腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Cloud ] 绕过 Bucket 的上传策略和 URL 签名: https://labs.detectify.com/2018/08/02/bypassing-exploiting-bucket-upload-policies-signed-urls/
-
[ Forensics ] 滥用操作系统自带的签名程序进行非法操作: http://www.hexacorn.com/blog/2018/08/04/reusigned-binaries-living-off-the-signed-land-part-3/
-
[ Hardware ] Intel SGX 技术总览 Part 2 ,SGX Externals: https://blog.quarkslab.com/overview-of-intel-sgx-part-2-sgx-externals.html
-
[ Linux ] Linux 内核时间子系统内存任意读取漏洞 POC (CVE-2017-18344): http://www.alunos.dcc.fc.up.pt/~up201407890/CVE-2017-18344.txt
-
[ Pentest ] InvisiblePersistence - 隐藏注册表中的启动项键值: https://github.com/ewhitehats/InvisiblePersistence
-
[ Pentest ] 通过 RegistrationHelper 组件成功绕过 WSH 限制: https://gist.github.com/caseysmithrc/4c94e210fb755dddf4e17b5b89522052
-
-
[ Popular Software ] 绕过 Cisco AnyConnect 的 Hostscan 扫描: https://gilks.github.io/post/cisco-hostscan-bypass/
-
[ ReverseEngineering ] Game Hacking: Hammerwatch Invincibility: http://www.somersetrecon.com/blog/2018/7/25/game-hacking-hammerwatch-invincibility
-
[ Tools ] 使用 DumpsterDiver 寻找文件中的密钥泄露: https://medium.com/@rzepsky/hunting-for-secrets-with-the-dumpsterdiver-93d38a9cd4c1GitHub: https://github.com/securing/DumpsterDiver
-
[ Tools ] VivienneVMM - 基于 VT-x HyperVisor的调试框架 ,可以在用户态设置被调试对象不可感知的硬件断点: https://github.com/changeofpace/VivienneVMM
-
[ Tools ] Remote-Desktop-Caching - 从远程桌面的缓存数据中重建 PNG 图片协助寻找敏感信息泄露的工具: https://github.com/Viralmaniar/Remote-Desktop-Caching-
-
[ WirelessSecurity ] 针对 WPA/WPA2 的新攻击方式:利用 Hashcat 破解 PMKID 从而破解 wifi 密码: https://hashcat.net/forum/thread-7717.html