腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Android ] Android P 中将默认只允许应用通过 TLS 加密通信传输数据以保护用户隐私: https://android-developers.googleblog.com/2018/04/protecting-users-with-tls-by-default-in.html
-
[ Browser ] Hooking Chrome 浏览器的 SSL 函数读取 SSL 通信数据: https://nytrosecurity.com/2018/02/26/hooking-chromes-ssl-functions/
-
[ Browser ] 针对 Microsoft Edge UAF 的分析(CVE-2017-0236): http://math1as.com/2018/04/10/CVE-2017-0236-analysis/
-
[ Debug ] Solving Ad-hoc Problems with Hex-Rays API,编写脚本调用 IDA API 解决问题的示例: https://www.fireeye.com/blog/threat-research/2018/04/solving-ad-hoc-problems-with-hex-rays-api.html
-
[ Industry News ] Facebook 推出 Data Abuse Bounty ,奖金最高达 4 万美金: https://newsroom.fb.com/news/2018/04/data-abuse-bounty/
-
[ Linux ] Holey Beep: Linux 提权漏洞分析与利用(CVE-2018-0492): https://sigint.sh/#/holeybeep
-
[ Malware ] Quant Loader 木马通过 URL 快捷方式文件进行传播: https://threatpost.com/quant-loader-trojan-spreads-via-microsoft-url-shortcut-files/131081/
-
[ MalwareAnalysis ] 新一波攻击使用嵌入 CVE-2017-8570 漏洞利用的恶意 Word 文档散发 FormBook 恶意软件: https://threatpost.com/word-attachment-delivers-formbook-malware-no-macros-required/131075/
-
[ Others ] Cross-runtime .NET disassembly with BenchmarkDotNet: http://aakinshin.net/blog/post/dotnet-crossruntime-disasm/
-
[ Others ] 从企业网络流量中筛选出前100万个域名: https://blog.nviso.be/2018/04/10/filtering-out-top-1-million-domains-from-corporate-network-traffic/
-
[ Pentest ] 修改 Image File Execution Options 注册表项中的 GlobalFlags 以实现自启动并且在 Autoruns.exe 中不可见: https://oddvar.moe/2018/04/10/persistence-using-globalflags-in-image-file-execution-options-hidden-from-autoruns-exe/
-
[ Pentest ] Mimikatz misc::skeleton 域环境下设置万能密码的方法介绍: https://pentestlab.blog/2018/04/10/skeleton-key/
-
[ Pentest ] 通过修改主机安全描述符实现远程提取机器上的本地用户哈希: https://posts.specterops.io/remote-hash-extraction-on-demand-via-host-security-descriptor-modification-2cf505ec5c40
-
[ Popular Software ] Signal for iOS 锁屏绕过漏洞披露(CVE-2018-9840): http://nint.en.do/Signal-Bypass-Screen-locker.php
-
[ SecurityAdvisory ] Microsoft 发布 4 月安全更新: https://portal.msrc.microsoft.com/en-us/security-guidance
-
[ SecurityAdvisory ] Adobe 发布 4 月安全更新: https://helpx.adobe.com/security.html
-
[ Tools ] ids_bypass - 绕过 Suricata IDS 规则注入恶意数据的 POC (CVE-2018-6794): https://github.com/kirillwow/ids_bypass
-
[ Tools ] JSON Web Token Security Cheat Sheet: https://assets.pentesterlab.com/jwt_security_cheatsheet/jwt_security_cheatsheet.pdf
-
[ Tools ] Red Team Tips: https://vincentyiu.co.uk/red-team-tips/
-
-
-
-
[ Others ] Let’s get fancy with false flags,攻击者通过设置虚假标记来将攻击源头指向其他组织: https://blog.0day.rocks/lets-get-fancy-with-false-flags-28eaabefeff6
-
[ SecurityAdvisory ] ZDI 对 Microsoft、Adobe 4 月发布的安全更新的总览: https://www.thezdi.com/blog/2018/4/10/the-april-2018-security-update-review
-