腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Browser ] 在 Microsoft Edge 中通过攻击 JIT 服务进程 Bypass ACG : https://googleprojectzero.blogspot.com/2018/05/bypassing-mitigations-by-attacking-jit.html
-
[ Browser ] Firefox 60 中 Linux sandboxing 的改进 : https://www.morbo.org/2018/05/linux-sandboxing-improvements-in_10.html
-
[ Conference ] BH USA 2018 已经公开了部分入选议题: https://www.blackhat.com/us-18/briefings/schedule/
-
[ Detect ] 检测 Kerberoast 攻击的艺术: https://www.trustedsec.com/2018/05/art_of_kerberoast/
-
[ iOS ] 如何利用 iOS 7 bootchain 中的递归堆栈溢出漏洞: https://xerub.github.io/ios/iboot/2018/05/10/de-rebus-antiquis.html
-
[ MachineLearning ] 在 Raspberry Pi 上进行物体识别与跟踪: https://medium.com/ml-everything/offline-object-detection-and-tracking-on-a-raspberry-pi-fddb3bde130
-
[ macOS ] 当消失的记录并没有消失,macOS 的通知数据库会存储所有通知数据,即时聊天软件的通知信息也会被记录,作者写了一个简单的脚本 dump 记录: https://www.patreon.com/posts/18714633
-
[ MalwareAnalysis ] 以销毁数据为目的恶意软件(Wipers)的检测分析: https://blog.talosintelligence.com/2018/05/wipers-destruction-as-means-to-end.html
-
[ Network ] 从 DNS 流量中提取恶意 DNS 解析的方法: https://www.slideshare.net/real_slacker007/finding-evil-in-dns-traffic
-
[ Others ] SGX-Step: A Practical Attack Framework for PreciseEnclave Execution Control: https://lirias.kuleuven.be/bitstream/123456789/596336/3/systex17.pdf
-
[ Pentest ] 使用 CMSTP 绕过 AppLocker 的方法介绍: https://pentestlab.blog/2018/05/10/applocker-bypass-cmstp/
-
[ Pentest ] 不调用 Win32_Process 的情况下使用 WMI 横向渗透的技巧: https://www.cybereason.com/blog/wmi-lateral-movement-win32
-
[ ReverseEngineering ] Ground Zero 逆向工程基础系列,Part 3 - Linux ARM64: https://scriptdotsh.com/index.php/2018/04/26/ground-zero-part-3-reverse-engineering-basics-linux-on-arm64/ Part 2 – Windows x64 : https://scriptdotsh.com/index.php/2018/04/16/ground-zero-part-2-reverse-engineering-basics/Part 2-2 encryption – Windows x64 : https://scriptdotsh.com/index.php/2018/05/09/ground-zero-part-2-2-reverse-engineering-xor-encryption-windows-x64/ Part 1 – Linux x64 : https://scriptdotsh.com/index.php/2018/04/09/ground-zero-part-1-reverse-engineering-basics/
-
[ Sandbox ] 使用 VBA 引用逃避沙盒检测: https://www.slideshare.net/AmitDori/sandbox-evasion-usingvbareferencingx33fcon
-
[ Tools ] MegaDumper - 从内存中导出 .NET 程序的工具: https://github.com/CodeCracker-Tools/MegaDumper
-
[ Tools ] AtomicRedTeam 项目发布 YAML 规范和验证例程: https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/spec.yaml
-
[ Tools ] BFuzz - 浏览器 Fuzz 脚本: https://github.com/RootUp/BFuzz
-
[ Tools ] boblobblob - 从 Git 仓库中隐藏文件的方法及脚本 : https://github.com/Und3rf10w/boblobblob
-
[ Tools ] CVE-2018-8897 - POP/MOV SS 漏洞检测工具: https://github.com/nmulasmajic/CVE-2018-8897
-
[ Tools ] hate_crack - TrustedSec 团队发布的 Hashcat 自动化破解工具: https://github.com/TrustedSec/hate_crack
-
[ Tools ] Invoke-WMILM - 不使用 Win32_Process 的情况下调用 WMI 远程执行命令的脚本: https://github.com/Cybereason/Invoke-WMILM
-
[ Tools ] The-Axer - 使用 msfvenom 创建 payload 的辅助工具: https://github.com/ceh-tn/The-Axer
-
[ Web Security ] 上传 Word 文档实现存储型 XSS 的漏洞实例: https://www.coalfire.com/Solutions/Coalfire-Labs/The-Coalfire-LABS-Blog/may-2018/microsoft-word-document-upload-to-stored-xss
-
[ Windows ] Windows 命令行备忘单(Part 2)WMIC: https://www.andreafortuna.org/dfir/windows-command-line-cheatsheet-part-2-wmic/
-
[ WirelessSecurity ] 3GPP 空中接口安全性的演变: https://gdelugre.github.io/2018/05/10/3gpp-ota-security-evolution/
-
-
[ MalwareAnalysis ] GPON 漏洞的在野利用(一)——muhstik 僵尸网络: https://blog.netlab.360.com/gpon-exploit-in-the-wild-i-muhstik-botnet-among-others/
-
-
-
[ SecurityAdvisory ] qemu-kvm-rhev 安全更新(CVE-2018-7550、CVE-2018-7858): https://access.redhat.com/errata/RHSA-2018:1369