腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Firmware ] PS4 5.05 BPF Double Free 内核漏洞详解: https://github.com/Cryptogenic/Exploit-Writeups/blob/master/FreeBSD/PS4%205.05%20BPF%20Double%20Free%20Kernel%20Exploit%20Writeup.md
-
[ Industry News ] 思科修复 VoIP 电话中的高危漏洞: https://threatpost.com/cisco-patches-high-severity-bug-in-voip-phones/133905/
-
[ IoTDevice ] Huawei eNSP v1 缓冲区溢出漏洞披露(CVE-2017-17321): http://seclists.org/fulldisclosure/2018/Jul/56
-
[ Linux ] Linux/Ubuntu 中可以利用 setgid 目录读取其他用户的 crashdump 文件,并且绕过 killpriv(CVE-2018-13405): https://bugs.chromium.org/p/project-zero/issues/detail?id=1611
-
[ macOS ] macOS/iOS 中 QuickLook 解析 office 文件时,未过滤字体名,导致可以执行任意 JavaScript 代码: https://bugs.chromium.org/p/project-zero/issues/detail?id=1556&;;desc=4
-
[ Malware ] 如何构建一个 npm 蠕虫: https://jamie.build/how-to-build-an-npm-worm
-
[ MalwareAnalysis ] Unit 42 针对最新 Upatre downloader 的技术分析: https://researchcenter.paloaltonetworks.com/2018/07/unit42-upatre-continues-evolve-new-anti-analysis-techniques/
-
[ Others ] 通过使用 IAM 权限边界将权限管理委派给开发人员: https://aws.amazon.com/cn/blogs/security/delegate-permission-management-to-developers-using-iam-permissions-boundaries/
-
[ Pentest ] Kerberoasting 攻击技术介绍: http://niiconsulting.com/checkmate/2018/05/kerberoasting-exploiting-unpatched-systems-a-day-in-the-life-of-a-red-teamer/
-
[ Popular Software ] Apache CouchDB 任意命令执行漏洞 MSF 利用模块: https://www.exploit-db.com/exploits/45019/
-
[ Popular Software ] Hadoop YARN ResourceManager 未授权命令执行漏洞 MSF 利用模块: https://www.exploit-db.com/exploits/45025/
-
[ SecurityReport ] Cisco Talos 7月6日到13日的威胁回顾: https://blog.talosintelligence.com/2018/07/threat-roundup-0706-0713.htm
-
[ Tools ] CIRCL 发布 IMAP 代理工具 "IMAP-Proxy",用于检测邮件中的恶意附件: https://github.com/CIRCL/IMAP-Proxy
-
[ Tools ] dirhunt - 通过爬虫的方式收集 WEB 路径的工具: https://github.com/Nekmo/dirhunt
-
[ Tools ] 如何使用 IDAPython 寻找漏洞: https://www.somersetrecon.com/blog/2018/7/6/introduction-to-idapython-for-vulnerability-hunting
-
[ Tools ] 通过模拟自动将 shellcode 哈希值解析为符号名称的脚本: https://gist.github.com/williballenthin/1cb2512b726d3bbc955746f69eaed0da
-
[ Tools ] 使用反射式 DLL 加载技术的自定义 PsExec 发布: 1 https://ijustwannared.team/2018/07/13/customized-psexec-via-reflective-dll/
-
[ Virtualization ] VMware Tools HGFS 越界读取漏洞披露(CVE-2018-6969): https://www.vmware.com/security/advisories/VMSA-2018-0017.html
-
[ Windows ] Microsoft Windows - POP/MOV SS 本地提权漏洞 MSF 利用模块(CVE-2018-8897): https://www.exploit-db.com/exploits/45024/