腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Browser ] Google Chrome 现已支持将 Web 请求拷贝为 PowerShell 命令: https://twitter.com/i/web/status/979705974901657600
-
[ Debug ] 使用 strace 调试管道与套接字之间的通信: https://github.com/nh2/strace-pipes-presentation/blob/master/presentation/Debugging%20across%20pipes%20and%20sockets%20with%20strace.pdf
-
[ Firmware ] 使用JTAG从设备内存中提取密码: https://labs.portcullis.co.uk/blog/jtag-on-chip-debugging-extracting-passwords-from-memory/
-
[ Fuzzing ] 如何使用 ExploitDev 进行网络应用的模糊测试: https://hansesecure.de/howto-exploitdev-fuzzing/ GitHub: https://github.com/HanseSecure/ExploitDev
-
[ Industry News ] 测试放行端口或协议的网站 LetMeOutOfYour.Net 回归: https://twitter.com/mubix/status/977617545711767552
-
[ iOS ] iOS Kernel Memory Manipulation - Using vm_write() & vm_read() to Patch Live Kernel Memory: https://www.youtube.com/watch?v=Qp9LLY2-SlU&;feature=youtu.be
-
[ macOS ] macOS High Sierra 10.13.4 安全更新内容: https://support.apple.com/zh-cn/HT208692
-
[ macOS ] 监控 macOS ,Part 1:通过 MACF 监控进程执行情况: https://www.fortinet.com/blog/threat-research/monitoring-macos--part-i--monitoring-process-execution-via-macf.html
-
[ Others ] Shadow-Box v2 - ARM 安全沙盒项目介绍, 来自 Blackhat Asia 2018: https://www.blackhat.com/docs/asia-18/asia-18-Seunghun-Shadow-Box_v2_The_Practical_and_Omnipotent_Sandbox_for_ARM.pdf
-
[ Pentest ] 探索 CobaltStrike 的 ExternalC2 框架: https://blog.xpnsec.com/exploring-cobalt-strikes-externalc2-framework/
-
[ Tools ] udtrace - 用于捕获 Unix 域套接字的 LD_PRELOAD 库: http://laforge.gnumonks.org/blog/20180330-udtrace/
-
-
[ Web Security ] 通过浏览器扩展和上下文菜单的点击劫持泄露敏感信息: https://harleo.me/blog/exploiting-browser-extensions-context-menus
-
[ Windows ] 使用 Windows 事件日志检测域环境下以单一密码暴力破解众多账户的攻击: https://www.ziemba.ninja/?p=66
-
[ Windows ] 调用 Assembly.LoadModule 方法实现内存加载 .NET 应用程序: https://gist.github.com/mattifestation/8958b4c18d8bca9e221b29252cfee26b
-
[ Windows ] Invoke-ADLabDeployer - 自动创建 Hyper-V 虚拟机部署 Windows 域实验环境的 PowerShell 项目: https://outflank.nl/blog/2018/03/30/automated-ad-and-windows-test-lab-deployments-with-invoke-adlabdeployer/GitHub: https://github.com/outflanknl/Invoke-ADLabDeployer
-
[ Windows ] Windows Desktop Bridge 的工作原理与漏洞利用,来自 Zer0Con 2018 : https://github.com/tyranid/Zer0Con_2018/blob/master/A%20Bridge%20too%20Far.pdf