腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Browser ] WebAssembly Web 上 Native Exploit 的新世界,来自 BlackHat USA 2018: http://i.blackhat.com/us-18/Thu-August-9/us-18-Lukasiewicz-WebAssembly-A-New-World-of-Native_Exploits-On-The-Web.pdf
-
[ Browser ] 在 Pwn2Own 2018 中使用的 WebKit JIT 优化错误 (CVE-2018-4233) 的利用: https://github.com/saelo/cve-2018-4233
-
[ Crypto ] 硬件加密货币钱包的安全性评估分析,来自 BlackHat USA 2018: https://www.slideshare.net/riscure/software-attacks-on-hardware-wallets
-
[ Defend ] 防御 Mimikatz 攻击的方法介绍: https://medium.com/blue-team/preventing-mimikatz-attacks-ed283e7ebdd5
-
[ Exploit ] 攻击客户端 JIT 编译器,来自 BlackHat USA 2018 Samuel Groß 的演讲: https://saelo.github.io/presentations/blackhat_us_18_attacking_client_side_jit_compilers.pdf
-
[ Exploit ] 从几千小时到几分钟:为任意类型的内核漏洞自动生成漏洞利用,来自 BlackHat USA 2018: http://i.blackhat.com/us-18/Thu-August-9/us-18-Wu-Towards-Automating-Exploit-Generation-For-Arbitrary-Types-of-Kernel-Vulnerabilities.pdf
-
[ Hardware ] 解锁上帝模式:VIA C3 系列 CPU 硬件后门,来自 BlackHat USA 2018: http://i.blackhat.com/us-18/Thu-August-9/us-18-Domas-God-Mode-Unlocked-Hardware-Backdoors-In-x86-CPUs.pdf
-
[ iOS ] Fasten your seatbelts: we are escaping iOS 11 sandbox,来自 DEFCON 26: https://github.com/zhengmin1989/MyArticles/blob/master/PPT/DEFCON-26-Min-Spark-Zheng-iOS-11-SBE.pdf
-
[ IoTDevice ] Peek-a-Boo - 监听智能家居设备的无线流量分析家庭活动(paper): https://arxiv.org/pdf/1808.02741.pdf
-
[ Language ] WebAssembly 的问题与承诺,来自 BlackHat USA 2018: http://i.blackhat.com/us-18/Thu-August-9/us-18-Silvanovich-The-Problems-and-Promise-of-WebAssembly.pdf
-
[ Operating System ] 内核模式威胁与实际防御,来自 BlackHat USA 2018: https://github.com/dezhub/Slides/blob/master/Desimone-Landau-Kernel-Mode-Threats-and-Practical-Defenses.pdf
-
[ Others ] Rich Header 分析和狩猎中的案例研究: http://ropgadget.com/posts/richheader_hunting.html
-
[ Others ] 零信任方法是否能提供真正的安全性?来自 BlackHat USA 2018: https://github.com/dwizzzle/Presentations/blob/master/David%20Weston%20-%20Zer0ing%20Trust%20-%20Do%20Zero%20Trust%20Approaches%20Deliver%20Real%20Security.pdf
-
[ Others ] 从消失的阴影中重建世界:恢复已删除的 VSS 快照,来自 BlackHat USA 2018: http://i.blackhat.com/us-18/Thu-August-9/us-18-Kobayashi-Reconstruct-The-World-From-Vanished-Shadow-Recovering-Deleted-VSS-Snapshots.pdf
-
[ Tools ] Detours - Microsoft 开源的用于在 Windows 上监视和检测 API 调用的软件: https://github.com/Microsoft/Detours
-
[ Tools ] ARTist - 用于逆向和分析 Android 应用程序和中间件的新型框架: http://i.blackhat.com/us-18/Thu-August-9/us-18-Schranz-ARTist-A-Novel-Instrumentation-Framework-for-Reversing-and-Analyzing-Android-Apps-and-the-Middleware.pdf
-
[ Tools ] CFripper - CloudFormation 脚本的静态代码分析工具: https://medium.com/@SkyscannerEng/cfripper-a-static-code-analysis-tool-for-cloudformation-scripts-6ffb6b363446
-
[ Tools ] Subverting Sysmon : 形式化安全产品规避方法的应用: https://github.com/mattifestation/BHUSA2018_Sysmon/blob/master/Slides_Subverting_Sysmon.pdf
-
[ Virtualization ] 通过攻击性安全研究强化 Hyper-V : http://i.blackhat.com/us-18/Thu-August-9/us-18-Rabet-Hardening-Hyper-V-Through-Offensive-Security-Research.pdf
-
[ WirelessSecurity ] 利用 200 刀设备攻击 LTE 自组网络配置: http://i.blackhat.com/us-18/Wed-August-8/us-18-Shaik-LTE-Network-Automation-Under-Threat.pdf