腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Android ] Android libc 中 dlmalloc 与 jemalloc 的原理分析与相关漏洞利用:Part 1: https://blog.nsogroup.com/a-tale-of-two-mallocs-on-android-libc-allocators-part-1-dlmalloc/Part 2: https://blog.nsogroup.com/a-tale-of-two-mallocs-on-android-libc-allocators-part-2-jemalloc/Part 3: https://blog.nsogroup.com/a-tale-of-two-mallocs-on-android-libc-allocators-part-3-exploitation/
-
[ Browser ] Apple Safari WebKit RCE exp (CVE-2018-4192): https://github.com/wzw19890321/Exploits/blob/master/CVE-2018-4192/CVE-2018-4192.html
-
[ Crypto ] ERC827 智能合约的 reentrancy 攻击原理与防御手段介绍: https://medium.com/chainsecurity/why-erc827-can-make-you-vulnerable-to-reentrancy-attacks-and-how-to-prevent-them-61aeb4beb6bf
-
[ Detect ] 如何检测微软签名的可执行文件是否被滥用: https://posts.specterops.io/what-is-it-that-makes-a-microsoft-executable-a-microsoft-executable-b43ac612195e
-
[ Detect ] 使用 Sysmon 来检测利用 CMSTP 绕过 UAC 的攻击: http://www.endurant.io/cmstp/detecting-cmstp-enabled-code-execution-and-uac-bypass-with-sysmon/
-
[ Firmware ] Anti-Evil Maid with UEFI and Xen: https://docs.google.com/presentation/d/1bJP1I74MjmXdlxxG6MDdipa5bZ9KFyLbcJ5hG2NIAjA/edit#slide=id.g399aaa7d14_8_89
-
[ Firmware ] iwatch 固件的解密密钥: https://twitter.com/axi0mX/status/1014988577875247106
-
[ MalwareAnalysis ] 对大规模 Steam 诈骗和钓鱼活动的调查分析: https://samcurry.net/hacking-a-massive-steam-scamming-and-phishing-operation-for-fun-and-profit/
-
[ MalwareAnalysis ] Rakhni 木马新添加了加密货币挖矿的功能,可以选择性的对用户进行勒索或挖矿: https://www.kaspersky.com/blog/rakhni-miner-cryptor/22988/
-
[ MalwareAnalysis ] 针对 Linux 及 Windows 平台的恶意软件 WellMess 分析: https://blog.jpcert.or.jp/2018/07/malware-wellmes-9b78.html
-
[ Pentest ] LethalHTA - 使用 DCOM 与 HTA 进行横向渗透的新技术: https://codewhitesec.blogspot.com/2018/07/lethalhta.html
-
[ Tools ] Mcsema - Trail of Bits 开源的从 X86/AMD64 转化 LLVM bitcode 中间代码的框架,最近 Mcsema 二进制分析框架新增加了一个移除 Dead Store(初始化但未被使用的变量)的特性: https://github.com/trailofbits/mcsema
-
[ Tools ] iOS 11.2-11.3.1 越狱工具 Electra 发布: https://coolstar.org/electra/
-
[ Tools ] msfenum - 自动化运行 MSF auxiliary 模块进行信息探测的脚本: https://twitter.com/wez3forsec/status/1015174728405979136
-
[ Tools ] httpu - 命令行下测试 HTTP API 的优秀工具: https://github.com/hazbo/httpu
-
[ Tools ] VrankenFuzz Fuzz 引擎介绍: https://guidovranken.files.wordpress.com/2018/07/vrankenfuzz.pdf
-
[ Tools ] 使用 Mitre {ATT&CK,Navigator} 和 Elastic Stack 测量操作风险: http://www.threathunter.com.br/2018/07/measuring-operational-risks-using-mitre.html
-
[ Tools ] Sysmon 8.0 发布: https://docs.microsoft.com/zh-cn/sysinternals/
-
[ Tools ] Apfell - macOS 后渗透测试工具: https://github.com/its-a-feature/Apfell
-
[ Tools ] libfuzzer-java - Guido Vranken 开源了他的 Java Fuzz 工具: https://github.com/guidovranken/libfuzzer-java
-
[ Web Security ] WAF 绕过技巧分享: https://www.slideshare.net/SoroushDalili/waf-bypass-techniques-using-http-standard-and-web-servers-behaviourBurpSuiteHTTPSmuggler - 帮助绕过 WAF 检测的 Burpsuite 插件: https://github.com/nccgroup/BurpSuiteHTTPSmuggler/