
腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Browser ] Chrome V8 引擎 JavaScript RegExp 继承类实例化导致的崩溃问题披露(CVE-2018-6136): https://bugs.chromium.org/p/chromium/issues/detail?id=831943
-
[ Cloud ] AWS 安全工具储备库: https://blyx.com/2018/07/18/my-arsenal-of-aws-security-tools/
-
[ Crypto ] Monero Bulletproofs 安全审计,来自 Kudelski Security : https://cybermashup.files.wordpress.com/2018/07/monero-audit2.pdf
-
[ Firmware ] 1981年 IBM 的技术参考手册,其中包含了一份良好注释的 BIOS 源码: http://classiccomputers.info/down/IBM/IBM_PC_5150/IBM_5150_Technical_Reference_6025005_AUG81.pdf
-
[ Hardware ] 幽灵归来!利用返回栈缓冲区进行攻击(SpectreRSB): https://arxiv.org/abs/1807.07940
-
[ Industry News ] Qualcomm 宣布推出首款全集成 5G 毫米波天线模块: https://www.macrumors.com/2018/07/23/qualcomm-5g-mmwave-antenna-module/
-
[ iOS ] iOS 应用程序重打包和签名的指南: https://labs.mwrinfosecurity.com/blog/repacking-and-resigning-ios-applications/
-
[ Malware ] Android 银行木马 Red Alert 2.0 伪装成 VPN 程序进行传播: https://news.sophos.com/en-us/2018/07/23/red-alert-2-0-android-trojan-targets-security-seekers/
-
[ MalwareAnalysis ] 恶意 PDF 文档分析提取 Payload 的方法介绍: https://www.adlice.com/infected-pdf-extract-payload/
-
[ Popular Software ] Cisco WebEx Teams 远程代码执行漏洞详情披露(CVE-2018-0387): http://asintsov.blogspot.com/2018/07/cisco-webex-teams-remote-code-execution.html
-
[ Popular Software ] Hangouts Chat Electron 桌面应用版本 URL 跳转漏洞详情分析: https://blog.bentkowski.info/2018/07/vulnerability-in-hangouts-chat-aka-how.html
-
[ Programming ] x86 汇编字符串指令总结: https://twitter.com/i/web/status/1021140404740161538
-
[ Protocol ] ARTEMIS - 针对 BGP 劫持的防御系统介绍: https://labs.ripe.net/Members/vasileios_kotronis/artemis-neutralising-bgp-hijacking-within-a-minute
-
[ Tools ] Eventlogedit-evtx--Evolution - 从 Windows EVTX 事件日志针对性删除工具: https://github.com/3gstudent/Eventlogedit-evtx--Evolution
-
[ Tools ] malwaregan - 恶意软件行为可视化与主动防御工具: https://github.com/bsvineethiitg/malwaregan
-
-
-
[ Tools ] Misc-Powershell-Scripts - PowerShell 渗透测试脚本收集: https://github.com/rvrsh3ll/Misc-Powershell-Scripts
-
[ Tools ] IDA 项目文件转 radare2 的脚本发布: https://github.com/radare/radare2ida/blob/master/ida2r2/ida2r2.py
-
-
[ MalwareAnalysis ] 恶意代码团伙luoxk正在积极利用 CVE-2018-2893 传播: https://blog.netlab.360.com/a-malware-compain-is-actively-exploiting-cve-2018-2893-for-botnet-mining/
-
[ Vulnerability ] Network Manager VPNC 提权漏洞披露 (CVE-2018-10900): http://seclists.org/fulldisclosure/2018/Jul/76
-
[ Windows ] 利用 Windows 上的 XXE 漏洞泄漏用户 NetNTLM Hash 并通过 smb relay 获取权限: https://medium.com/@canavaroxum/xxe-on-windows-system-then-what-76d571d66745