腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Browser ] v8 引擎处理 WebAssembly Locals 存在整数溢出漏洞(CVE-2018-6092): https://bugs.chromium.org/p/chromium/issues/detail?id=819869
-
[ Conference ] AREA 41 演讲视频: https://www.youtube.com/user/defconswitzerland/videos
-
[ Detect ] 通过证书透明度发现钓鱼网站: https://scotthelme.co.uk/finding-phishing-sites-with-ct/
-
[ Hardware ] 深入理解 Das U-Boot bootloader,来自 Recon 18 大会: http://cs.dartmouth.edu/~bx/recon.pdf
-
[ iOS ] 使用 AFNetworking 框架禁用 SSL pinning : https://kov4l3nko.github.io/blog/2018-06-17-afnetwork-disable-ssl-pinning/
-
[ IoTDevice ] 安全人员发现 Axis IP 摄像头存在一系列安全漏洞: https://threatpost.com/axis-cameras-riddled-with-vulnerabilities-enabling-full-control/132888/
-
[ Language ] ADOBE ColdFusion Java RMI 反序列化 RCE 漏洞详情(CVE-2018-4939): https://nickbloor.co.uk/2018/06/18/another-coldfusion-rce-cve-2018-4939/
-
[ macOS ] 滥用沙箱绕过 macOS rootless,作者通过沙箱取消了程序对已存在 DLL 的访问权限,进而进行劫持: https://medium.com/0xcc/bypass-macos-rootless-by-sandboxing-5e24cca744be
-
[ MalwareAnalysis ] 现代 Linux 恶意软件大曝光,来自 Recon 18 大会: http://s3.eurecom.fr/~invano/slides/recon18_linux_malware.pdf
-
[ MalwareAnalysis ] 利用 Radare2 和 Cutter 解密 APT33 的 Dropshot 恶意软件: https://www.megabeets.net/decrypting-dropshot-with-radare2-and-cutter-part-2/
-
[ MalwareAnalysis ] SamSam 恶意软件近期活动分析,来自 Malwarebytes Labs: https://blog.malwarebytes.com/threat-analysis/2018/06/samsam-ransomware-controlled-distribution/
-
[ Pentest ] 探索 PowerShell AMSI 和禁用 PowerShell 日志记录: https://www.mdsec.co.uk/2018/06/exploring-powershell-amsi-and-logging-evasion/
-
[ Pentest ] 使用 WMImplant 进行后渗透测试: https://www.fortynorthsecurity.com/wmimplant-post-exploitation-an-introduction/
-
[ Popular Software ] phpMyAdmin 4.x 远程代码执行漏洞 MSF 利用(CVE-2016-5734): https://packetstormsecurity.com/files/148222
-
[ Programming ] Shellcoding for Linux and Windows 教程: http://www.vividmachines.com/shellcode/shellcode.html
-
[ SecurityReport ] Unit42 发布钓鱼研究报告,称在 2018 年 1 月到 3 月期间发现 4000 多个 URL 被用于钓鱼攻击,完整报告: https://researchcenter.paloaltonetworks.com/2018/06/unit42-phishing-nutshell-january-march-2018/
-
[ Tools ] Shellcodes 收集整合站点: http://shell-storm.org/shellcode/
-
[ Tools ] 用 Phasar 进行 C++ 静态分析: https://phasar.org/tutorial/
-
[ Tools ] PE-Linux - Linux 提权辅助脚本: https://github.com/WazeHell/PE-Linux
-
[ Windows ] 使用 .SettingContent-ms 后缀文件执行代码: https://www.trustedsec.com/2018/06/weaponizing-settingcontent/
-
[ APT ] 安全人员发现 APT15 使用的恶意软件 MirageFox 存在代码重用问题: https://www.intezer.com/miragefox-apt15-resurfaces-with-new-tools-based-on-old-ones/
-
-
[ ReverseEngineering ] 逆向工程的发展过程回顾与展望,来自 SSTIC 2018 Halvar Flake: https://docs.google.com/presentation/d/1ljVUiXVi2PfEdolGXr7Wpepj0x2RxaOo9rzMKWXebG4/mobilepresent?slide=id.g3807d77cc5_0_82
-