腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Android ] Chainspotting: 利用 11 个逻辑错误构建漏洞利用链来打 Samsung Galaxy S8,Mobile Pwn2Own 史上的最长漏洞利用链,来自 MWRLabs: https://labs.mwrinfosecurity.com/publications/chainspotting-building-exploit-chains-with-logic-bugs/
-
[ Backdoor ] 注册表中的 PowerShell 后门分析: https://az4n6.blogspot.com/2018/06/malicious-powershell-in-registry.html
-
[ Crypto ] "ROHNP” - 多个加密库可通过侧信道攻击提取密钥(CVE-2018-0495): https://www.nccgroup.trust/us/our-research/technical-advisory-return-of-the-hidden-number-problem/?style=Cyber+Security
-
[ Hardware ] Intel 的 FP寄存器的内容可能被其它进程推测,泄漏 FP 寄存器内容: http://www.openwall.com/lists/oss-security/2018/06/13/7
-
[ Industry News ] 据报道,朝鲜黑客在最近的攻击中滥用 ActiveX 0day 漏洞: https://www.securityweek.com/north-korean-hackers-abuse-activex-recent-attacks
-
[ iOS ] iOS 安全资料收集: https://github.com/writeups/iOS
-
[ iOS ] 由于在 getvolattrlist 中缺少过小(lower size)检查导致 MacOS/iOS 内核堆溢出(CVE-2018-4243) : https://bugs.chromium.org/p/project-zero/issues/detail?id=1564
-
[ Malware ] Kromtech 安全中心在 Docker Hub 上发现17个恶意 Docker 镜像被用于挖掘门罗币: https://kromtech.com/blog/security-center/cryptojacking-invades-cloud-how-modern-containerization-trend-is-exploited-by-attackers
-
[ MalwareAnalysis ] 针对 Android 设备的恶意加密矿工调查报告,来自 Sophos: https://www.sophos.com/en-us/medialibrary/PDFs/technical-papers/sophos-coinminer-and-other-malicious-cryptominers-tpna.aspx
-
[ Others ] 针对 Enigmail 欺骗 GnuPG 签名的方法介绍(CVE-2018-12019) : https://neopg.io/blog/enigmail-signature-spoof/
-
[ Pentest ] jpcert 的通过追踪事件日志检测横向渗透攻击(第2版) : https://www.jpcert.or.jp/english/pub/sr/Detecting%20Lateral%20Movement%20through%20Tracking%20Event%20Logs_version2.pdf
-
[ Pentest ] 渗透测试工程师的 Windows NTFS 利用技巧收集: https://www.sec-consult.com/en/blog/2018/06/pentesters-windows-ntfs-tricks-collection/
-
[ Popular Software ] Drupal 的 Custom Tokens 模块任意 PHP 代码执行漏洞披露: https://www.drupal.org/sa-contrib-2018-041
-
[ Popular Software ] WebCTRL OOB XXE 漏洞挖掘记录(CVE-2018-8819): https://www.coalfire.com/Solutions/Coalfire-Labs/The-Coalfire-LABS-Blog/june-2018/how-i-found-cve-2018-8819-out-of-band-(oob)-xxe
-
[ SecurityProduct ] Bitdefender Total Security 权限提升漏洞修复不完善,可继续利用: https://blog.silentsignal.eu/2018/01/08/bare-knuckled-antivirus-breaking/#update180613
-
[ Tools ] awesome-design-patterns - 优秀软件与架构设计模式资源收集: https://github.com/DovAmir/awesome-design-patterns
-
[ Tools ] 一个第三方脚本在线检测工具 3rdparty.io: http://3rdparty.io/
-
[ Tools ] Burp Suite 1.7.34 版本发布: http://releases.portswigger.net/2018/06/1734.html
-
[ Vulnerability ] Lua 版的 MessagePack 序列化库 Lua-cmsgpack 被发现多个漏洞,这个库广泛用于 Redis 服务器中,作者特别提示,提供 Redis 托管服务的云厂商需要特别注意一下: http://antirez.com/news/119
-
[ Web Security ] 使用 WebUSB 绕过 U2F 钓鱼防护(CVE-2018-6125): https://www.yubico.com/support/security-advisories/ysa-2018-02/
-
[ Windows ] Microsoft wimgapi LoadIntegrityInfo 代码执行漏洞分析(CVE-2018-8210): https://www.talosintelligence.com/reports/TALOS-2018-0545
-
[ Windows ] Windows 令牌处理存在漏洞,可绕过子进程限制缓解策略实现本地提权(CVE-2018-0982): https://bugs.chromium.org/p/project-zero/issues/detail?id=1544
-
-
[ APT ] Hacking Team卷土重来?CVE-2018-5002 Flash 0day漏洞APT攻击分析与关联: http://www.freebuf.com/vuls/174246.html
-
[ Attack ] LuckyMouse 组织针对中亚国家数据中心发起持续性水坑攻击: https://securelist.com/luckymouse-hits-national-data-center/86083/
-
[ Pentest ] Oracle Endeca 基础知识介绍与 ESQL 注入攻击: https://labs.mwrinfosecurity.com/blog/eql-injection-and-oracle-endeca/
-
[ ReverseEngineering ] 逆向 Windows Defender 的 JS 引擎,来自 REcon Brussels 2018 大会: https://recon.cx/2018/brussels/resources/slides/RECON-BRX-2018-Reverse-Engineering-Windows-Defender-s-JavaScript-Engine.pdf
-
-
[ Windows ] 用户模式下程序导致 Windows 8 及更高的版本崩溃的漏洞POC及详细分析: http://www.geoffchappell.com/studies/windows/km/ntoskrnl/api/ex/profile/bugdemo.htm