腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Attack ] 0wned -通过Python安装包执行代码: https://github.com/mschwager/0wned
-
[ Browser ] Mozilla 发布用于修复 Firefox 62 中远程代码执行等漏洞的补丁,更新包括 9 个安全补丁: https://threatpost.com/mozillas-release-of-firefox-62-packs-nine-fixes/137230/
-
[ Browser ] Google 发布 Chrome 69 的 40 个漏洞修复补丁,其中7个威胁等级被评为'高': https://threatpost.com/google-rolls-out-40-fixes-with-chrome-69/137210/
-
[ MalwareAnalysis ] 新的漏洞利用套件 Fallout Exploit Kit 在恶意广告活动中分销 GandCrab 勒索软件,来自 Fireeye: https://www.fireeye.com/blog/threat-research/2018/09/fallout-exploit-kit-used-in-malvertising-campaign-to-deliver-gandcrab-ransomware.html
-
[ MalwareAnalysis ] Paloalto 对利用 CVE-2018-5002 Adobe Flash 漏洞的 CHAINSHOT 多阶段恶意软件的分析: https://researchcenter.paloaltonetworks.com/2018/09/unit42-slicing-dicing-cve-2018-5002-payloads-new-chainshot-malware/
-
[ Others ] https://undeadly.org/cgi?action=front
-
[ SCADA ] Kaspersky 发布的工业自动化系统威胁分析报告: https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2018/09/06075839/H1_2018_ICS_REPORT_v1.0_ENG_05092018.pdf
-
-
[ Tools ] dhcpwn - DHCP IP 资源耗尽攻击工具: https://github.com/mschwager/dhcpwn
-
[ Tools ] noisy - DNS,HTTP/S 噪声数据生成器: https://github.com/1tayH/noisy
-
[ Tools ] phishing_catcher 现已支持 Unicode 同形异义域名检测: https://github.com/x0rz/phishing_catcher
-
[ Vulnerability ] ERPNext v10.1.6 SQL 注入漏洞详情披露: https://www.talosintelligence.com/reports/TALOS-2018-0560
-
[ Vulnerability ] Apache Roller 5.0.3 XML 实体化注入漏洞 EXP (CVE-2014-0030): https://www.exploit-db.com/exploits/45341/
-
[ Blockchain ] 以太坊合约审计 CheckList 之“以太坊智能合约编码安全问题”影响分析报告: https://bcsec.org/index/detail/tag/2/id/263
-
[ Browser ] Chrome 70 中 DevTools 的新功能和主要变化: https://developers.google.com/web/updates/2018/08/devtools
-
-
[ Conference ] Linux Security Summit North America 2018 峰会议题视频公开: https://www.youtube.com/playlist?list=PLbzoR-pLrL6rOT6m50HdJFYUHyvA9lurI
-
[ Firmware ] X8 到 X11 代 Supermicro 服务器为其 BMC 组件使用不安全的固件更新机制 : https://blog.eclypsium.com/2018/09/06/insecure-firmware-updates-in-server-management-systems/
-
[ Linux ] Linux Kernel irda_setsockopt() 函数 UAF 拒绝服务漏洞(CVE-2018-6555): https://tools.cisco.com/security/center/viewAlert.x?alertId=58857
-
[ MachineLearning ] 介绍 Windows Defender 使用机器学习进行恶意代码检测的文章: https://cloudblogs.microsoft.com/microsoftsecure/2018/09/06/small-businesses-targeted-by-highly-localized-ursnif-campaign/
-
[ Malware ] 门罗币挖矿软件 CroniX 利用 Apache ST2 漏洞大范围传播: https://threatpost.com/active-campaign-exploits-critical-apache-struts-2-flaw-in-the-wild/137207/
-
[ Pentest ] ATT&CKing the Status Quo:使用 MITER ATT 进行基于威胁的对手仿真: https://www.sans.org/summit-archives/file/summit-archive-1536260992.pdf
-
-
[ Tools ] 深入了解 CobaltStrike Malleable C2 配置文件的使用: https://posts.specterops.io/a-deep-dive-into-cobalt-strike-malleable-c2-6660e33b0e0b
-
[ Tools ] 微软对 Windows 10 上的 BitLocker 关于安全设计上的策略 : https://developers.google.com/web/updates/2018/08/devtools
-
-
[ Tools ] 所有你可能想要了解的,Dynamic Taint Analysis和Forward Symbolic Execution应用在安全相关领域的技术: https://edmcman.github.io/papers/oakland10.pdf