
腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Attack ] 分析 Msfvenom 的 Payloads: https://rastating.github.io/analysing-msfvenom-payloads/
-
[ Browser ] Chakra 脚本引擎由于 localeCompare 导致的类型混淆漏洞(CVE-2018-8355),来自 Project Zero: https://bugs.chromium.org/p/project-zero/issues/detail?id=1588
-
[ Browser ] Chakra 脚本引擎由于 PathTypeHandlerBase::SetAttributesHelper 导致的类型混淆漏洞(CVE-2018-8384),来自 Project Zero: https://bugs.chromium.org/p/project-zero/issues/detail?id=1586
-
[ Browser ] BlinkGC 的 UAF 漏洞(CVE-2018-6158),来自 Project Zero: https://bugs.chromium.org/p/chromium/issues/detail?id=841280
-
[ Bug Bounty ] Facebook 宣布扩大其漏洞赏金计划,接受访问令牌泄漏漏洞: https://threatpost.com/facebook-now-offers-bounties-for-access-token-exposure/137477/
-
-
[ iOS ] Apple 发布 iOS 12 的安全性改进内容: https://support.apple.com/en-al/HT209106
-
[ Malware ] 支持 Windows 和 Linux 的恶意软件 Xbash 将僵尸网络、勒索软件以及挖矿功能集成到一起进行传播: https://researchcenter.paloaltonetworks.com/2018/09/unit42-xbash-combines-botnet-ransomware-coinmining-worm-targets-linux-windows/
-
[ Others ] 通过 Devtools 协议拦截和修改 Chrome 的响应: https://blog.shapesecurity.com/2018/09/17/intercepting-and-modifying-responses-with-chrome-via-the-devtools-protocol/
-
[ Popular Software ] Oracle VirtualBox Manager 5.2.18 r124319 - 'Name Attribute' 拒绝服务 POC: https://www.exploit-db.com/exploits/45421/
-
[ Popular Software ] Oracle WebCenter Interaction 10.3.3 中的多个漏洞披露: https://seclists.org/fulldisclosure/2018/Sep/22
-
[ Tools ] TripleDoggy - 基于clang static analyzer的源码漏洞检测工具: https://github.com/GoSSIP-SJTU/TripleDoggy
-
[ Tools ] passcat - 从本地计算机中提取密码的工具: https://github.com/twelvesec/passcat
-
[ Tools ] 如何将 AFL 扩展,使其可以有效利用 256 线程的机器: https://gamozolabs.github.io/fuzzing/2018/09/16/scaling_afl.html
-
[ Tools ] sheepl - 模拟真实用户行为以协助实验环境下的攻防研究项目: https://github.com/SpiderLabs/sheepl
-
[ Tools ] SprayingToolkit - 一组更快更高效的,对 Lync/S4B & OWA 进行密码喷射攻击的 Python 脚本工具: https://github.com/byt3bl33d3r/SprayingToolkit
-
[ Tools ] Android-Reports-and-Resources - HackerOne 上披露的 Android 应用漏洞收集列表: https://github.com/B3nac/Android-Reports-and-Resources
-
[ Tools ] compiler-explorer - 在 Web浏览器上交互方式运行的编译器: https://github.com/mattgodbolt/compiler-explorer
-
[ Tools ] gorsh - go 语言编写的反弹 Shell: https://github.com/audibleblink/gorsh
-
[ Windows ] Ubuntu 发布为 Windwos Hyper-V 专门优化的Ubuntu桌面版镜像(Ubuntu 18.04.1): https://twitter.com/i/web/status/1041779303204245511
-
[ iOS ] iOS Internals:介绍内核缓存相关的章节: http://www.newosxbook.com/forum/viewtopic.php?f=8&t=19565 PDF download: http://www.newosxbook.com/forum/download/file.php?id=193&sid=ebdb5ceeef2cc1df01d50273f9e625da
-
[ iOS ] iOS 12 修复了qwertyoruiop 所使用的本地提权漏洞,Video: https://twitter.com/qwertyoruiopz/status/1041772984388775937
-
-
-
[ Vulnerability ] NUUO 网络视频录像机两处高危漏洞详情披露(CVE-2018-1149、CVE-2018-1150): https://www.tenable.com/blog/tenable-research-advisory-peekaboo-critical-vulnerability-in-nuuo-network-video-recorder
-
[ Windows ] 如何构建 Windows x64 内存 dump 的堆栈跟踪的详细介绍: https://www.sciencedirect.com/science/article/pii/S1742287618300458