
腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Attack ] TCG 平台重置攻击缓解规范: https://trustedcomputinggroup.org/wp-content/uploads/Platform-Reset-Attack-Mitigation-Specification.pdf
-
[ Attack ] 利用 bash-completion 特性执行恶意命令(CVE-2018-7738): https://blog.grimm-co.com/post/malicious-command-execution-via-bash-completion-cve-2018-7738/
-
[ Browser ] Edge Inline Segment Use After Free: https://blogs.projectmoon.pw/2018/09/15/Edge-Inline-Segment-Use-After-Free/
-
[ Browser ] 现代网络浏览器的内部,Part 1: https://developers.google.com/web/updates/2018/09/inside-browser-part1 ; Part 2: https://developers.google.com/web/updates/2018/09/inside-browser-part2
-
[ Browser ] Firefox IPC 消息处理越界写漏洞(CVE-2018-5129)详情披露: https://infinite.loopsec.com.au/cve-2018-5129-how-i-found-my-first-cve
-
[ iOS ] 现代越狱的利用实现介绍,对比了两个越狱的利用开发过程 LiberiOS 和 Electra: https://blog.quarkslab.com/modern-jailbreaks-post-exploitation.html
-
[ iOS ] 指针验证码对于 iOS 越狱意味着什么?: https://ivrodriguez.com/pointer-authentication-on-armv8-3/
-
[ IoTDevice ] 寻找物联网设备连接的端点: 射频与硬件: https://www.synacktiv.com/posts/hardware/hunting-mobile-devices-endpoints-the-rf-and-the-hard-way.html
-
[ Linux ] ELF 文件格式详解 Part 2:理解程序头: http://blog.k3170makan.com/2018/09/introduction-to-elf-format-part-ii.html
-
[ MalwareAnalysis ] DarkCloud Bootkit 分析: https://www.zscaler.com/blogs/research/darkcloud-bootkit
-
[ MalwareAnalysis ] WannaMine 恶意挖矿软件继续使用 EternalBlue 进行传播: https://www.cybereason.com/blog/wannamine-cryptominer-eternalblue-wannacry
-
[ MalwareAnalysis ] Turla 组织使用的键盘记录器分析: https://0ffset.wordpress.com/2018/09/14/post-0x17-1-turla-keylogger/
-
[ Mobile ] 英特尔的基带固件将 x86 引入你的 iPhone: https://lcq2.github.io/x86_iphone/
-
[ Tools ] 用于漏洞概念验证的利用及工具: https://github.com/NickstaDB/PoC
-
[ Tools ] mail-security-tester - 邮件安全测试框架: https://github.com/TKCERT/mail-security-tester
-
[ Tools ] LOLBAS - 可以直接用作攻击工具的,系统自带的二进制文件和脚本(包括动态库): https://github.com/LOLBAS-Project/LOLBAS
-
[ Vulnerability ] 缓冲区溢出实际案例学习: https://maxkersten.nl/binary-analysis-course/assembly-basics/practical-case-buffer-overflow-0x01/
-
[ Vulnerability ] Advantech WebAccess webvrpcs 两个命令注入漏洞及布丁的深入分析: https://blog.exodusintel.com/2018/09/13/to-traverse-or-not-to-that-is-the-question/
-
[ Windows ] Thunderbolt 3 的内核 DMA 保护,可以防止通过 Thunderbolt 连接的热插拔设备进行 DMA 攻击: https://docs.microsoft.com/zh-cn/windows/security/information-protection/kernel-dma-protection-for-thunderbolt