腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Android ] 绕过 Android 反仿真(Anti-Emulation) 保护 Part 2: http://www.juanurs.com/Bypassing-Android-Anti-Emulation-Part-II/
-
[ Browser ] 在 Chrome 67 的安全面板中现已提供证书透明度信息: https://twitter.com/ChromeDevTools/status/986628922816135168
-
[ Browser ] Safari 技术预览版 54 发布: https://webkit.org/blog/8232/release-notes-for-safari-technology-preview-54/
-
[ Browser ] 浏览器扩展应用安全 Part 1,作者分享讲解了几个自己挖到的漏洞(CVE-2018-5113, CVE-2018-5112, CVE-2018-5134 and CVE-2018-5135): http://leucosite.com/WebExtension-Security/
-
[ Browser ] Microsoft Edge ACG bypass with OpenProcess(),目前处于未修复状态: https://bugs.chromium.org/p/project-zero/issues/detail?id=1552
-
[ Browser ] 谷歌宣布自 WebView 66 开始默认引入安全浏览功能以保护用户安全: https://android-developers.googleblog.com/2018/04/protecting-webview-with-safe-browsing.html
-
[ Industry News ] 英特尔允许反病毒引擎使用集成GPU进行恶意软件扫描: https://www.bleepingcomputer.com/news/security/intel-to-allow-antivirus-engines-to-use-integrated-gpus-for-malware-scanning/
-
[ Industry News ] 微软为其新的 IoT 服务自行定制了 Linux 内核: https://techcrunch.com/2018/04/16/microsoft-built-its-own-custom-linux-kernel-for-its-new-iot-service/
-
[ iOS ] 信任劫持(TrustJacking)--通过 iTunes Wi-Fi sync 特性获取iOS设备控制权 ,symantec 在 RSA 大会上公布此研究: https://www.symantec.com/blogs/feature-stories/ios-trustjacking-dangerous-new-ios-vulnerability https://threatpost.com/ios-sync-glitch-lets-attackers-control-devices/131281/
-
[ MalwareAnalysis ] Malwarebytes 对基于 Python 的广告软件 PBot 的分析: https://blog.malwarebytes.com/threat-analysis/2018/04/pbot-python-based-adware/
-
[ Others ] ridrelay - 在没有域账户密码的情况下依靠 SMB 中继收集活动目录信息的工具: https://github.com/skorov/ridrelay
-
[ Others ] 对 .NET Core 2.1 性能提升的详细介绍: https://blogs.msdn.microsoft.com/dotnet/2018/04/18/performance-improvements-in-net-core-2-1/
-
[ Popular Software ] McAfee Labs 对历史上一些 Adobe Flash 漏洞的回顾总结: https://securingtomorrow.mcafee.com/mcafee-labs/despite-decline-use-adobe-flash-vulnerabilities-will-continue-cause-concern/
-
[ Popular Software ] Whatsapp 的链接预览功能会泄漏用户真实 IP 地址: https://medium.com/@kankrale.rahul/whatsapp-users-ip-disclosure-with-link-preview-feature-39a477f54fba
-
[ Programming ] 利用 Node 及 Vue.js 创建一个基于用户兴趣的个性化视频推荐应用: https://vuejsdevelopers.com/2018/04/16/video-vue-node-cloudinary/
-
[ SecurityAdvisory ] Oracle 发布 4 月重要安全更新,其中修复了一个 Oracle WebLogic Server 远程代码执行漏洞: http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
-
[ Tools ] xHook - 用于 Android 原生 ELF 文件的 PLT 钩子库: https://github.com/iqiyi/xHook
-
[ Tools ] hashtopolis - 一个多平台C/S架构工具,用于将 hashcat 任务分发给多台计算机进行密码破解: https://github.com/s3inlc/hashtopolis
-
[ Tools ] CEH 道德黑客认证考试备忘单: https://adriancitu.com/2015/07/22/my-ceh-cheat-sheet/
-
[ Tools ] ApiScout 作者对新增 ApiVectors 功能的介绍: http://byte-atlas.blogspot.de/2018/04/apivectors.html
-
[ Tools ] Polymorph 实时网络报文操作框架使用介绍: https://www.exploit-db.com/docs/english/44457-polymorph-a-real-time-network-packet-manipulation-framework.pdf
-
[ Vulnerability ] Jolokia RCE & XSS 漏洞分析与利用(CVE-2018-1000130 、CVE-2018-1000129): https://blog.gdssecurity.com/labs/2018/4/18/jolokia-vulnerabilities-rce-xss.html
-
[ Vulnerability ] Vigor ACS Unsafe Flex AMF Java 对象反序列化漏洞披露: https://blogs.securiteam.com/index.php/archives/3681
-
[ Windows ] Windows 漏洞利用技巧:通过 DiagHub 服务的 DCOM 对象实现对 Windows 10 任意文件写漏洞的利用,此方法可以被用于 Bypass Edge 的沙箱保护,来自 James Forshaw: https://googleprojectzero.blogspot.com/2018/04/windows-exploitation-tricks-exploiting.html
-
-
-
[ Popular Software ] Cisco WebEx 客户端远程代码执行漏洞披露(CVE-2018-0112) : https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-wbs
-
[ Popular Software ] Cisco Adaptive Security Appliance VPN 客户端证书绕过漏洞披露(CVE-2018-0227): https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-asa1