腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Android ] 在未 root 的 Android 设备上使用 frida: https://lief.quarkslab.com/doc/latest/tutorials/09_frida_lief.html
-
[ Browser ] Mozilla 正在测试使用 HTTPS 传输 DNS 以保护用户隐私: https://threatpost.com/mozilla-tests-dns-over-https-meets-some-privacy-pushback/130765/
-
[ Linux ] 深入解析 Linux - 符号解析的艺术: https://0x00sec.org/t/linux-internals-the-art-of-symbol-resolution/1488
-
[ macOS ] 发篇推文让你的 OSX 崩溃: https://twitter.com/eylon_by/status/978279839223427074
-
[ Malware ] skeksi_virus - 一款 Linux X86_64 ELF 病毒,目前处于开发中: https://github.com/elfmaster/skeksi_virus
-
[ MalwareAnalysis ] 利用浏览器恶意进行加密货币挖矿的脚本是如何逃避黑名单拦截的: https://blog.malwarebytes.com/threat-analysis/2018/03/malicious-cryptomining-and-the-blacklist-conundrum/
-
[ MalwareAnalysis ] Go 语言编写的 GoScanSSH 恶意软件通过扫描 SSH 服务并暴力破解凭证进行传播,Cisco Talos 团队对此作出了分析: http://blog.talosintelligence.com/2018/03/goscanssh-analysis.html
-
[ MalwareAnalysis ] FireEye 发现 SANNY 恶意软件的传播方式在最近的攻击中有所更新: https://www.fireeye.com/blog/threat-research/2018/03/sanny-malware-delivery-method-updated-in-recently-observed-attacks.html
-
[ MalwareAnalysis ] 对野外捕获的 Windows IRC Bot 恶意软件分析: https://isc.sans.edu/diary/23483
-
[ MalwareAnalysis ] Adwind / JRAT Java 恶意软件分析(Video): https://www.youtube.com/watch?v=yHrr9v0E6MQ&;feature=youtu.be
-
[ OpenSourceProject ] 游戏引擎 Unity 开放了一部分 C# 的源码 : https://blogs.unity3d.com/cn/2018/03/26/releasing-the-unity-c-source-code/https://github.com/Unity-Technologies/UnityCsReference
-
[ Others ] Pwn a CTF Platform with Java JRMP Gadget: http://blog.orange.tw/2018/03/pwn-ctf-platform-with-java-jrmp-gadget.html
-
[ Pentest ] DiskShadow 的使用技巧:用作启动项实现持久化和用于导出活动目录 ntds.dit 数据库: https://bohops.com/2018/03/26/diskshadow-the-return-of-vss-evasion-persistence-and-active-directory-database-extraction/
-
[ SecurityReport ] Kaspersky 发布 2017 年下半年工控系统威胁报告: https://securelist.com/threat-landscape-for-industrial-automation-systems-in-h2-2017/85053/
-
[ Tools ] ADRecon - 用于收集 Active Directory 信息的工具,并可生成 AD 环境当前状态的整体报告: https://github.com/sense-of-security/ADRecon
-
-
[ Tools ] THRecon - 威胁狩猎侦察工具包: https://github.com/TonyPhipps/THRecon
-
[ Vulnerability ] Acrolinx Dashboard 目录穿越漏洞披露(CVE 2018-7719): http://www.berkdusunur.net/2018/03/tr-en-acrolinx-dashboard-directory.html
-
[ Challenges ] 第二届强网杯Web Writeup: http://www.cnblogs.com/iamstudy/articles/2th_qiangwangbei_ctf_writeup.html
-
[ Conference ] Blackhat Asia 2018 所有议题放出: https://www.blackhat.com/asia-18/briefings.html 链接:https://pan.baidu.com/s/1XpyHK4l69vuVU0SsaFDyOg 密码:bvze
-
[ Programming ] 从jvm虚拟机角度看Java多态 ->(重写override)的实现原理: http://mp.weixin.qq.com/s/yorAQtqjEWyXz5ZfTnzstA
-
-
[ Web Security ] 客户端 session 导致的安全问题: https://www.leavesongs.com/PENETRATION/client-session-security.html