腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Browser ] Google Chrome处理 WebAssembly Locals 时存在整数溢出漏洞(CVE-2018-6092) : https://bugs.chromium.org/p/project-zero/issues/detail?id=1546
-
[ Data Breach ] 人力资源软件公司 PageUp 感染恶意软件,用户个人敏感数据遭泄漏: https://threatpost.com/pageup-malware-scare-sheds-light-on-third-party-risks/132571/
-
[ Data Breach ] Linux Forums 因使用旧版 vBulletin 导致 27.6 万用户信息泄漏: https://twitter.com/i/web/status/1004710002425323521
-
[ iOS ] 从 iOS 文件系统 TAR 包中取证,提取用户位置信息: https://blog.elcomsoft.com/2018/06/the-ios-file-system-tar-and-aggregated-locations-analysis/
-
[ MalwareAnalysis ] 窃取银行账户的恶意 Chrome 扩展应用 Desbloquear Conteúdo 分析: https://securelist.com/a-mitm-extension-for-chrome/86057/
-
[ MalwareAnalysis ] FireEye 对 TRITON 恶意软件框架和 TriStation 协议的分析: https://www.fireeye.com/blog/threat-research/2018/06/totally-tubular-treatise-on-triton-and-tristation.html
-
[ MalwareAnalysis ] 恶意软件分析之解码 Emotet 恶意软件 part 2: https://blog.malwarebytes.com/threat-analysis/2018/06/malware-analysis-decoding-emotet-part-2/
-
[ MalwareAnalysis ] 对 Loki-Bot 恶意软件 Crypter 的分析,其利用 Visual Basic 6.0 加载 shellcode 投递 Payload : https://www.endgame.com/blog/technical-blog/what-year-it-vb6-payload-crypter
-
[ MalwareAnalysis ] ESET 对间谍软件 InvisiMole 的分析: https://www.welivesecurity.com/2018/06/07/invisimole-equipped-spyware-undercover/
-
[ MalwareAnalysis ] Check Point 安全团队发现 Karius 银行木马通过 RIG Exploit Kit 进行分发并进行了分析: https://research.checkpoint.com/banking-trojans-development/
-
[ Others ] 利用现代 CPU 特性来自动检测,消除 Double-Fetch 漏洞,来自 AsiaCCS18 大会: https://misc0110.net/web/files/double_fetch_slides.pdf
-
[ Pentest ] 使用 CloudFlare 服务做 C&C 通信: https://vincentyiu.co.uk/cloudflare-for-command-and-control/
-
[ Popular Software ] Advantech WebAccess 产品的 RPC 接口漏洞分析: https://www.zerodayinitiative.com/blog/2018/6/7/down-the-rabbit-hole-a-deep-dive-into-an-attack-on-an-rpc-interface
-
[ Popular Software ] Adobe 发布安全公告,修复包括已发现野外利用样本的 Flash 0Day(CVE-2018-5002) 在内的多个漏洞: https://helpx.adobe.com/security/products/flash-player/apsb18-19.html ; 针对 Flash 0Day(CVE-2018-5002) 的技术分析: https://mp.weixin.qq.com/s/5gujC2O8Emk-XOCE8RGGqwhttp://www.freebuf.com/vuls/174206.htmlhttps://www.icebrg.io/blog/adobe-flash-zero-day-targeted-attack
-
[ Popular Software ] Cisco WAAS 硬编码凭证漏洞与本地提权漏洞分析(CVE-2018-0352、CVE-2018-0329): https://xor.cat/2018/06/07/cisco-waas-multiple-cves/
-
[ Tools ] DeathStar - 调用 Empire RESTful API 自动化获取域管权限的 Python 脚本发布: https://github.com/byt3bl33d3r/DeathStar
-
[ Tools ] raspberry-pi-os - 使用 Linux 内核和 Raspberry Pi 进行操作系统开发的学习指南: https://github.com/s-matyukevich/raspberry-pi-os
-
-
[ Tools ] Active Directory Domain Services Section 活动目录管理 PowerShell 脚本 V1.1 发布: https://sid-500.com/2018/05/22/active-directory-domain-services-section-version-1-1/
-
[ Tools ] bro - 一款网络分析与安全监控框架: https://github.com/bro/bro
-
[ Tools ] Nccgroup 发布 BurpSuite 的自动化反序列化漏洞检测插件 Freddy: https://www.nccgroup.trust/uk/about-us/newsroom-and-events/blogs/2018/june/finding-deserialisation-issues-has-never-been-easier-freddy-the-serialisation-killer/
-
[ Web Security ] 最短的反射型 XSS 攻击 Payload: https://brutelogic.com.br/blog/shortest-reflected-xss-possible/?utm_source=ReviveOldPost
-
[ Web Security ] Web 应用安全测试前期情报收集方法与工具介绍: https://medium.com/securityescape/recon-my-way-82b7e5f62e21
-
[ Web Security ] 印度 Popular Sports 公司网站主机头 SQL 注入漏洞挖掘记录: https://medium.com/@logicbomb_1/bugbounty-database-hacked-of-indias-popular-sports-company-bypassing-host-header-to-sql-7b9af997c610
-
[ Windows ] 借助 Sysmon 配置强大的客户端检测环境: https://medium.com/@olafhartong/endpoint-detection-superpowers-on-the-cheap-part-1-e9c28201ac47
-
[ Windows ] 绕过杀软在 Windows 10 上内存执行 Meterpreter: https://www.n00py.io/2018/06/executing-meterpreter-in-memory-on-windows-10-and-bypassing-antivirus/
-
-
[ Tools ] BinSequencer - 通过使用 byte -> opcode 抽象方法来匹配不同文件代码的相似部分从而生成YARA 规则的脚本工具: http://ropgadget.com/posts/intro_binsequencer.html
-