腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Android ] 使用网络表示学习(LINE)进行 Android 恶意软件检测: https://arxiv.org/abs/1806.04847
-
[ Browser ] JavaScript engine fundamentals: Shapes and Inline Caches: https://mathiasbynens.be/notes/shapes-ics
-
[ Browser ] Vulnerability Discovery Against Apple Safari,Pwn2Own 2018 Safari 漏洞利用开发记录系列 Part 2: http://blog.ret2.io/2018/06/13/pwn2own-2018-vulnerability-discovery/
-
[ Browser ] Chromium JSFunction::GetDerivedMap 漏洞披露(CVE-2018-6056): https://bugs.chromium.org/p/chromium/issues/detail?id=806388
-
[ Browser ] Chrome 扩展安全开发和审计指南: https://thehackerblog.com/kicking-the-rims-a-guide-for-securely-writing-and-auditing-chrome-extensions/
-
[ Debug ] 使用 ptrace 进行反调试并实现对 ptrace 的隐藏调用: https://github.com/yellowbyte/analysis-of-anti-analysis/blob/master/research/hiding_call_to_ptrace/hiding_call_to_ptrace.md
-
[ Hardware ] Intel Lazy FP state restore 漏洞公布,可能被用来泄漏信息(CVE-2018-3665): https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00145.html
-
[ iOS ] iOS-Apfs-Persistence-Exploit - iOS APFS 持久化漏洞利用程序: https://github.com/pwn20wndstuff/iOS-Apfs-Persistence-Exploit writeup: https://blog.umangis.me/persistent-r-w-on-ios-11-2-6/
-
[ macOS ] 通过滥用 Apple 开发人员工具创建自签名及插入自定义后门的 macOS 应用程序: https://medium.com/@adam.toscher/creating-signed-and-customized-backdoored-macos-applications-by-abusing-apple-developer-tools-b4cbf1a98187
-
[ MalwareAnalysis ] 新型安卓银行木马 MysteryBot 分析: https://www.threatfabric.com/blogs/new_Android_banking_trojan_mysterybot__ready_to_target_Android_7_8.html
-
[ Network ] 使用 Microsoft 365 搭建零信任网络(zero trust network): https://cloudblogs.microsoft.com/microsoftsecure/2018/06/14/building-zero-trust-networks-with-microsoft-365/
-
[ Others ] 如何在网络安全领域获得职业的成功:信息安全入门,学习,练习和成长指南,来自 ᴅaniel ᴍiessler : https://danielmiessler.com/blog/build-successful-infosec-career/
-
[ Pentest ] 使用 LD_Preload 进行 Linux 特权提升: http://www.hackingarticles.in/linux-privilege-escalation-using-ld_preload/
-
[ Pentest ] 滥用 SeLoadDriverPrivilege 提升权限: https://www.tarlogic.com/en/blog/abusing-seloaddriverprivilege-for-privilege-escalation/
-
[ Pentest ] 服务器端电子表格注入 - 从公式注入到远程代码执行: https://www.bishopfox.com/blog/2018/06/server-side-spreadsheet-injections/
-
[ ReverseEngineering ] Samsung EVO 840 SSD 的逆向分析: http://www2.futureware.at/~philipp/ssd/TheMissingManual.pdf
-
[ SecurityAdvisory ] WebKitGTK+ 及 WPE WebKit 安全公告: https://webkitgtk.org/security/WSA-2018-0005.html
-
[ Tools ] binja-secret - 封装了 frida, unicorn, capstone 和 keystone 的 binja 插件: https://github.com/iGio90/binja-secret
-
[ Tools ] XXE 漏洞利用指南: https://phonexicum.github.io/infosec/xxe.html
-
[ Windows ] Windows 中使用 netsh 命令进行端口转发技巧: http://woshub.com/port-forwarding-in-windows/
-
[ Windows ] SPPLUAObjectUacBypass: 通过 SPPLUAObject 设置注册表键值触发 UAC 绕过: https://github.com/deroko/SPPLUAObjectUacBypass
-
[ iOS ] iOS 11.2 -> iOS 11.3.1 越狱项目 Osiris-Jailbreak 发布(开发中): https://github.com/GeoSn0w/Osiris-Jailbreak
-
[ MalwareAnalysis ] “隐蜂”来袭:金山毒霸截获全球首例Bootkit级挖矿僵尸网络 (下篇): http://www.freebuf.com/articles/system/174575.html
-
[ Tools ] CISO/cybersecurity job Mindmap: http://rafeeqrehman.com/wp-content/uploads/2018/05/CISO_MindMap_2018.png
-