
腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Android ] 利用 ARM MMU 特性打破 Android 内核隔离并 root 设备,来自 Blackhat Asia 2018: https://www.blackhat.com/docs/asia-18/asia-18-WANG-KSMA-Breaking-Android-kernel-isolation-and-Rooting-with-ARM-MMU-features.pdf
-
[ Android ] Abusing Android In app Billing feature thanks to a misunderstood integration,对 Android 应用内结算的滥用: https://www.securingapps.com/blog/AbusingAndroidInAppBilling_INS18.pdf
-
[ Android ] Quarkslab 对 3 月 Android 安全公告中修复的两个蓝牙漏洞的分析: https://blog.quarkslab.com/android-bluetooth-vulnerabilities-in-the-march-2018-security-bulletin.html
-
[ Bug Bounty ] Netflix Bug Bounty 项目现已面向所有白帽子开放: https://medium.com/netflix-techblog/netflixbugbounty-ae3bf4489def https://threatpost.com/netflix-opens-public-bug-bounty-program-with-15k-payout-cap/130630/
-
[ Hardware ] An accessible overview of Meltdown and Spectre Part 2,Meltdown 和 Spectre 漏洞的技术细节: https://blog.trailofbits.com/2018/03/22/an-accessible-overview-of-meltdown-and-spectre-part-2/
-
[ Industry News ] Drupal 宣布将在 3 月 28 日发布高危漏洞补丁: https://www.drupal.org/psa-2018-001
-
[ Industry News ] 据 Symantec 威胁报告统计,2017年供应链攻击突升了 200%: https://www.darkreading.com/attacks-breaches/supply-chain-cyberattacks-surged-200--in-2017/d/d-id/1331337
-
[ iOS ] iOS 设备数字取证分析方法与技术: https://www.dropbox.com/s/qu4kbg7umqsqvsh/2018_iOS_Forensics_ElcomSoft.pdf
-
[ IoTDevice ] UbootKit: IoT 设备引导程序的蠕虫攻击,来自 Blackhat Asia 2018: https://www.blackhat.com/docs/asia-18/asia-18-Yang-UbootKit-A-Worm-Attack-for-the-Bootloader-of-IoT-Devices.pdf
-
[ macOS ] MacOS High Sierra 的 Unified 日志中可看到 APFS 外部加密卷的明文密码: https://www.mac4n6.com/blog/2018/3/21/uh-oh-unified-logs-in-high-sierra-1013-show-plaintext-password-for-apfs-encrypted-external-volumes-via-disk-utilityapp
-
[ Malware ] 使用 Telegram 进行数据通信的新型 Android 木马 - TeleRAT: http://securityaffairs.co/wordpress/70551/malware/telerat-android-trojan.html
-
[ Pentest ] 渗透测试中的持久化控制策略与技巧基础: https://rastamouse.me/2018/03/a-view-of-persistence/
-
[ Popular Software ] IBM Notes 客户端代码执行漏洞详情(CVE-2018-1435): https://improsec.com/blog/ibm-advisory-7
-
[ Popular Software ] 悄悄被修复的 VSCode 因开启 inspect 模式导致的远程代码执行漏洞: https://medium.com/0xcc/visual-studio-code-silently-fixed-a-remote-code-execution-vulnerability-8189e85b486b
-
[ SecurityProduct ] ModSecurity WAF 3.0 for Nginx - 拒绝服务漏洞详情披露: http://seclists.org/fulldisclosure/2018/Mar/49
-
-
[ Tools ] WhatCMS - 依据 Whatcms.org 提供的 API 编写的 CMS 检测与利用工具: https://github.com/HA71/WhatCMS
-
[ Windows ] 使用 RunOnceEx 注册表键值实现自启动并在 AutoRuns 中隐藏: https://oddvar.moe/2018/03/21/persistence-using-runonceex-hidden-from-autoruns-exe/