腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Browser ] Microsoft Edge Chakra - EntrySimpleObjectSlotGetter 类型混淆漏洞 POC(CVE-2018-8133): https://www.exploit-db.com/exploits/44817
-
[ Browser ] Chrome Fullscreen UI Spoof(CVE-2018-6097): https://bugs.chromium.org/p/chromium/issues/detail?id=806162
-
[ Data Breach ] 因配置不当,Google Groups 上泄露大量敏感数据: https://threatpost.com/public-google-groups-leaking-sensitive-data-at-thousands-of-orgs/132455/
-
[ Industry News ] IE VBScript 0day PoC 代码发布后就立即被加入了 RIG Exploit Kit: https://www.bleepingcomputer.com/news/security/ie-zero-day-adopted-by-rig-exploit-kit-after-publication-of-poc-code/
-
[ iOS ] iOS/macOS 0day 分析利用:从沙箱到内核: https://www.rump.beer/2018/slides/ios_48h.pdf
-
[ macOS ] macOS High Sierra 10.13.5 安全更新内容: https://support.apple.com/en-gb/HT208849Safari 11.1.1 安全更新内容: https://support.apple.com/zh-cn/HT208854
-
[ MalwareAnalysis ] DanaBot 银行木马分析: https://www.proofpoint.com/us/threat-insight/post/danabot-new-banking-trojan-surfaces-down-under-0
-
[ MalwareAnalysis ] 针对 Satan Ransomware 使用的新技术分析: https://www.alienvault.com/blogs/labs-research/satan-ransomware-spawns-new-methods-to-spread
-
[ Network ] 网络钓鱼防护 - 公共 DNS 提供商的安全过滤器性能比较: https://medium.com/@nykolas.z/phishing-protection-comparing-dns-security-filters-9d5a09849b91
-
[ Pentest ] 绕过应用白名单限制的小技巧: https://snippets.cacher.io/snippet/cc4fe207c0bcc2779faf
-
[ Pentest ] PowerShell:使用 CertUtil.exe 进行内存注入攻击: https://www.coalfire.com/The-Coalfire-Blog/May-2018/PowerShell-In-Memory-Injection-Using-CertUtil-exe
-
[ Tools ] WinPwnage - Windows 各种攻击工具与技术的整合: https://github.com/rootm0s/WinPwnage
-
[ Tools ] superdump - 用于自动化分析崩溃内存转储的工具: https://github.com/Dynatrace/superdump
-
[ Tools ] scat - 动态分析二进制程序检索与函数相关信息的工具: https://github.com/Frky/scat
-
[ Tools ] diskover - 基于 Elasticsearch 实现的文件系统搜索分析工具: https://github.com/shirosaidev/diskover
-
[ Tools ] MuddyWater-APT - MuddyWater APT 检测指标: https://github.com/socprime/MuddyWater-APT
-
[ Vulnerability ] 不要相信 PID,关于 PID 替换的逻辑漏洞介绍: https://saelo.github.io/presentations/warcon18_dont_trust_the_pid.pdf
-
[ Web Security ] PHP Dashboards NEW 5.5 - 'email' SQL Injection POC: https://www.exploit-db.com/exploits/44814/
-
[ Web Security ] 基于上下文的 XSS 漏洞利用: https://brutelogic.com.br/blog/transcending-context-based-filters/
-
[ Windows ] Windows 10 DLL 信息收集站点: http://windows10dll.nirsoft.net/index.html
-
[ WirelessSecurity ] 通过蓝牙建立交互式 Shell: https://www.tarlogic.com/en/blog/interactive-shell-via-bluetooth/
-
[ WirelessSecurity ] 无线网卡新技巧:通过 Wi-Fi 固件修改增强智能手机的性能和安全性(Paper): http://tuprints.ulb.tu-darmstadt.de/7243/