腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Cloud ] AWS 管理策略常见的错误认知以及加固方法: https://summitroute.com/blog/2018/07/02/aws_managed_policies_are_an_anti_pattern/
-
[ Language ] 并发与 C ++ 内存模型: https://corecppil.github.io/Meetups/2018-06-28_Lightening-Storm/ConcurrencyCppMemoryModel.pdf
-
[ MalwareAnalysis ] 使用 .SettingContent.ms 分发恶意软件的技术分析: https://blog.malwarebytes.com/threat-analysis/2018/07/new-macro-less-technique-used-distribute-malware/
-
[ Others ] Stack Trace Art: 通过抛出异常来绘图的艺术: http://thehumbleprogrammer.com/stack-trace-art/
-
[ Others ] 对 .NET 中新 IO API - Pipelines 的介绍: https://blog.marcgravell.com/2018/07/pipe-dreams-part-1.html
-
[ Others ] Trezor 官方发布如何识别 Trezor 钱包网站是否伪造的方法: https://blog.trezor.io/psa-phishing-alert-fake-trezor-wallet-website-3bcfdfc3eced
-
[ Pentest ] 受限 Unix Shell 逃逸技巧: https://speakerdeck.com/knaps/escape-from-shellcatraz-breaking-out-of-restricted-unix-shells
-
[ Popular Software ] VMware NSX SD-WAN Edge by VeloCloud 命令注入漏洞 EXP(CVE-2018-6961 ): https://www.exploit-db.com/exploits/44959/
-
[ SecurityAdvisory ] Open-Xchange 2018 年 7 月安全公告: http://seclists.org/fulldisclosure/2018/Jul/12
-
[ Tools ] PMapper - 用于快速评估 AWS 中 IAM 权限的工具: https://github.com/nccgroup/PMapper
-
[ Tools ] Chiron - 具有高级 IPv6 扩展头操作功能的 IPv6 安全评估框架: https://github.com/aatlasis/Chiron
-
[ Tools ] mkcert - 制作本地信任证书的工具: https://github.com/FiloSottile/mkcert
-
[ Vulnerability ] RSA 证书管理器路径遍历漏洞披露(CVE-2018-11051): http://seclists.org/fulldisclosure/2018/Jul/11
-
[ Vulnerability ] Microsoft Forefront Unified Access Gateway 2010 外部 DNS 交互漏洞披露(CVE-2018-12571): http://seclists.org/fulldisclosure/2018/Jul/7
-
[ Windows ] Microsoft 安全研究人员对包含 Adobe Reader 与 Windows 两个 0day 漏洞利用 PDF 样本的分析(CVE-2018-4990、CVE-2018-8120): https://cloudblogs.microsoft.com/microsoftsecure/2018/07/02/taking-apart-a-double-zero-day-sample-discovered-in-joint-hunt-with-eset/
-
[ Windows ] 一个有趣的内存泄漏案例,错误使用 Windows API 导致的内存泄露: http://redplait.blogspot.com/2018/06/interesting-case-of-memory-leak.html
-
[ iOS ] iOS 文件系统取证分析 Part 1: https://www.piratemoo.net/moosings/mobile/notes-ch-11-ios-analysis-part-1/
-
-
-
-
-
-
[ SecurityProduct ] 混淆 Empire Payload 以绕过 kaspersky 杀毒检测: http://www.offensiveops.io/tools/empire-kaspersky-obfuscation-oh-my/
-
[ Tools ] 通过 AppArmor 配置 PHP 执行策略以阻止命令执行漏洞的利用: https://www.secjuice.com/apparmor-say-goodbye-to-remote-command-execution/
-