
腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Industry News ] 据外媒报告,Cambridge Analytica 公司通过 facebook 收集了 5000万个人信息,为特朗普竞选信息的精准投放所用: https://www.nytimes.com/2018/03/17/us/politics/cambridge-analytica-trump-campaign.html
-
[ iOS ] iPhone 7 10.0/10.1 KTRR 绕过完全原子操作和线程安全的 ROP 链: https://twitter.com/qwertyoruiopz/status/974907288501747713
-
[ Others ] 使用 Sysmon 和 Splunk 进行高级事件检测与威胁追查,来自 BotConf2016: https://www.botconf.eu/wp-content/uploads/2016/11/PR12-Sysmon-UELTSCHI.pdf
-
[ Others ] WordPress CSRF Tokens 泄露漏洞分析([CVE-2017-5489): https://ahussam.me/Leaking-WordPress-CSRF-Tokens/
-
[ Pentest ] 滥用导出函数和暴露的 DCOM 接口进行远程命令执行以实现横向渗透: https://bohops.com/2018/03/17/abusing-exported-functions-and-exposed-dcom-interfaces-for-pass-thru-command-execution-and-lateral-movement/
-
[ Protocol ] Protecting Against HSTS Abuse: https://webkit.org/blog/8146/protecting-against-hsts-abuse/
-
[ Tools ] MEAnalyzer - 英特尔引擎固件分析工具: https://github.com/platomav/MEAnalyzer
-
[ Tools ] GraphQL 滥用 - 通过注入 GraphQL 查询参数绕过帐户权限限制: https://labs.detectify.com/2018/03/14/graphql-abuse/
-
[ Windows ] 通过修改对象属性的方法使活动目录为 C&C 服务: https://akijosberryblog.wordpress.com/2018/03/17/active-directory-as-a-c2-command-control/