腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ APT ] 针对 APT 组织 Sednit(APT28, Fancy Bear)的用到的 Zebrocy 的分析: https://www.welivesecurity.com/2018/04/24/sednit-update-analysis-zebrocy/
-
[ Exploit ] nx-hbexploit300-obf - Homebrew exploit for 3.0.0: https://github.com/switchbrew/nx-hbexploit300-obf
-
[ Firmware ] ARM 上的 UEFI 更新,固件安全加固和服务安全加固(Pdf): http://www.uefi.org/sites/default/files/resources/UEFI%20Updates%2C%20Secure%20Firmware%20and%20Secure%20Services%20on%20Arm%20%E2%80%93%20Matteo%20Carlini%20and%20Dong%20Wei%20.pdf
-
[ Firmware ] First glance on OS VRP by Huawei,华为防火墙系统的固件分析: https://embedi.com/blog/first-glance-on-os-vrp-by-huawei/
-
[ iOS ] 如何使用 Xcode 9.3 构建 iOS 命令行工具: http://bazad.github.io/2018/04/xcode-command-line-targets-ios/
-
[ IoTDevice ] HooToo TripMate Titan HT-TM05 路由器多个严重漏洞分析与利用: http://blog.ioactive.com/2018/04/hootoo-tripmate-routers-are-cute-but.html
-
[ IoTDevice ] RouterOS 漏洞披露,攻击者可以使用特殊工具连接到Winbox端口并获取系统用户数据库文件: https://forum.mikrotik.com/viewtopic.php?f=21&;t=133533
-
[ Linux ] Linux x64 逆向工程初学者教程: http://niiconsulting.com/checkmate/2018/04/reverse-engineering-x64-for-beginners-linux/
-
[ MachineLearning ] 机器学习时代的 Hash 介绍: https://blog.bradfieldcs.com/an-introduction-to-hashing-in-the-era-of-machine-learning-6039394549b0
-
[ Malware ] 乌克兰能源部网站由于存在 Drupalgeddon2 漏洞而遭受勒索攻击: https://threatpost.com/ransomware-attack-hits-ukrainian-energy-ministry-exploiting-drupalgeddon2/131373/
-
[ MalwareAnalysis ] FireEye 对近期发现的针对巴西公司的恶意邮件活动的分析: https://www.fireeye.com/blog/threat-research/2018/04/metamorfo-campaign-targeting-brazilian-users.html
-
[ Network ] 使用 BGP 劫持将 Amazone Route 53 DNS 服务的流量重路由到攻击者机器实现大范围 DNS 劫持: https://doublepulsar.com/hijack-of-amazons-internet-domain-service-used-to-reroute-web-traffic-for-two-hours-unnoticed-3a6f0dda6a6f
-
[ Pentest ] 滥用 MySQL LOCAL INFILE 读取客户端文件: https://w00tsec.blogspot.co.uk/2018/04/abusing-mysql-local-infile-to-read.html
-
[ Pentest ] 使用 RDP 中间人攻击进行横向渗透: https://pentestlab.blog/2018/04/24/lateral-movement-rdp/
-
[ SecurityAdvisory ] Red Hat 发布系列产品安全公告: https://access.redhat.com/errata/#/
-
[ SecurityAdvisory ] Apple 对 iOS, Safari 及 MacOS 放出更新,修复了四个漏洞 (CVE 2018-4200、CVE 2018-4204、CVE 2018-4206、CVE 2018-4187): https://isc.sans.edu/diary/23587
-
[ Tools ] WinDbg Preview 最新版本中的一些变化: https://blogs.msdn.microsoft.com/windbg/2018/04/24/windbg-preview-1-1804-18003-0-release-notes/
-
[ Tools ] readable-thrift - Thrift 编码/解码器,以友好的格式进行显示: https://github.com/nccgroup/readable-thrift
-
[ Tools ] 用于防御 Mac 电脑上的 Evil Maid 类型攻击的应用 "Do Not Disturb" 介绍: https://objective-see.com/products/dnd.html
-
[ Tools ] ShofEL2 - 任天堂 Tegra X1 Boot ROM 的漏洞利用程序和 Linux 加载器 : https://fail0verflow.com/blog/2018/shofel2/GitHub: https://github.com/fail0verflow/shofel2
-
[ Tools ] credgrap_ie_edge - 从 Internet Explorer 和 Edge 中提取存储凭据的工具: https://github.com/HanseSecure/credgrap_ie_edge
-
[ Tools ] xss-payload-list - XSS Payload 收集: https://github.com/ismailtasdelen/xss-payload-list
-
[ Tools ] memMITM - 内存检测 SSL 的 POC: https://github.com/caseysmithrc/memMITM
-
-
[ Windows ] 使用 RunDotNetDll32 执行 .NET 方法: https://blog.netspi.com/executing-net-methods-rundotnetdll32/
-
-
[ MalwareAnalysis ] StealthBot:150余个小众手机品牌预置刷量木马销往中小城市: http://blogs.360.cn/blog/analysis_of_stealthbot/
-
-
-
[ Rootkit ] ROOTKIT 核心技术——利用 NT!_MDL(内存描述符链表)突破 SSDT(系统服务描述符表)的只读访问限制(一): https://mp.weixin.qq.com/s/Bf_ySmGYUqfoNGtXTmDafA
-
[ Rootkit ] RootKit 核心技术——利用 NT!_MDL 突破 KiServiceTable 的只读访问限制(二): https://mp.weixin.qq.com/s/I5cQI8Q-EP5DOhbi4v72sA
-
-