腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Android ] Insider Attack Resistance ,主要介绍了 Google Pixel 2 的安全防御措施: https://android-developers.googleblog.com/2018/05/insider-attack-resistance.html?linkId=52415350
-
[ Backdoor ] 使用 Github 作为 C&C 服务的 JavaScript 后门分析: http://www.pwncode.club/2018/05/javascript-based-bot-using-github-c.html
-
[ Browser ] 通过 web_accessible_resources 属性破坏 Chrome 扩展应用: https://bugs.chromium.org/p/chromium/issues/detail?id=814315
-
[ Browser ] 利用 CSS3 特性对浏览器进行侧信道攻击: https://www.evonide.com/side-channel-attacking-browsers-through-css3-features/
-
[ Crypto ] 对 Apple Secure Enclave 的加密分析: https://darthnull.org/security/2018/05/31/secure-enclave-ecies/
-
[ iOS ] iOS 越狱内幕(1):iOS 11.3 之后重新挂载根文件系统(rootfs): https://media.weibo.cn/article?id=2309404245794218721506
-
[ Language ] PHP 代码审计寻找 XSS 漏洞: https://brutelogic.com.br/blog/looking-xss-php-source
-
[ Linux ] 利用 PATH 环境变量进行 Linux 提权: http://www.hackingarticles.in/linux-privilege-escalation-using-path-variable/
-
[ MalwareAnalysis ] Talos 对一款针对韩国用户的 NavRAT 木马分析: https://blog.talosintelligence.com/2018/05/navrat.html
-
[ MalwareAnalysis ] 银行木马 IcedID 与 Trickbot 僵尸网络背后的运营者开始联手发起攻击: https://www.flashpoint-intel.com/blog/trickbot-icedid-collaborate-increase-impact
-
[ Mobile ] 移动设备上特殊的 XSS 攻击利用方式: https://brutelogic.com.br/blog/xss-in-mobile-devices/
-
[ Network ] Tcpdump Examples : https://hackertarget.com/tcpdump-examples/
-
[ Operating System ] 深入理解 OpenBSD 内核 - 从用户空间到内核空间的进程创建过程: https://medium.com/@_neerajpal/openbsd-kernel-internals-creation-of-process-from-user-space-to-kernel-space-31a504389f87
-
[ Others ] Lord of x86 Rings:x86 上的便携式用户模式特权分离体系架构(paper): https://arxiv.org/pdf/1805.11912.pdf
-
[ Others ] 从 LinkedIn 页面提取用户列表的技巧: https://www.peerlyst.com/posts/scraping-linkedin-for-target-names-tinkersec
-
[ Pentest ] 使用 PowerUpSQL 导出活动目录信息: https://blog.netspi.com/dumping-active-directory-domain-info-with-powerupsql/
-
[ Popular Software ] Talos 继本月初披露 Natus NeuroWorks 多个漏洞后,最近又发现此软件额外的 3 处漏洞: https://blog.talosintelligence.com/2018/05/vulnerability-spotlight-natus-part2.html
-
[ Popular Software ] 使用 osquery 管理防火墙: https://blog.trailofbits.com/2018/05/30/manage-your-fleets-firewalls-with-osquery/
-
[ Popular Software ] 数据库系统体系结构介绍: http://db.cs.berkeley.edu/papers/fntdb07-architecture.pdf
-
[ Programming ] 使用 F# 编写 .NET Core 全局工具: https://gregshackles.com/writing-net-core-global-tools-with-fsharp/
-
-
[ Tools ] diffy - 由 Netflix 的安全情报和响应团队(SIRT)开发的数字取证及事件响应(DFIR)工具: https://github.com/Netflix-Skunkworks/diffy
-
[ Tools ] USB Forensic Tracker (USBFT) Version 1.1.0 发布: https://twitter.com/orionforensics/status/1001642661118267397
-
[ Tools ] BurpBounty - 用于改善主动及被动式扫描的 BurpSuite 扩展插件: https://github.com/wagiro/BurpBounty
-
[ Tools ] Anbox - 使用基于容器的方式在 Linux 系统上启动 Android 系统的工具: https://github.com/anbox/anbox
-
-
[ Tools ] xHook - 针对 Android 平台 ELF 的 PLT (Procedure Linkage Table) hook 库: https://github.com/iqiyi/xHook
-
[ Tools ] lsrootkit - UNIX Rootkit 检测工具: https://github.com/David-Reguera-Garcia-Dreg/lsrootkit
-
[ Tools ] MalwarePersistenceScripts - 恶意软件持久化操作脚本: https://github.com/TestingPens/MalwarePersistenceScripts
-
[ Tools ] windows-syscalls - 从 Windows NT 开始的所有 Windows 版本中的系统调用表收集仓库: https://github.com/j00ru/windows-syscalls
-
[ Tools ] PassFiltEx - 活动目录环境下的密码过滤器,用于避免域用户使用弱密码: https://github.com/ryanries/PassFiltEx
-
[ Windows ] 使用基于 Hypervisor 的主动数据保护技术保护 Windows 内核动态分配内存的完整性和保密性(Paper): https://arxiv.org/ftp/arxiv/papers/1805/1805.11847.pdf
-
[ Windows ] Windows 10 安全加固手册: https://www.asd.gov.au/publications/protect/Hardening_Win10.pdf
-
[ Windows ] Windows 10 Insider Preview Build 17682 介绍: https://blogs.windows.com/windowsexperience/2018/05/31/announcing-windows-10-insider-preview-build-17682/
-
[ Network ] 漫画风讲解 DNS over HTTPS : https://hacks.mozilla.org/2018/05/a-cartoon-intro-to-dns-over-https/
-
[ Others ] Security, Moore’s law, and the anomaly of cheap complexity: https://docs.google.com/presentation/d/17bKudNDduvN-7hWv7S84MiHUj2AnOPNbwjTM8euDC8w/edit#slide=id.p1
-
-
-