腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Rootkit ] Reptile - LKM Linux rootkit (支持 2.6.x/3.x/4.x 内核版本): https://github.com/f0rb1dd3n/Reptile
-
[ Symbolic Execution ] Practical Symbolic Execution and SATisfiability Module Theories (SMT) 101: http://deniable.org/reversing/symbolic-execution
-
[ Tools ] YubiKey-Guide - 将 YubiKey 用作存储 GPG 加密和签名密钥的智能卡的实用指南: https://github.com/drduh/YubiKey-Guide
-
[ Tools ] HookCase - macOS/OS X 上的逆向分析工具: https://github.com/steven-michaud/HookCase
-
[ Tools ] s3-inspector - 检测 AWS S3 Bucket 权限的工具: https://github.com/kromtech/s3-inspector
-
[ Vulnerability ] D-Link DSL-3782 认证绕过漏洞披露(CVE-2018-8898): https://www.exploit-db.com/exploits/44657/
-
[ Windows ] 从 Windows 10 ssh-agent 中提取 SSH 私钥的方法: https://blog.ropnop.com/extracting-ssh-private-keys-from-windows-10-ssh-agent/
-
[ Windows ] 使用 mstsc 结合 Hash 传递登录 RDP 远程桌面: https://michael-eder.net/post/2018/native_rdp_pass_the_hash/
-
[ Windows ] Windows漏洞利用开发 第2节,破坏结构化异常处理和控制内存指针: http://blog.k3170makan.com/2018/05/windows-exploit-development-primer-ii.html
-
[ Windows ] Windows 注册表安全审计备忘清单: https://static1.squarespace.com/static/552092d5e4b0661088167e5c/t/5a00963153450a8779b23489/1509987890282/Windows
-
[ Windows ] 活动目录中的安全问题与加固方案: https://adsecurity.org/wp-content/uploads/2018/05/2018-NolaCon-Metcalf-ActiveDirectorySecurityTheJourney.pdf
-
-
[ Industry News ] 利用 BINs 码验证漏洞进行无卡欺诈的行为 Biñeros 正在拉丁美州漫延: https://threatpost.com/latin-american-bineros-bond-over-fraudulent-purchase-scheme/132110/
-