腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Forensics ] 揭密针对 Android 设备的物理取证手法: https://blog.elcomsoft.com/2018/05/demystifying-android-physical-acquisition/
-
[ Forensics ] 使用 osquery 收集 NTFS 取证信息: https://blog.trailofbits.com/2018/05/28/collect-ntfs-forensic-information-with-osquery/
-
[ Industry News ] 利用声波攻击可损坏硬盘导致操作系统崩溃: https://threatpost.com/sonic-tone-attacks-damage-hard-disk-drives-crashes-os/132343/
-
[ Language ] .NET 应用体系结构指南: https://twitter.com/i/web/status/1001481792602476545
-
[ Linux ] NetBSD 网络栈安全审计记录: https://blog.netbsd.org/tnf/entry/network_security_audit
-
[ Malware ] US CERT 发布 HIDDEN COBRA 活动使用的 Joanap 木马和 Brambul SMB 蠕虫调查: https://www.us-cert.gov/ncas/alerts/TA18-149A
-
[ MalwareAnalysis ] 针对 Iron 网络犯罪团伙近期的活动分析: https://www.intezer.com/iron-cybercrime-group-under-the-scope-2/
-
[ Others ] Apple 是如何存储用户所有电子邮件的元数据: https://medium.com/@sabrihaddouche/how-apple-stored-all-your-email-metadata-for-years-on-their-servers-2a61b1a3232d
-
[ Pentest ] Ethereum dApps 渗透测试记录: https://arvanaghi.com/blog/pentesting-ethereum-dapps/
-
[ Popular Software ] Adobe Acrobat OCG setIntent 整数溢出及补丁绕过分析: https://www.zerodayinitiative.com/blog/2018/5/29/malicious-intent-using-adobe-acrobats-ocg-setintent
-
[ Popular Software ] Microsoft Office 公式编辑器缓冲区溢出漏洞分析(CVE-2017-11882),Video: https://www.youtube.com/watch?v=YRuBIoZG_0E
-
[ ReverseEngineering ] 逆向分析 DLL 注入工具 mavinject: https://twitter.com/i/web/status/1001498725758349312
-
[ Symbolic Execution ] A Survey of Symbolic Execution Techniques: https://arxiv.org/pdf/1610.00502.pdf
-
[ Tools ] pwnedOrNot - 调用 haveibeenpwned API 检测邮箱账户密码是否泄露的脚本: https://github.com/thewhiteh4t/pwnedOrNot
-
[ Tools ] FireEye 发布用于远程认证时的来源地理位置分析工具 - GeoLogonalyzer: https://www.fireeye.com/blog/threat-research/2018/05/remote-authentication-geofeasibility-tool-geologonalyzer.html
-
[ Tools ] DECAF - 基于 QEMU 的二进制分析平台: https://github.com/sycurelab/DECAF
-
[ Tools ] diskover - 基于 Elasticsearch 实现的文件系统搜索分析工具: https://github.com/shirosaidev/diskover
-
[ Vulnerability ] Git 任意代码执行漏洞分析与解决方案(CVE-2018-11235): https://blogs.msdn.microsoft.com/devops/2018/05/29/announcing-the-may-2018-git-security-vulnerability/
-
[ Web Security ] Joomla! Core XSS 漏洞补丁绕过(CVE-2018-11326): https://www.fortinet.com/blog/threat-research/incomplete-patch--another-joomla--core-xss-vulnerability-is-disc.html
-
[ Web Security ] XSS 盲打手法介绍: https://medium.com/@SyntaxError4/blind-xss-for-beginners-c88e48083071
-
[ Windows ] Microsoft Windows JScript Error 对象 UAF 导致远程代码执行漏洞披露(0day): https://www.zerodayinitiative.com/advisories/ZDI-18-534/
-
[ APT ] SideWinder“响尾蛇”APT组织(T-APT-04):针对南亚的定向攻击威胁: http://www.freebuf.com/articles/paper/172628.html
-
[ Crypto ] EOS节点远程代码执行漏洞 — EOS智能合约WASM函数表数组越界: http://blogs.360.cn/blog/eos%E8%8A%82%E7%82%B9%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E/
-