腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Android ] Android 2018 年 8 月安全公告发布: https://source.android.com/security/bulletin/2018-08-01
-
[ Browser ] V8 JavaScript 引擎 v6.9 版本发布: https://v8project.blogspot.com/2018/08/v8-release-69.html
-
[ Industry News ] 台积电(TSMC)公司受 WANNACRY 影响导致生产线停工两天,手机供应链受到影响: https://threatpost.com/top-iphone-supplier-battles-wannacry-infection/134722/
-
[ Industry News ] Microsoft 已经将 Let's Encrypt 的加密证书添加到直接信任中: https://threatpost.com/microsoft-adds-direct-trust-for-lets-encrypt/134761/
-
[ Industry News ] 联想正式加入 LVFS 计划,为 Linux 用户提供自动固件更新: https://blogs.gnome.org/hughsie/2018/08/06/please-welcome-lenovo-to-the-lvfs/
-
[ iOS ] MeridianJB - iOS 10.x 64-bit 设备越狱项目: https://github.com/PsychoTea/MeridianJB
-
[ IoTDevice ] 通过无意义的单词序列实现对 Google 智能助理的隐蔽访问(Paper): https://arxiv.org/abs/1808.01947
-
[ IoTDevice ] 使用 BtleJuice 攻击 BLE 智能电灯的教程: https://blog.attify.com/btlejuice-mitm-attack-smart-bulb/
-
[ Linux ] Linux 内核 TCP 实现的拒绝服务漏洞细节披露( CVE-2018–5390): https://doublepulsar.com/linux-kernel-networking-vulnerable-to-denial-of-service-the-devil-in-the-details-4c53b4a3e3ea https://www.kb.cert.org/vuls/id/962459
-
[ MalwareAnalysis ] 威胁组织 DarkHydrus 使用开源工具 Phishery 针对中东用户发起凭证钓鱼攻击,Unit42 做了相关分析: https://researchcenter.paloaltonetworks.com/2018/08/unit42-darkhydrus-uses-phishery-harvest-credentials-middle-east/
-
[ MalwareAnalysis ] 基于 Python 实现的 Koadic 恶意软件分析 Part 1: https://blog.varonis.com/koadic-lol-malware-meets-python-based-command-and-control-c2-server-part-i/
-
[ Others ] UEFI 和 Xen 上反邪恶女佣攻击的解决方案,来自 PSEC2018 (video): https://www.platformsecuritysummit.com/2018/speaker/kerrigan/
-
[ Pentest ] 使用 .URL 快捷方式执行命令的技巧: https://twitter.com/harr0ey/status/1026524549263896581
-
[ Popular Software ] 我是如何获得 Homebrew 的 Github 仓库访问权限的: https://medium.com/@vesirin/how-i-gained-commit-access-to-homebrew-in-30-minutes-2ae314df03ab
-
[ Symbolic Execution ] awesome-symbolic-execution - 优秀符号执行资源收集: https://github.com/ksluckow/awesome-symbolic-execution
-
[ Tools ] PowerUpSQL 项目新增 SQL SERVER 的后渗透测试工具 SQLC2CMDS.dll: https://twitter.com/i/web/status/1026476503566114817
-
[ Tools ] BLeak - 自动调试 Web 应用程序中的内存泄漏的工具: https://blog.acolyer.org/2018/08/07/bleak-automatically-debugging-memory-leaks-in-web-applications/
-
[ Tools ] BurpSuite Extractor 使用介绍: https://blog.netspi.com/introducing-burp-extractor/
-
[ Tools ] htrace.sh - 使用 Nmap NSE 库调试 http/https流量跟踪、响应头、混合内容和检查域名的简单 shell 脚本: https://github.com/trimstray/htrace.sh
-
[ Tools ] James Forshaw 发布个人用于寻找 Windows 本地提权漏洞攻击面使用的工具集: https://twitter.com/tiraniddo/status/1026673469910446080
-
[ Windows ] 深入理解 Windows 页帧号(PFN) - 第 2 部分: https://rayanfam.com/topics/inside-windows-page-frame-number-part2/
-
[ Windows ] TBAL:本地用户的 DPAPI 后门;Windows 10 中的 TBAL 特性破坏了 DPAPI 的安全性,当可以访问未加入域且正确关闭的计算机磁盘时,便拥有了解密最后一个登录用户 DPAPI 的能力: https://vztekoverflow.com/2018/07/31/tbal-dpapi-backdoor/
-
[ Backdoor ] 微软驱动程序交叉签名的后门,作者主要解释了微软驱动的交叉签名机制,还有绕过交叉签名检查的一些隐藏注册表项: http://www.geoffchappell.com/notes/security/whqlsettings
-
-
[ Hardware ] 通过隔离和虚拟化构建更安全的 ARM TrustZone(whitepaper): https://community.arm.com/processors/b/blog/posts/architecting-more-secure-world-with-isolation-and-virtualization
-
-
[ Popular Software ] 天融信关于VLC Media Player 2.2.8 Use After Free漏洞分析: http://www.freebuf.com/vuls/179469.html
-
[ Processor ] 基于英特尔高级向量扩展(AVX)指令实现的潜在Spectre变体: http://www.numberworld.org/blogs/2018_6_16_avx_spectre/