腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Browser ] HSTS Bypass Vulnerability in IE Preview: https://medium.com/bugbountywriteup/hsts-bypass-vulnerability-in-ie-preview-fa956161fa8
-
[ Cloud ] 针对微软 Azure Cloud 的攻击技术介绍: https://speakerdeck.com/tweekfawkes/blue-cloud-of-death-red-teaming-azure-1
-
[ Hardware ] Nethammer:通过网络请求引发 Rowhammer 攻击(Paper): https://arxiv.org/abs/1805.04956
-
[ iOS ] 盘古实验室发现 ZipperDown 漏洞,约 10 %的 iOS 应用可能受影响,可造成应用数据破坏,一定条件下可任意执行代码: https://zipperdown.org/ https://github.com/ZipArchive/ZipArchive/issues/453
-
[ IoTDevice ] GE Healthcare MAC5500 心电图设备漏洞分析(CVE-2018-6020、CVE-2018-6021) https://www.atredis.com/blog/2018/5/14/ge-healthcare-mac-5500-vulnerabilities
-
[ Language ] PHP 中 0e 开头的魔术 Hash 介绍: https://www.whitehatsec.com/blog/magic-hashes/
-
[ Linux ] DHCP 客户端脚本代码执行漏洞披露(CVE-2018-1111): https://access.redhat.com/security/vulnerabilities/3442151 https://twitter.com/i/web/status/996470756283486209
-
[ Linux ] 50 ton of Backdoors,部署 Linux 后门的多种方式: https://www.slideshare.net/ulissescastro/50-ton-of-backdoors
-
[ MachineLearning ] CLOUDFUZZ:通过机器学习训练生成更多用于模糊测试的输入以提升代码覆盖率: https://payatu.com/cloudfuzz-machine-learning-powered-content-specific-input-generation-fuzzing/
-
[ Pentest ] 使用 WinRM 进行横向渗透: https://pentestlab.blog/2018/05/15/lateral-movement-winrm/
-
[ Popular Software ] Adobe Acrobat Reader DC 远程代码执行漏洞详情披露(CVE-2018-4996、CVE-2018-4947): https://blog.talosintelligence.com/2018/05/multiple-acrobat-reader-vulns.html
-
[ Popular Software ] ESET研究人员发现组合利用Adobe Reader远程代码执行漏洞(CVE-2018-4990)和Windows内核提权漏洞(CVE-2018-8120)的野外样本: https://www.welivesecurity.com/2018/05/15/tale-two-zero-days/ https://blog.malwarebytes.com/threat-analysis/2018/05/adobe-reader-zero-day-discovered-alongside-windows-vulnerability/
-
[ Popular Software ] Spring Data Commons 组件(CVE-2018-1273)注入导致的远程代码执行漏洞详情及POC: ttp://gosecure.net/2018/05/15/beware-of-the-magic-spell-part-1-cve-2018-1273/
-
[ Popular Software ] Signal 应用桌面版 HTML 注入远程代码执行漏洞利用详情(CVE-2018-10994): https://packetstormsecurity.com/files/147614/signaldesktop-inject.txt
-
[ ReverseEngineering ] 逆向 Path of Exile 游戏系列, Part 1: http://tbinarii.blogspot.in/2018/05/reverse-engineering-path-of-exile.html Part 2: http://tbinarii.blogspot.in/2018/05/reverse-engineering-path-of-exile_0.html Part 3: http://tbinarii.blogspot.in/2018/05/reverse-engineering-path-of-exile-game.html
-
[ SecurityReport ] Kaspersky Lab 发布 2018 Q1 季度 IT 威胁演变分析: https://securelist.com/it-threat-evolution-q1-2018-statistics/85541
-
[ Tools ] Shell 编码规范指南: https://google.github.io/styleguide/shell.xml
-
[ Tools ] GitBackdorizer - 通过修改 git 仓库的 hook 文件钓取用户 git 凭证的工具: https://github.com/UnkL4b/GitBackdorizer
-
[ Tools ] TheDoc - SQLMAP 自动化利用脚本: https://github.com/0x3curity/TheDoc
-
[ Tools ] AUSERA:大规模的自动化安全风险评估系统(Paper): https://arxiv.org/pdf/1805.05236.pdf
-
[ Tools ] honeybits - 一款 Go 语言开发的蜜罐: https://github.com/0x4D31/honeybits
-
[ Tools ] CredNinja - 多线程验证用户凭据是否正确的工具: https://github.com/Raikia/CredNinja
-
[ Tools ] PLAN9 Acme 环境下的电子邮件配置教程: http://akpoff.com/archive/2018/email_config_plan9_acme_openbsd.html
-
[ Web Security ] 预测 Java 的随机数生成实现 CSRF 攻击: https://blog.securityevaluators.com/cracking-javas-rng-for-csrf-ea9cacd231d2
-
[ Windows ] UAC 绕过技巧分享 来自 DEFCON China: https://github.com/FuzzySecurity/DefCon-Beijing-UAC/blob/master/DCCBeijing_UAC-0day-All-Day_v1.0.pdf
-
[ Windows ] 修改注册表键值绕过 UAC 限制的方法: https://attackiq.com/blog/2018/05/14/bypassing-uac-using-registry-keys/
-
[ Windows ] 微软修复 CVE-2018-8174 VBScript 远程代码执行漏洞存在问题,会导致部分机器无法上网,0patch 团队对漏洞进行分析并给出了修复补丁: https://blog.0patch.com/2018/05/a-single-instruction-micropatch-for.html
-
[ Windows ] Windows: Token Process Trust SID Access Check Bypass EOP(CVE-2018-8134): https://bugs.chromium.org/p/project-zero/issues/detail?id=1540
-
[ Android ] General ways to find and exploit directory traversals on Android,来自 DEFCON China 大会: https://pan.baidu.com/s/1jAAGvukDuWp5ijAEk1EWQw
-
-
-
[ Popular Software ] Spring Integration Zip不安全解压(CVE-2018-1261)漏洞分析: https://mp.weixin.qq.com/s/SJPXdZWNKypvWmL-roIE0Q