https://github.com/NetSPI/PESecurity
-
[ Tools ] rootstealer - 检测 Linux 中的 root 用户终端并注入自定义命令: https://github.com/CoolerVoid/rootstealer
-
-
[ Tools ] Chopped Symbolic Execution - 通过指定不关心路径解决路径爆炸的问题: https://srg.doc.ic.ac.uk/files/papers/chopper-icse-18.pdf
-
[ Tools ] ezXSS - 跨站漏洞辅助测试工具: https://github.com/ssl/ezXSS
-
-
[ Windows ] Windows 是如何将64位 ntdll 映射到 Wow 64 进程中的: https://threatmatrix.cylance.com/en_us/home/windows-maps-64-bit-ntdll-to-wow64-process.html
-
-
[ Vulnerability ] VK Messenger 的 vk:// 伪协议命令执行漏洞披露: https://blogs.securiteam.com/index.php/archives/3674
-