
腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Android ] Google 官方发布 Android Emulator ,现支持 AMD Processor 及 Hyper-V: https://android-developers.googleblog.com/2018/07/android-emulator-amd-processor-hyper-v.html
-
[ Firmware ] 如何清除不可清除的 BIOS 密码: https://www.reddit.com/r/homelab/comments/8x4qxq/how_i_cleared_an_unclearable_bios_password/
-
[ Forensics ] 修改 Sysmon 应用以禁用日志记录: http://www.hexacorn.com/blog/2018/07/07/sysmon-doing-lines-part-4/
-
[ iOS ] 售价 39 美元的设备可以击败 iOS USB 受限模式,作者提出一种绕过iOS限制USB模式的方法: https://blog.elcomsoft.com/2018/07/this-9-device-can-defeat-ios-usb-restricted-mode/
-
[ MalwareAnalysis ] 如何配置自己的 Dionaea 蜜罐来收集恶意软件样本: https://0x00sec.org/t/run-the-trap-how-to-setup-your-own-honeypot-to-collect-malware-samples/7445
-
[ MalwareAnalysis ] D-Link 以及台湾科技公司 Changing Information Technology 被盗取的证书在 Plead 恶意软件活动中被滥用: https://www.welivesecurity.com/2018/07/09/certificates-stolen-taiwanese-tech-companies-plead-malware-campaign/
-
[ MalwareAnalysis ] CheckPoint 对针对中东的 APT 攻击活动 "Big Bang" 的调查报告: https://research.checkpoint.com/apt-attack-middle-east-big-bang/
-
[ MalwareAnalysis ] JPCERT 对 BlackTech 使用的 PLEAD 下载者的分析报告: https://blog.jpcert.or.jp/2018/06/plead-downloader-used-by-blacktech.html
-
[ Others ] .NET 高性能 IO 库 System.IO.Pipelines 介绍: https://blogs.msdn.microsoft.com/dotnet/2018/07/09/system-io-pipelines-high-performance-io-in-net/
-
[ Programming ] x86 汇编与反汇编维基: 1) https://en.wikibooks.org/wiki/X86_Assembly 2) https://en.wikibooks.org/wiki/X86_Disassembly
-
[ ReverseEngineering ] 使用 r2pipe 协助逆向分析: https://goggleheadedhacker.com/blog/post/8
-
[ SecurityAdvisory ] Apple 发布 7 月 macOS High Sierra、iOS 及 Safari 安全更新: https://support.apple.com/en-us/HT201222 ;
-
[ Tools ] Making a low level (Linux) debugger, part 3: https://blog.asrpo.com/making_a_low_level_debugger_part_3
-
[ Web Security ] 从 HTTP 存档中提取 PWA 应用数据的方法: https://medium.com/dev-channel/progressive-web-apps-in-the-http-archive-614d4bcf81fe
-
[ Windows ] 构建 Windows Defender 应用程序控制实验室: https://www.fortynorthsecurity.com/building-a-windows-defender-application-control-lab/
-
[ Data Breach ] Timehop 被黑客攻击导致 2100 万用户的隐私数据泄露: https://threatpost.com/timehop-breach-impacts-personal-data-of-21-million-users/133765/
-
[ iOS ] 在不越狱的情况下测试 iOS 应用程序的方法: https://www.securing.biz/en/testing-ios-apps-without-jailbreak-in-2018/index.html
-
[ iOS ] 最新 iOS 11.4.1 加入了 USB 受限模式: https://threatpost.com/apple-os-update-lifts-curtain-on-iphone-usb-restricted-mode/133803/
-
[ MalwareAnalysis ] LokiBot 间谍软件第三方劫持版本分析报告: https://github.com/d00rt/hijacked_lokibot_version/blob/master/doc/LokiBot_hijacked_2018.pdf
-
[ MalwareAnalysis ] 卡巴斯基对加密货币钓鱼欺诈方式的调查分析 : https://securelist.com/in-cryptoland-trust-can-be-costly/86367/
-
[ OpenSourceProject ] xpc-string-leak - libxpc 字符串序列化时的越界读取漏洞利用程序(CVE-2018-4248):https://github.com/bazad/xpc-string-leak
-
[ SecurityReport ] ZDI 的 2018 年上半年安全研究工作与漏洞趋势回顾: https://www.thezdi.com/blog/2018/7/9/checking-in-a-look-back-at-the-first-half-of-2018
-
-
-
-
-
[ Windows ] 在 Windows 10 环境下躲避 Autoruns 检测的持久化方法介绍: https://medium.com/@KyleHanslovan/re-evading-autoruns-pocs-on-windows-10-dd810d7e8a3f