腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Conference ] ACM ASIACCS 2018 大会中稿 paper 列表: http://asiaccs2018.org/?page_id=632
-
[ Crypto ] 使用 Z3 逆转非加密型哈希: https://www.josephkirwin.com/2018/04/07/z3-hash-inversions/
-
[ Industry News ] Intel Remote Keyboard 存在高危漏洞,允许攻击者注入击键指令,Intel 官方建议用户将其卸载: https://threatpost.com/intel-tells-remote-keyboard-users-to-delete-app-after-critical-bug-found/130974/
-
[ Language ] go-internals - 深入理解 Go 语言(网络书籍,编写中): https://github.com/teh-cmc/go-internals
-
[ MalwareAnalysis ] 使用 Angr 将自己伪造成 C&C 服务器以研究恶意软件的通信协议: https://www.securityartwork.es/2018/04/09/reversing-of-malware-network-protocols-with-angr/
-
[ Others ] 如何搭建个人的 Burp Collaborator 服务器: https://blog.fabiopires.pt/running-your-instance-of-burp-collaborator-server/
-
[ Pentest ] 使用 Mimikatz 进行 Golden Ticket 攻击的方法介绍: https://pentestlab.blog/2018/04/09/golden-ticket/
-
[ Pentest ] 利用 SSRF 漏洞获取 AWS 实例敏感数据: https://medium.com/bugbountywriteup/piercing-the-veil-server-side-request-forgery-to-niprnet-access-171018bca2c3
-
[ Pentest ] 针对 Google Suite 的安全性测试: https://www.slideshare.net/dafthack/ok-google-how-do-i-red-team-gsuite
-
[ Programming ] typeof(TSecret) - .NET泛型背后的黑魔法: http://yizhang82.me/dotnet-generics-typeof-t
-
[ SecurityReport ] malwarebytesLab 发布 2018 Q1 安全报告之网络犯罪策略及技巧: https://www.malwarebytes.com/pdf/white-papers/CTNT-Q1-2018.pdf
-
[ Tools ] LinkFinder - 从 JavaScript 文件中提取 URL 及其参数的 Python 脚本: https://github.com/GerbenJavado/LinkFinder
-
[ Tools ] DomainRecon - 集成多种工具于一身的自动化子域名收集工具: https://github.com/x73x61x6ex6ax61x79/DomainRecon
-
[ Tools ] 破解学校网站的图片验证之使用 Python 编写图片验证码识别工具: https://dev.to/presto412/how-i-cracked-the-captcha-on-my-universitys-website-237j
-
[ Tools ] Windows RID 劫持攻击的 Metasploit 利用脚本发布: https://www.rapid7.com/db/modules/post/windows/manage/rid_hijack
-
[ Tools ] rfd-checker - 反射型文件下载漏洞检测工具: https://github.com/dsopas/rfd-checker
-
[ Tools ] bad_ducky - Rubber Ducky 的克隆项目,用于在 CJMCU BadUsb 开发板上实现 BadUSB 攻击,支持 Rubber Ducky 脚本: https://github.com/mharjac/bad_ducky
-
[ Tools ] whatsapp-web-reveng - WhatsApp Web 端的逆向分析结果,对 API 进行了完整的介绍: https://github.com/sigalor/whatsapp-web-reveng
-
[ Tools ] Microsoft 开源了文件管理器 winfile: https://github.com/Microsoft/winfile
-
[ Tools ] 理解 Get-InjectedThread 的运行原理并进行修改使其绕过查杀: https://blog.xpnsec.com/undersanding-and-evading-get-injectedthread/
-
[ Vulnerability ] CyberArk Password Vault Web Access 远程代码执行漏洞披露(CVE-2018-9843): https://www.redteam-pentesting.de/de/advisories/rt-sa-2017-014/-cyberark-password-vault-web-access-remote-code-execution
-
-
[ SecurityReport ] 安全客2018季刊第一季 | 区块链时代下的黑产攻防: http://static.anquanke.com/download/b/security-geek-2018-q1.pdf
-
[ Tools ] Visual Studio 2017 V15.7 Preview 3 上由 Spectre 缓解带来的一些更改: https://blogs.msdn.microsoft.com/vcblog/2018/04/09/spectre-mitigation-changes-in-visual-studio-2017-version-15-7-preview-3/
-