腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Attack ] BygoneSSL - 一种在域名过期但SSL证书未过期的特殊情况下产生的攻击方式: https://insecure.design/
-
[ Browser ] Liftoff: V8 中 WebAssembly 的新 baseline 编译器: https://v8project.blogspot.com/2018/08/liftoff.html
-
[ Fuzzing ] 模糊测试 CS:GO BSP 文件: https://blog.path.network/fuzzing-cs-go-bsp-files/
-
[ Hardware ] 开源的移动 ip 电话原理图和代码: https://hackaday.io/project/159811-esp32-wiphone
-
[ Industry News ] Mimikatz 现已支持提取 RDG 文件中的密码: https://twitter.com/i/web/status/1031331172381601792
-
[ Language ] 使用 ASP.NET Cor Core 2.1 中的新 API HttpClientFactory 来优化配置HttpClient: https://rehansaeed.com/optimally-configuring-asp-net-core-httpclientfactory/
-
[ macOS ] 通过 VirtualBox kext 漏洞关闭 MacOS SIP: https://blog.xpnsec.com/disabling-macos-sip-via-a-virtualbox-kext-vulnerability/
-
[ Malware ] 反射性 DLL 技术介绍: https://ijustwannared.team/2018/02/13/reflective-dlls-and-you/
-
[ Network ] 在一台电脑上使用 OpenBSC,OsmoBTS,OsmoTRX 和 USRP B210 构建一个 GSM 网络: https://cyberloginit.com/2018/04/27/build-a-gsm-network-with-openbsc-osmobts-osmotrx-and-usrp-b210-on-a-single-pc.html
-
[ OpenSourceProject ] OpenSSH 用户枚举漏洞(CVE-2018-15473)介绍: https://isc.sans.edu/diary/24004
-
[ OpenSourceProject ] ISPConfig 远程代码执行漏洞分析与利用: https://0x09al.github.io/security/ispconfig/exploit/vulnerability/2018/08/20/bug-or-backdoor-ispconfig-rce.html
-
[ Others ] 通过心理声学隐藏攻击自动语音识别系统(Paper): https://arxiv.org/abs/1808.05665
-
[ Pentest ] 使用 CredSniper 窃取双因素认证令牌: https://www.blackhillsinfosec.com/stealing-2fa-tokens-on-red-teams-with-credsniper/
-
[ Popular Software ] SoK: 让 JIT Spray再次伟大(Paper): https://www.usenix.org/system/files/conference/woot18/woot18-paper-gawlik.pdf
-
[ Popular Software ] Windows Defender:对Windows Defender防病毒模拟器的逆向工程,来自 Blackhat 2018: https://i.blackhat.com/us-18/Thu-August-9/us-18-Bulazel-Windows-Offender-Reverse-Engineering-Windows-Defenders-Antivirus-Emulator.pdf
-
[ Programming ] Kernel 101 - 一起编写一个简单的内核: https://arjunsreedharan.org/post/82710718100/kernel-101-lets-write-a-kernel
-
[ Tools ] ssh-auditor - ssh 弱密码探测工具: https://github.com/ncsa/ssh-auditor
-
[ Tools ] pe_to_shellcode - 将 PE 文件转换为 shellcode 的工具,现仅支持32位PE系统: https://github.com/hasherezade/pe_to_shellcode
-
[ Tools ] Inception - 为逃避 AV 查杀进行C#内存编译和反射加载的项目: https://github.com/two06/Inception
-
[ Tools ] macOS 后渗透测试框架 Apfell 现已支持任意 C2 配置文件跟踪和创建: https://twitter.com/i/web/status/1031214475318312960
-
[ Tools ] BurpSuite 提供 REST API 方便与其他工具合作: https://portswigger.net/blog/burps-new-rest-api
-
[ Virtualization ] VirtualBox VRDP 从 Guest 到 Host 的逃脱 : https://blogs.securiteam.com/index.php/archives/3736
-
[ Vulnerability ] SOLEO IP Relay - 本地文件泄露漏洞披露: https://insecurity.sh/assets/reports/soleo.pdf
-
-
[ Windows ] C# 编写的 DCR.sys 驱动提权利用示例代码: https://gist.github.com/caseysmithrc/08fba336347b73e83781df6a715ac7e7
-
-
-
[ Hardware ] 针对可信平台模块(TPM)的攻击研究 (Paper): https://www.usenix.org/system/files/conference/usenixsecurity18/sec18-han.pdf
-
-
[ Tools ] wePWNise - 生成可在 Office 宏或模板中使用的VBA代码并自动绕过应用控制和漏洞利用缓解 : https://github.com/mwrlabs/wePWNise
-
-
[ Vulnerability ] Traefik 实例的 /api 端点存在 SSL 证书私钥泄露问题: https://twitter.com/EdOverflow/status/1031267058615508994