腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Hardware ] Side-channels considered hARMful: https://mlq.me/download/qmss2018_slides.pdf
-
[ Hardware ] 基于推测执行攻击访问系统管理模式(SMM)的内存: https://blog.eclypsium.com/2018/05/17/system-management-mode-speculative-execution-attacks/
-
[ Industry News ] 一家提供追踪美国四大移动运营商客户定位信息的 LocationSmart 公司网站存在问题,可泄露用户实时位置数据: https://krebsonsecurity.com/2018/05/tracking-firm-locationsmart-leaked-location-data-for-customers-of-all-major-u-s-mobile-carriers-in-real-time-via-its-web-site/
-
[ iOS ] Jailbreak on iOS 11.3.1(Video): https://twitter.com/s0rrymybad/status/997122283352158209
-
[ IoTDevice ] pwn910nd - 滥用基于 OpenWRT 的路由内打印服务 p910nd 获取 root 权限(CVE-2018-10123): https://neonsea.uk/blog/2018/04/15/pwn910nd.html
-
[ Linux ] BinExp - Linux 二进制漏洞利用教程: https://github.com/r0hi7/BinExp
-
[ Linux ] Qualys 对 Procps-ng 的安全审计报告,发现多处漏洞: https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt
-
[ Malware ] 利用 AI 来攻击 IA:一种针对智能手机中语音辅助功能的新间谍软件(Paper): https://arxiv.org/pdf/1805.06187.pdf
-
[ MalwareAnalysis ] ForcePoint 对 Ursnif 银行木马变种的分析: https://blogs.forcepoint.com/security-labs/many-faces-ursnif-email-hijacking-mailslots-and-insecure-servers?sf88538136=1
-
[ MalwareAnalysis ] Minerva 对 AZORult 信息窃取恶意软件的分析: https://blog.minerva-labs.com/puffstealer-evasion-in-a-cloak-of-multiple-layers
-
[ MalwareAnalysis ] Mcafee_labs 对 Google Play 上恶意活动 RedDawn 的分析: https://securingtomorrow.mcafee.com/mcafee-labs/malware-on-google-play-targets-north-korean-defectors/
-
[ Mobile ] SMS 和 PDU 格式介绍: http://www.smartposition.nl/resources/sms_pdu.html
-
[ Operating System ] 3 小时内理解 Kubernetes,Kubernetes 详细入门指南: https://medium.freecodecamp.org/learn-kubernetes-in-under-3-hours-a-detailed-guide-to-orchestrating-containers-114ff420e882
-
-
[ Others ] 将 C# 程序转换为 XSL 文件并使用 WMIC 执行 XSL 的方法: https://rastamouse.me/2018/05/csharp-dotnettojscript-xsl/
-
[ Popular Software ] Flash SWF 中挖掘漏洞: http://10degres.net/testing-flash-swf/
-
[ SecurityProduct ] 基于主机数据的入侵检测系统(IDS)调查报告: https://arxiv.org/abs/1805.06070
-
[ SecurityReport ] McAfee 发布2018年 3 月威胁报告: https://www.mcafee.com/us/resources/misc/infographic-threats-report-mar-2018.pdf
-
[ Tools ] OWASP-Web-Checklist - OWASP Web 安全检测清单: https://github.com/0xRadi/OWASP-Web-Checklist
-
[ Tools ] sh - shell 解析器,格式化器和解释器,支持POSIX Shell,Bash 以及 mksh: https://github.com/mvdan/sh
-
[ Tools ] linux_screenshot_xwindows - 从内存转储中提取所有打开的 Xwindows 的屏幕截图: https://github.com/eurecom-s3/linux_screenshot_xwindows
-
[ Vulnerability ] Spring Security Oauth2 远程代码执行漏洞详情与利用(CVE-2018-1260) Part2: http://gosecure.net/2018/05/17/beware-of-the-magic-spell-part-2-cve-2018-1260/
-
[ Windows ] Windows 昨日发布的内部预览版(build 17672)在 Microsoft Edge中引入了对 SameSite cookies 机制的支持: https://blogs.windows.com/msedgedev/2018/05/17/samesite-cookies-microsoft-edge-internet-explorer/
-
[ Windows ] Windows 本地提权漏洞利用程序(cve-2018-8120): https://github.com/bigric3/cve-2018-8120
-
[ Windows ] 修改注册表键值绕过 UAC 的方法: https://attackiq.com/blog/2018/05/14/bypassing-uac-using-registry-keys/
-
[ Windows ] 最新的 Windows 10 更新将支持 SSH 客户端: http://www.centinosystems.com/blog/powershell/openssh-is-now-part-of-windows/
-
[ Windows ] Windows 漏洞利用开发入门:线程调试与内存分析: http://blog.k3170makan.com/2018/05/windows-exploit-development-primer.html
-
[ Windows ] CVE-2018-8120 Windows 本地提权漏洞 POC: https://github.com/leeqwind/HolicPOC/blob/master/windows/win32k/CVE-2018-8120/x86.cpp
-
[ WirelessSecurity ] Kali 下的蓝牙设备侦察方法: https://www.hackers-arise.com/bluetooth-reconnaissance
-
[ Browser ] Google 宣布计划从 Chrome URL 地址栏中删除 "安全" 标识,仅显示锁定图标。该计划将于今年 9 月(chrome 69)开始执行: https://tech.slashdot.org/story/18/05/17/1943224/google-chrome-to-remove-secure-indicator-from-https-pages-in-september
-
[ Linux ] Linux 上通过 compat adjtimex 系统调用中未初始化的结构字段可得到4字节的信息泄露: https://bugs.chromium.org/p/project-zero/issues/detail?id=1574