
腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Browser ] 一个通用的浏览器拒绝服务问题 : 1) https://docs.google.com/spreadsheets/d/1TqMgokKqAT8WxNed0iV0X0mXvJ28Eqd9xBJcQ7uYaCY/edit#gid=0 2) https://gist.github.com/pwnsdx/0162faafadeaa73180500ea4d2242663 3) https://rawgit.com/pwnsdx/0162faafadeaa73180500ea4d2242663/raw/558cbaa4d93c98b599cade90febc246af62e1e94/experiment-n15.html
-
[ Browser ] WebKit Webgl 中的 TexImage3D 堆缓冲区溢出漏洞(CVE-2018-6162): https://bugs.chromium.org/p/chromium/issues/detail?id=804123
-
[ Detect ] 测试 AWS 安全性的实用指南 第1部分:AWS S3: http://blog.mindedsecurity.com/2018/09/a-practical-guide-to-testing-security.html
-
[ Industry News ] 英国航空公司遭受 Magecart 组织入侵,大量客户数据被盗: https://www.riskiq.com/blog/labs/magecart-british-airways-breach/
-
[ MalwareAnalysis ] 对 Astaroth WMIC 木马的技术分析: https://cofense.com/seeing-resurgence-demonic-astaroth-wmic-trojan/
-
[ Others ] Qubes U2F 双因素身份验证代理介绍: https://www.qubes-os.org/news/2018/09/11/qubes-u2f-proxy/
-
[ Popular Software ] Facebook 安卓应用任意 Javascript 代码执行漏洞详情披露: https://ash-king.co.uk/facebook-bug-bounty-09-18.html
-
[ Programming ] 使用 C# 编写 JIT 编译器: https://www.mono-project.com/news/2018/09/11/csharp-jit/
-
[ SecurityAdvisory ] Microsoft 发布 2018 年 9 月安全公告: https://portal.msrc.microsoft.com/en-us/security-guidance/acknowledgments
-
[ Side Channel ] Synesthesia:通过声学噪声侧信道捕获屏幕内容(paper): https://arxiv.org/pdf/1809.02629.pdf
-
[ Tools ] 使用 radare2 分析 ELF 打包器: https://github.com/radareorg/r2con2018/blob/master/talks/unpacking/Unpacking-a-Non-Unpackables.pdf
-
[ Tools ] IDArling - IDA Pro 和 Hex-Rays 的协同逆向插件,允许将多个 IDA Pro 的实例连接在一起,同时同步多个用户对数据库所做的修改: https://github.com/IDArlingTeam/IDArling/
-
[ Tools ] OpenSSL 1.1.1 版本发布: https://www.openssl.org/blog/blog/2018/09/11/release111/
-
[ Tools ] peanalyzer32 - PE 文件分析和反汇编工具: https://github.com/blacknbunny/peanalyzer32
-
[ Tools ] 一款漏洞利用与工具搜索引擎 sploitus.com: https://twitter.com/x0rz/status/1039459301788725248
-
[ Vulnerability ] PS Vita 的越狱项目 h-encore,支持最新的固件 3.65, 3.67 和 3.68: https://github.com/TheOfficialFloW/h-encore/blob/master/WRITE-UP.mdhttps://github.com/TheOfficialFloW/h-encore
-
[ Web Security ] 实践中的安全漏洞:通过拆分请求实现的 SSRF 攻击: https://www.rfk.id.au/blog/entry/security-bugs-ssrf-via-request-splitting/
-
[ Windows ] Windows 任务计划服务本地提权漏洞(CVE-2018-8440) 的微软补丁与 0patch 提供的补丁对比: https://blog.0patch.com/2018/09/comparing-our-micropatch-with.html
-
[ Windows ] Windows 提权 0day 漏洞的vPowerShell 例子: https://github.com/OneLogicalMyth/zeroday-powershell
-
[ Attack ] 如何寻找隐藏在 CloudFlare 或 TOR 背后的真实原始 IP: https://www.exploit-db.com/docs/english/45364-finding-the-real-origin-ips-hiding-behind-cloudflare-or-tor.pdf
-
-
[ Vulnerability ] 如何接管55000个子域(Shopify上的子域名接管漏洞): https://medium.com/@thebuckhacker/how-to-do-55-000-subdomain-takeover-in-a-blink-of-an-eye-a94954c3fc75