腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Browser ] Google Chrome 66.0.3359.170 的 0day RCE 漏洞演示(Video): https://www.youtube.com/watch?v=KNTLzeL4cvg&;feature=youtu.be
-
[ Browser ] Towards a Unified Blink and JavaScript Heap: https://slidr.io/mlippautz/towards-a-unified-blink-and-javascript-heap#1
-
[ Challenges ] Defcon Qualifier CTF 2018 IPwnKit - macOS IOKit 漏洞利用题目的利用程序: https://gist.github.com/saelo/0a85f22c8a02f3a314661edd715900d3
-
[ Challenges ] DEF CON CTF Qualifiers 2018 - shellql WriteUp: https://blog.vero.site/post/shellql
-
[ Crypto ] PGP/GPG 及 S/MIME 邮件加密被爆存在隐私泄密问题: https://efail.de Paper: https://efail.de/efail-attack-paper.pdf关闭 Thunderbird / Apple Mail / Outlook 的 PGP/GPG 方法指南: https://twitter.com/i/web/status/995906702951288833
-
[ Crypto ] Signal 消息应用端到端加密(E2EE)协议分析: https://medium.com/@justinomora/demystifying-the-signal-protocol-for-end-to-end-encryption-e2ee-ad6a567e6cb4
-
[ Malware ] 新的钓鱼活动以通用数据保护法规(GDPR)为主题要求用户输入 Apple 账户凭证: https://threatpost.com/gdpr-phishing-scam-targets-apple-accounts-financial-data/131915/
-
[ MalwareAnalysis ] FireEye 对投递 Grobios 木马的 RIG EK 的深入分析: https://www.fireeye.com/blog/threat-research/2018/05/deep-dive-into-rig-exploit-kit-delivering-grobios-trojan.html
-
[ Popular Software ] Microsoft Teams URL 命令注入导致的远程任意代码执行漏洞披露(CVE-2018-1000006) : https://www.zerodayinitiative.com/advisories/ZDI-18-426/
-
[ Tools ] backtolife - 内存取证工具,从转储的内存中重组进程信息: https://github.com/lukdog/backtolife
-
[ Tools ] DARKSURGEON - 用于事件响应,数字取证,恶意软件分析和网络防御的 Windows 虚拟机: https://medium.com/@cryps1s/darksurgeon-a-windows-10-packer-project-for-defenders-1a57759856b6GitHub: https://github.com/cryps1s/DARKSURGEON
-
[ Tools ] streamingphish - 使用监督机器学习从证书透明度日志网络中检测钓鱼域名的工具: https://github.com/wesleyraptor/streamingphish
-
[ Tools ] PinVMP - 虚拟化代码辅助分析工具: https://github.com/lmy375/pinvmp
-
[ Tools ] sandmap - 使用 Nmap 引擎进行网络和系统侦察的工具,支持自动化和加速扫描: https://github.com/trimstray/sandmap
-
[ Tools ] re_lab - 逆向工程环境的 Docker 镜像: https://github.com/cboin/re_lab
-
[ Vulnerability ] 客户端 CSRF 漏洞实例: https://www.facebook.com/notes/facebook-bug-bounty/client-side-csrf/2056804174333798/
-
[ Vulnerability ] 利用 POP SS 漏洞以内核权限执行任意代码的 Exp(CVE-2018-8897): https://github.com/can1357/CVE-2018-8897
-
-
-
[ Popular Software ] RCE with spring-security-oauth2 分析-【CVE-2018-1260】: https://xz.aliyun.com/t/2330
-
[ Windows ] real whitelisting attempt using applocker,作者尝试实现一个最安全的 AppLocker 白名单,并记录了自己测试过程: https://oddvar.moe/2018/05/14/real-whitelisting-attempt-using-applocker/