腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Exploit ] smealum 将完整的 3DS 漏洞利用链代码发布到了 GitHub 上: https://twitter.com/i/web/status/1028364162655649792
-
[ iOS ] iOS 渗透测试工具 Part 1:App Decryption & class-dump: https://www.allysonomalley.com/2018/08/10/ios-pentesting-tools-part-1-app-decryption-and-class-dump/
-
[ Language ] 如何逃离 async/await hell: https://medium.freecodecamp.org/avoiding-the-async-await-hell-c77a0fb71c4c
-
[ macOS ] 深入了解 macOS MDM(以及如何损坏它): http://i.blackhat.com/us-18/Thu-August-9/us-18-Endahl-A-Deep-Dive-Into-macOS-MDM-And-How-It-Can-Be-Compromised-wp.pdf
-
[ Network ] 绕过端口安全攻击 802.1x-2010 与 MACsec ,来自 DEFCON 26: https://www.digitalsilence.com/wp-content/uploads/2018/08/DEF-CON-26-Gabriel-Ryan-Whitepaper-Bypassing-Port-Security-In-2018-Defeating-MacSEC-and-802.1x-2010.pdf
-
[ Pentest ] 不使用 telnet / nc 测试端口开放的 shell 命令分享: https://twitter.com/i/web/status/1027890622793961473
-
[ Popular Software ] 滥用 Outlook 进行攻击的议题相关材料公布: https://twitter.com/i/web/status/1028339464597266432
-
[ Processor ] Wrangling the Ghost:推测执行侧信道漏洞缓解措施的内幕故事,来自BlackHat USA 2018: https://github.com/Microsoft/MSRC-Security-Research/blob/master/presentations/2018_08_BlackHatUSA/us-18-Fogh-Ertl-Wrangling-with-the-Ghost-An-Inside-Story-of-Mitigating-Speculative-Execution-Side-Channel-Vulnerabilities.pdf
-
[ Tools ] hcxdumptool - 从无线网络设备捕获数据包的小工具: https://github.com/ZerBea/hcxdumptool
-
[ Tools ] Bodhi - 专注于学习利用客户端 Web 漏洞的虚拟环境: https://github.com/amolnaik4/bodhi
-
[ Vulnerability ] 路径解析器的不一致性导致的安全问题探究,来自 BlackHat USA 2018: http://i.blackhat.com/us-18/Wed-August-8/us-18-Orange-Tsai-Breaking-Parser-Logic-Take-Your-Path-Normalization-Off-And-Pop-0days-Out-2.pdf 我是如何通过 4 个 Bug 构建 RCE 链攻击 Amazon 内部协作系统的: http://blog.orange.tw/2018/08/how-i-chained-4-bugs-features-into-rce-on-amazon.html