腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Android ] 在安卓应用中使用高权限操作的分析与解决(Paper): https://arxiv.org/pdf/1804.04605.pdf
-
[ Browser ] Some Brief Notes on WebKit Heap Hardening: https://labs.mwrinfosecurity.com/blog/some-brief-notes-on-webkit-heap-hardening/
-
[ Crypto ] 加密101:解密工具代码详解: https://blog.malwarebytes.com/threat-analysis/2018/04/encryption-101-decryption-tool-code-walkthrough/
-
[ Exploit ] GNU Beep 1.3 - 'HoleyBeep' 本地提权漏洞利用 Python 脚本: https://www.exploit-db.com/exploits/44452/
-
[ Industry News ] 专家发现一个由超过 65000 个通过 UPnP 协议暴露的路由器组成的代理僵尸网络: https://securityaffairs.co/wordpress/71338/breaking-news/proxy-botnet-upnp.html
-
[ Linux ] 利用 iptables 的 TPROXY 模块简单实现对所有端口的监听: https://blog.cloudflare.com/how-we-built-spectrum/
-
[ MachineLearning ] 利用深度神经网络检测恶意 PowerShell 命令: https://arxiv.org/pdf/1804.04177.pdf
-
[ MalwareAnalysis ] Bitdefender 对一款用于复杂间谍活动的一体化工具包 RadRAT 的分析报告: https://labs.bitdefender.com/2018/04/radrat-an-all-in-one-toolkit-for-complex-espionage-ops/
-
[ MalwareAnalysis ] 新型代码注入技术 "Early Bird" 分析: https://www.cyberbit.com/blog/endpoint-security/new-early-bird-code-injection-technique-discovered/
-
[ MalwareAnalysis ] 恶意软件监视器 - 利用 PyREBox 进行恶意软件分析: https://blog.talosintelligence.com/2018/04/malware-monitor-pyrebox-for-analysis.html
-
[ Pentest ] 不调用 Win32_Process 的情况下使用 WMI 横向渗透的技巧,来自 HITB 2018AMS: https://conference.hitb.org/hitbsecconf2018ams/materials/D2T1%20-%20Philip%20Tsukerman%20-%20Expanding%20Your%20WMI%20Lateral%20Movement%20Arsenal.pdf
-
[ Tools ] PastebinMarkdownXSS - Pastebin 由于对 Markdown 过滤不完善而导致的 XSS 漏洞详情披露: https://github.com/Nhoya/PastebinMarkdownXSS
-
[ Tools ] androidre - 一款用于安卓逆向工程的 Docker 镜像: https://github.com/cryptax/androidre
-
[ Tools ] 一款用于替代 PsExec 远程执行命令的 PowerShell 模块 Invoke-CommandAs 介绍: https://mkellerman.github.io/Death_to_psexec/ GitHub: https://github.com/mkellerman/Invoke-CommandAs
-
[ Vulnerability ] Vultr 域名劫持漏洞 : https://vincentyiu.co.uk/vultr-domain-hijacking/
-
[ Web Security ] CPRF 跨协议请求伪造技术白皮书: https://www.nccgroup.trust/globalassets/our-research/us/whitepapers/2018/cprf.pdf