腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Browser ] FireFox 地址栏支持使用特殊字符限制搜索范围: https://twitter.com/asadotzler/status/991061409839562752
-
[ Crypto ] 最近以太坊智能合约出现的多个溢出漏洞分析(CVE-2018–10376、CVE-2018–10299): https://medium.com/verichains/integer-overflow-simple-but-not-easy-9ebbc58bbaa5
-
[ Exploit ] Binary Exploitation ELI5– Part 1: https://medium.com/@danielabloom/binary-exploitation-eli5-part-1-9bc23855a3d8
-
[ Industry News ] GitHub 宣布其 Pages 服务对自定义域名提供 HTTPS 支持: https://blog.github.com/2018-05-01-github-pages-custom-domains-https/
-
[ Linux ] Linux 内核 mmap 漏洞分析(CVE-2018-8781): https://research.checkpoint.com/mmap-vulnerabilities-linux-kernel/
-
[ Linux ] Linux RNG 随机数生成器漏洞(CVE-2018-1108): https://bugs.chromium.org/p/project-zero/issues/detail?id=1559
-
[ Pentest ] 使用 CylancePROTECT 提升权限: https://www.atredis.com/blog/cylance-privilege-escalation-vulnerability
-
[ Popular Software ] WordPress 插件 Responsive Cookie Consent 1.7 / 1.6 / 1.5 - 持久化 XSS 漏洞(CVE-2018-10309): https://www.exploit-db.com/exploits/44563/
-
[ Popular Software ] Unit 42 针对 CVE-2018-7600 的漏洞分析: https://researchcenter.paloaltonetworks.com/2018/05/unit42-exploit-wild-drupalgeddon2-analysis-cve-2018-7600/
-
[ Popular Software ] 7-Zip:从未初始化的内存到远程代码执行(CVE-2018-10115): https://landave.io/2018/05/7-zip-from-uninitialized-memory-to-remote-code-execution/
-
[ SecurityProduct ] WatchGuard AP100 AP102 AP200 中多个问题导致远程代码执行(CVE-2018-10575、CVE-2018-10576、CVE-2018-10577、CVE-2018-10578): http://seclists.org/fulldisclosure/2018/May/12
-
-
[ Tools ] RTA - 旨在让蓝队模拟恶意攻击的脚本框架: https://github.com/endgameinc/RTA
-
[ Tools ] Sonar 项目的 DNS 以及 SSL 信息收集研究: https://0xpatrik.com/project-sonar-guide/
-
[ Tools ] WinPwnage - Windows 环境下渗透测试用的脚本: https://github.com/rootm0s/WinPwnage
-
[ Tools ] Chimay-Blue - Mikrotik SMB 缓冲区溢出漏洞利用脚本(CVE-2018-7445): https://github.com/BigNerd95/Chimay-Blue
-
[ Windows ] Windows 上所有可用的内置命令帮助文档: https://www.microsoft.com/en-us/download/details.aspx?id=56846
-
[ Hardware ] Exploiting Branch Target Injection: https://drive.google.com/file/d/1caH71xMYbkB3q-HCkzsMhVK1_mWjz0yw/view
-
[ IoTDevice ] 破解与逆向 TomTom Runner GPS 智能手表系列,Part 1: http://grangeia.io/2015/11/09/hacking-tomtom-runner-pt1/ Part 2 : http://grangeia.io/2015/11/16/hacking-tomtom-runner-pt2/ Part 3: http://grangeia.io/2015/11/30/hacking-tomtom-runner-pt3/
-
-
[ macOS ] Apple macOS/iOS - ReportCrash mach port Replacement due to Failure to Respect MIG Ownership Rules(CVE-2018-4206): https://www.exploit-db.com/exploits/44562/
-
[ Popular Software ] Wordpress xmlrpc.php 常见漏洞及利用方法: https://medium.com/@the.bilal.rizwan/wordpress-xmlrpc-php-common-vulnerabilites-how-to-exploit-them-d8d3c8600b32
-
[ Tools ] Get-UserLogon - 获取当前域内计算机用户登录情况的 PowerShell 脚本: https://sid-500.com/2018/02/28/powershell-get-all-logged-on-users-per-computer-ou-domain-get-userlogon/
-
[ Vulnerability ] 使用 Struts2 漏洞绕过防火墙远程执行代码并提升权限: https://medium.com/@logicbomb_1/bugbounty-how-i-was-able-to-bypass-firewall-to-get-rce-and-then-went-from-server-shell-to-get-783f71131b94
-
[ Vulnerability ] 谈escapeshellarg绕过与参数注入漏洞: https://www.leavesongs.com/PENETRATION/escapeshellarg-and-parameter-injection.html