腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Android ] Android HIV:重新打包恶意软件以逃避机器学习检测的研究(paper): https://arxiv.org/pdf/1808.04218.pdf
-
[ Browser ] Microsoft Edge: JIT InlineArrayPush Opcode 的类型混淆: https://bugs.chromium.org/p/project-zero/issues/detail?id=1578
-
[ Browser ] Microsoft Edge: DictionaryPropertyDescriptor::CopyFrom 没有拷贝所有字段(CVE-2018-8291): https://bugs.chromium.org/p/project-zero/issues/detail?id=1576
-
[ Browser ] Microsoft Edge:Chakra:因参数范围解析错误,生成了错误的字节码,导致类型混淆(CVE-2018-8279): https://bugs.chromium.org/p/project-zero/issues/detail?id=1570
-
[ Browser ] Microsoft Edge: InitializeNumberFormat 和 InitializeDateTimeFormat 中的 Bug(CVE-2018-8298): https://bugs.chromium.org/p/project-zero/issues/detail?id=1582
-
[ Browser ] JavaScript 引擎基础:优化 prototypes: https://mathiasbynens.be/notes/prototypes
-
[ Browser ] Chrome 导致的诡异系统卡死分析: https://randomascii.wordpress.com/2018/08/16/24-core-cpu-and-i-cant-type-an-email-part-one/
-
[ Industry News ] PHP Phar:// 伪协议反序列漏洞威胁众多 CMS 安全: https://threatpost.com/severe-php-exploit-threatens-wordpress-sites-with-remote-code-execution/136649/
-
[ Language ] JSON 反序列化利用研究示例脚本: https://gist.github.com/topolik/a6841296b2d0cb70e1cf940916a203ba#file-json-deserialization-ldap-sh-L5
-
[ macOS ] 现代 MacOS 安全,来自 BSidesMCR 2018 (Youtube): https://www.youtube.com/watch?v=nyey11vf2Jo
-
[ Malware ] TRICKBOT 添加从受感染客户端向域控制器传播的功能: https://www.malware-traffic-analysis.net/2018/08/17/index.html
-
[ MalwareAnalysis ] QakBot 银行木马的深度分析报告: https://twitter.com/i/web/status/1029106590232784896
-
[ Mobile ] 使用动态应用程序沙盒缓解移动设备上的位置隐私泄露攻击(paper): https://arxiv.org/pdf/1808.04490.pdf
-
[ Others ] 内核代码段只读区域 KTRR 介绍,讲解苹果A10及以上的芯片中内核代码段只读区域的实现原理和分析: https://siguza.github.io/KTRR/
-
[ Popular Software ] 在Microsoft.Workflow.Compiler.exe中执行任中执行任意未签名代码: https://posts.specterops.io/arbitrary-unsigned-code-execution-vector-in-microsoft-workflow-compiler-exe-3d9294bc5efb
-
[ Tools ] NccGroup 发布 DNS 重绑定攻击框架 - Singularity : https://www.nccgroup.trust/us/about-us/newsroom-and-events/blog/2018/august/singularity-of-origin-a-dns-rebinding-attack-framework/
-
[ Vulnerability ] ADM 3.1.2RHG1 远程代码执行漏洞 EXP (CVE-2018-11510): https://www.exploit-db.com/exploits/45212/
-
[ WirelessSecurity ] 位于同一终端的恶意应用对由正常应用认证的 BLE 设备的攻击(paper): https://arxiv.org/pdf/1808.03778.pdf