腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ APT ] Kaspersky 对 APT 组织 Energetic Bear / Crouching Yeti 近期活动的分析: https://securelist.com/energetic-bear-crouching-yeti/85345/
-
[ Crypto ] 逆向 Ethereum 智能合约 Part 2: https://arvanaghi.com/blog/reversing-ethereum-smart-contracts-pt2/
-
-
[ Exploit ] 在 CORS 配置 Origin 不当的情况下的利用方式: https://www.soffensive.com/2018/04/exploiting-misconfigured-cors-null.html
-
[ Malware ] Trend Micro 对由 AutoHotKey 编写的 RETADUP 加密货币挖矿蠕虫变种的分析 : https://blog.trendmicro.com/trendlabs-security-intelligence/monero-mining-retadup-worm-goes-polymorphic-gets-an-autohotkey-variant/
-
[ Malware ] 安全人员发现一个针对医疗行业的黑客团伙 Orangeworm: https://thehackernews.com/2018/04/healthcare-cyber-attacks.html
-
[ Pentest ] 手工 SQL 注入寻找技巧: https://gerbenjavado.com/manual-sql-injection-discovery-tips/
-
[ Popular Software ] Foxit Reader BMP 图像解析 BITMAPINFOHEADER biSize 存在堆缓冲区溢出漏洞导致远程代码执行(CVE-2017-17557) : https://srcincite.io/advisories/src-2018-0009/
-
[ ReverseEngineering ] 逆向工程 - Part 2(高级编程概念): https://medium.com/@danielabloom/bolo-reverse-engineering-part-2-advanced-programming-concepts-b4e292b2f3e
-
[ Sandbox ] 剪贴板监控 - 一个高效的反沙盒技巧: http://www.hexacorn.com/blog/2018/04/23/monitoring-clipboard-a-quick-antisandbox-trick/
-
[ Tools ] 非 root 权限下使用 Nmap 进行 ARP 扫描的技巧: https://twitter.com/i/web/status/987002523872612352
-
[ Tools ] FireEye 新开源工具 Kernel Shellcode Loader 使用介绍: https://www.fireeye.com/blog/threat-research/2018/04/loading-kernel-shellcode.html
-
[ Tools ] Deauth All Button,可以一键断开所有设备WiFi连接的小工具(Video): https://www.youtube.com/watch?v=HWZrBoIKacw&feature=youtu.beGitHub: https://github.com/spacehuhn/esp8266_deauther
-
[ Tools ] Fenrir - 基于 Bash 的 IOC 扫描器: https://github.com/Neo23x0/Fenrir
-
[ Tools ] scanmem - Linux 内存扫描工具: https://github.com/scanmem/scanmem
-
-
[ Virtualization ] A bunch of Red Pills: VMware Escapes ,来自 科恩实验室: https://keenlab.tencent.com/en/2018/04/23/A-bunch-of-Red-Pills-VMware-Escapes/
-
[ Vulnerability ] Google VRView 库中基于 DOM 的 XSS 漏洞详情: http://blog.mindedsecurity.com/2018/04/dom-based-cross-site-scripting-in.html
-
[ Vulnerability ] Small mistakes lead to big problems,PHPLiteAdmin 中的认证问题: http://k3research.outerhaven.de/posts/small-mistakes-lead-to-big-problems.html
-
[ Windows ] Exploiting CVE-2018-1038 - Total Meltdown,针对之前微软Windows7 x64 和 Windows Server 2008 R2 安全补丁中存在的漏洞(CVE-2018-1038)分析与利用: https://blog.xpnsec.com/total-meltdown-cve-2018-1038/ ; Poc: https://gist.github.com/xpn/3792ec34d712425a5c47caf5677de5fe
-
[ Windows ] 调试 Windows 服务以进行恶意软件分析与逆向工程: https://secrary.com/Random/WindowsServiceDebugging/
-
[ Windows ] 通过 Nvidia 签名的可执行文件执行系统命令: http://sysadminconcombre.blogspot.ca/2018/04/run-system-commands-through-nvidia.html
-
[ Windows ] 利用打开 CHM 文件时主动加载的 DLL 实现持久化: http://www.hexacorn.com/blog/2018/04/22/beyond-good-ol-run-key-part-76/
-
[ WirelessSecurity ] 利用 USB 转 VGA 适配器欺骗蜂窝网络(Sildes): http://people.osmocom.org/steve-m/fl2k_slides/osmo-fl2k.html https://osmocom.org/projects/osmo-fl2k/wiki/Wiki
-
-
[ Industry News ] Drupal 将于本月25号发布 CVE-2018-7602/SA-CORE-2018-004 的安全补丁: https://www.drupal.org/psa-2018-003
-
[ MalwareAnalysis ] Muhstik 僵尸网络利用 Drupal 的漏洞进行加密货币挖矿: https://threatpost.com/muhstik-botnet-exploits-highly-critical-drupal-bug/131360/
-