腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ iOS ] 通过 iOS 设备嗅探网络流量的技巧,无需越狱: https://twitter.com/samykamkar/status/1011166802880020482
-
[ Language ] JavaScript 语言中即将到来的三大改变: https://medium.freecodecamp.org/here-are-three-upcoming-changes-to-javascript-that-youll-love-387bce1bfb0b
-
[ Linux ] 滥用通配符实现 Linux 本地提权: http://www.hackingarticles.in/exploiting-wildcard-for-privilege-escalation/
-
[ macOS ] Hunting for Bad Apples ,寻找企业环境中被攻陷的 macOS 系列,Part 1: https://posts.specterops.io/hunting-for-bad-apples-part-1-22ef2b44c0aa
-
[ Malware ] WannaCry 勒索再度出现,通过电子邮件欺骗用户已受到感染并要求支付赎金: https://threatpost.com/wannacry-extortion-fraud-reemerges/133062/
-
[ Pentest ] 通过 rundll32 调用 COM CLSID 的技巧分享: https://twitter.com/i/web/status/1011350358566821891
-
[ Tools ] 与威胁分析与检测相关的项目工具列表: https://twitter.com/i/web/status/1011290975975673856
-
[ Tools ] Red-Teaming-Toolkit - 红队常用工具整理(包括开源及商业工具): https://github.com/infosecn1nja/Red-Teaming-Toolkit
-
[ Tools ] MalwLess - 通过规则直接生成 Sysmon 以及 PowerShell 事件日志的工具,旨在协助蓝队测试防御规则: https://github.com/n0dec/MalwLess
-
[ Tools ] DeepEnd Research 发布 HOARD 项目,旨在帮助安全维护人员以新的方式利用威胁情报: http://www.deependresearch.org/2018/06/hoard-concept-release.html
-
[ Tools ] SharpShooter v1.0 版本发布,可通过远程加载 XSL 文件的方式绕过 AMSI 对 SharpShooter 的拦截: https://www.mdsec.co.uk/2018/06/freestyling-with-sharpshooter-v1-0/
-
[ Virtualization ] KVM L1 中的特权提升漏洞披露,fwilhelm 发现 KVM 虚拟机在 L2 运行的前提下,L1 层的 VMX 虚拟化指令不会验证,导致特权提升: https://bugs.chromium.org/p/project-zero/issues/detail?id=1589
-
[ Windows ] Licensed Driver Signing in Windows 10 ,在存在 Secure Boot 的情况下加载自签名驱动: http://www.geoffchappell.com/notes/windows/license/customkernelsigners.htm
-
[ Windows ] 在 JScript 中禁用 AMSI 的技巧,来自 James Forshaw : https://tyranidslair.blogspot.com/2018/06/disabling-amsi-in-jscript-with-one.html
-
-
[ Language ] Go 语言的 go get 实现存在无需身份验证的远程命令执行漏洞(CVE-2018-7187): https://tools.cisco.com/security/center/viewAlert.x?alertId=58281
-
[ macOS ] MacOS/iOS 内核 necp_client_action OOB 写漏洞: https://github.com/lvbluesky/MacOS-iOS-kernel-necp_client_action-OOB-write-vulnerability-/blob/master/main.m
-
-
-
[ Popular Software ] Apache Cassandra 3.8 - 3.11.1 版本中默认配置问题导致攻击者可通过 RMI 执行任意代码(CVE-2018-8016): https://mailclark.ai/email/original/12503850/593541/M3vp-UI0-yanjGbgnhEBMWd9_xk
-
[ Side Channel ] 通过分析智能电池的电量消耗轨迹对移动设备进行用户行为推测攻击: https://0f675898-a-62cb3a1a-s-sites.googlegroups.com/site/silbersteinmark/Home/popets18power.pdf?attachauth=ANoY7cqymK4mYe7iVMyiuujppU0IhDoObw2grcf0xUDBt5nZZZeyrGhX6RvdJmgde-UOdqSK0is6ydgI3dNuJh-JX7BedE_KqeebHCg3y2LK6PkqGf_WALwTRlImvAcJlkCRgUGM4ukYKx1AS2_xfRqOhPeYAOqhvq-ewwjVLLJ3WuBFe853EPg8gIByo0vz1oV7EAn23YEuAwt-V60duNX_shIOmmEHOscXDWhnyeTFMDiJ4svaMGI%3D&attredirects=1
-