腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Backdoor ] 向 PE 文件植入后门代码的技巧: http://www.theanuragsrivastava.in/2018/07/backdoring-pe-files-using-code-caves.html
-
[ Data Breach ] Reddit 受黑客攻击导致2007年及之前的用户数据泄露: https://www.theverge.com/2018/8/1/17639930/reddit-hack-security-breach-stole-user-data-2007-earlier
-
[ Fuzzing ] 真的无法利用?使用 Raven 分析一个空指针引用漏洞: https://blog.talosintelligence.com/2018/08/exploitable-or-not-exploitable-using.html
-
[ Industry News ] 航天国防公司 Elbit Systems 受黑客攻击导致 10000 账户信息泄漏: https://www.cyberwarnews.info/2018/08/02/aerospace-corp-elbit-systems-breached-10-000-accounts-leaked/
-
[ IoTDevice ] 滥用 samba 漏洞获取 ZTE F670E 路由 root 权限: https://niemand.com.ar/2018/08/01/rooting-your-router-zte-f670e-abusing-of-an-old-samba/
-
[ Linux ] Linux 计时器子系统中任意内存读取漏洞 POC 发布: https://twitter.com/uid1000/status/1025164817081016320
-
[ Linux ] Infiniband Linux 驱动 UAF 漏洞详情披露(CVE-2018-14737) : https://blogs.securiteam.com/index.php/archives/3727
-
[ Linux ] Linux/ARM - IPV6 反弹 Shell 的 shellcode: https://www.exploit-db.com/exploits/45119/
-
[ MalwareAnalysis ] 检测隐藏在证书文件中的 PowerShell 恶意代码 第3部分: https://blog.nviso.be/2018/08/02/powershell-inside-a-certificate-part-3/
-
[ MalwareAnalysis ] Malware Sandbox Emulation in Python,主要介紹了以 Python 开发一个虚拟化技术的沙箱运行恶意程序,来自 HITCON CMT 2018: https://speakerdeck.com/aaaddress1/malware-sandbox-emulation-in-python
-
[ OpenSourceProject ] React XSS 漏洞详情披露(CVE-2018-6341): https://reactjs.org/blog/2018/08/01/react-v-16-4-2.html
-
[ Others ] IQY 文件内嵌 DLL 的 POC: https://twitter.com/MrUn1k0d3r/status/1024732361047584768
-
[ Others ] 漏洞报送的‘奇妙’之旅,PJ 0 的一位研究员依据的亲身经历,提出了怎样的漏洞报告流程对研究人员是友好的,旨在建议厂商规范漏洞报告流程,: https://googleprojectzero.blogspot.com/2018/08/adventures-in-vulnerability-reporting.html
-
[ Others ] WebRTC - H264 NAL数据包处理类型混淆漏洞详情披露: https://www.exploit-db.com/exploits/45123/
-
[ Others ] ASP.NET 资源文件(.RESX) 及反序列化漏洞研究: https://www.nccgroup.trust/uk/about-us/newsroom-and-events/blogs/2018/august/aspnet-resource-files-resx-and-deserialisation-issues/
-
[ Popular Software ] 为 PayPal 配置 Google Authenticator 双因素认证: https://medium.com/@dubistkomisch/set-up-2fa-two-factor-authentication-for-paypal-with-google-authenticator-or-other-totp-client-60fee63bfa4f
-
[ Sandbox ] 沙箱逃离 - MacOs 上的 Windows Office: https://www.mdsec.co.uk/2018/08/escaping-the-sandbox-microsoft-office-on-macos/
-
[ Tools ] HeapHopper - 作者提出了一种方法,可以对现有的堆管理的实现进行模型检查,发现实现上的脆弱性,内存破坏漏洞的可利用性等(paper): https://seclab.cs.ucsb.edu/media/uploads/papers/sec2018-heap-hopper.pdf
-
[ Tools ] Eventlogedit-evtx--Evolution - Windows EVTX 事件日志针对性删除工具: https://github.com/3gstudent/Eventlogedit-evt--General
-
[ Vulnerability ] WebRTC - FEC 处理缓冲区溢出漏洞详情披露: https://www.exploit-db.com/exploits/45122
-
[ Vulnerability ] WebRTC - VP8 Block 解码 UAF 漏洞详情披露: https://www.exploit-db.com/exploits/45121/
-
[ Windows ] Windows 10 19H1 引入动态追踪(Dynamic Tracing)新功能, Alex Ionescu 对此做出了详细分析: http://www.alex-ionescu.com/?p=358