
腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Android ] 绕过 Android 反仿真(Anti-Emulation) 保护: http://www.juanurs.com/Android-Bypassing-Anti-Emulation-Part-I/
-
[ Browser ] MacOS 上的 Google 软件更新程序本地提权漏洞披露(CVE-2018-6084): https://bugs.chromium.org/p/project-zero/issues/detail?id=1486
-
[ Conference ] TROOPERScon18 大会视频放出: https://www.youtube.com/channel/UCPY5aUREHmbDO4PtR6AYLfQ
-
[ Firmware ] AMD 承认其 Ryzen 及 EPYC 芯片存在一些 CTS 报告中的问题: https://threatpost.com/amd-acknowledges-vulnerabilities-will-roll-out-patches-in-coming-weeks/130593/
-
[ Firmware ] Betraying the BIOS: Where the Guardians of the BIOS are Failing,研究员 Alex Matrosov 对 Black Hat Vegas 2017 演讲做了更新,增加了 Intel BIOS Guard 和 Intel ACM 漏洞的内容 : https://github.com/REhints/Publications/blob/master/Conferences/Betraying%20the%20BIOS/Offensivecon_18%5Bv2.0%5D.pdf
-
[ Linux ] ncpfs: ncp_read_kernel() 内存破坏漏洞 patch: https://www.mail-archive.com/netdev@vger.kernel.org/msg223373.html
-
[ macOS ] macOS Unified log 介绍: https://eclecticlight.co/2018/03/19/macos-unified-log-1-why-what-and-how/
-
[ Malware ] McAfee 调查发现恶意软件开始使用 GPG 进行加密: https://securingtomorrow.mcafee.com/mcafee-labs/ransomware-takes-open-source-path-encrypts-gnu-privacy-guard/
-
-
[ Popular Software ] 打破 Ledger 硬件钱包的安全防御: https://saleemrashid.com/2018/03/20/breaking-ledger-security-model/
-
[ Popular Software ] 深入研究数据库攻击 Part 3:为什么一张图片就能让我的 Postgres 数据库开始挖掘门罗币: https://www.imperva.com/blog/2018/03/deep-dive-database-attacks-scarlett-johanssons-picture-used-for-crypto-mining-on-postgre-database/
-
[ Popular Software ] 研究人员发现在 unix 环境下可通过第三方插件攻击流行的文本编辑器,比如: Sublime, Vim, Emacs 等: https://threatpost.com/researchers-show-how-popular-text-editors-can-be-attacked-via-third-party-plugins/130559/paper: https://go.safebreach.com/rs/535-IXZ-934/images/Abusing_Text_Editors.pdf
-
[ ReverseEngineering ] 逆向 MMORPG 游戏 Pwn Adventure 3: https://github.com/beaujeant/PwnAdventure3/blob/master/Workshop/re-mmorpg-troopers18.pdf
-
[ Tools ] De-obfuscating Jump Chains with Binary Ninja: https://thisissecurity.stormshield.com/2018/03/20/de-obfuscating-jump-chains-with-binary-ninja/
-
[ Tools ] RedHunt-OS - 用于攻击者模拟和威胁追踪的虚拟机: https://github.com/redhuntlabs/RedHunt-OS
-
[ Tools ] Word2bits - 量化词向量, 比常规词向量占用更少的内存: https://twitter.com/i/web/status/976015607941517312
-
-
[ Tools ] 使用 ProxyDock 创建自己的私有僵尸网络: https://0x00sec.org/t/create-your-own-private-botnet-with-proxydock/5917
-
[ Tools ] angr-utils - angr 二进制分析框架的辅助程序,包含 CFG 可视化: https://github.com/axt/angr-utils
-
[ Tools ] Azure_password_harvesting - 从 Azure Windows 虚拟机中提取明文密码的工具: https://github.com/guardicore/azure_password_harvesting
-
[ Windows ] Windows 远程协助 XXE 漏洞详情(CVE-2018-0878): https://krbtgt.pw/windows-remote-assistance-xxe-vulnerability/
-
[ Windows ] Project Zero 放出上周 Windows x64 上修复的 12 个内存泄漏漏洞的漏洞详情: https://bugs.chromium.org/p/project-zero/issues/list?can=1&;q=fixed%3A2018-mar-13+finder%3Amjurczyk
-
[ Android ] 如何解决恶意APK中常见的Native代码加壳保护: http://jaq.alibaba.com/community/art/show?spm=a313e.7916642.220000NaN1.1.78d94892TTHgEG&articleid=1565
-
-
-
-