
腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Android ] Android 内核的 CFI(Control flow Integrity)分析: https://c0reteam.org/2018/09/17/kcfi
-
[ Attack ] 将证书透明度作为攻防工具: https://isc.sans.edu/diary/24114
-
[ Attack ] EL 注入与 Java 反序列化漏洞组合利用: https://tint0.com/when-el-injection-meets-java-deserialization/
-
[ Data Breach ] 电子邮件营销公司的 MongoDB 数据库泄漏了1100万条用户记录: https://www.zdnet.com/article/mongodb-server-leaks-11-million-user-records-from-e-marketing-service/
-
[ Hardware ] 对 ARM A-Profile 架构的介绍(Armv8.5-A): https://community.arm.com/processors/b/blog/posts/arm-a-profile-architecture-2018-developments-armv85a
-
[ Hardware ] Intel 软件保护扩展的 Library API 规范: https://download.01.org/intel-sgx/dcap-1.0/docs/SGX_ECDSA_QuoteGenReference_DCAP_API_Linux_1.0.pdf
-
[ IoTDevice ] 制作 CAN 总线数据传输嗅探器: https://www.riscure.com/blog/building-multi-can-bus-logger/
-
-
[ MalwareAnalysis ] 追踪 NSO 组织的 Pegasus 间谍软件在45个国家的活动: https://citizenlab.ca/2018/09/hide-and-seek-tracking-nso-groups-pegasus-spyware-to-operations-in-45-countries/
-
[ Popular Software ] 如何使用类型混淆(CVE-2018-12794)在 ADOBE READER 中获取代码执行,来自 ZDI : https://www.zerodayinitiative.com/blog/2018/9/18/cve-2018-12794-using-type-confusion-to-get-code-execution-in-adobe-reader
-
[ Tools ] Sacara - 基于堆栈的中间表示语言,通过在软件的VM中运行,来保护软件免受逆向工程的分析 : https://github.com/enkomio/sacara
-
[ Virtualization ] 虚拟安全模式(VSM)与内存获取研究: http://blog.rekall-forensic.com/2018/09/virtual-secure-mode-and-memory.html
-
[ Virtualization ] L1TF(Foreshadow) VM guest虚拟机读取主机内存PoC(CVE-2018-3646): https://github.com/gregvish/l1tf-poc/
-
[ Vulnerability ] Moodle 开源学习平台反序列化远程代码执行漏洞披露(CVE-2018-14630): https://seclists.org/fulldisclosure/2018/Sep/28
-
[ Vulnerability ] EE 4GEE Mini 本地提权漏洞(CVE-2018-14327): https://osandamalith.com/2018/09/17/ee-4gee-mini-local-privilege-escalation-vulnerability-cve-2018-14327/
-
[ Vulnerability ] 多个 iFrame Busters 中的 XSS 漏洞影响到顶级站点: https://randywestergren.com/xss-vulnerabilities-in-multiple-iframe-busters-affecting-top-tier-sites/
-
[ Browser ] V8 官方博客发布文章介绍,他们是如何在 V8 中提高 DataView 性能的: https://v8project.blogspot.com/2018/09/dataview.html
-
[ iOS ] iOS 12完美越狱? 来见识一下什么是真正的iOS虚拟机Corellium : https://www.weibo.com/ttarticle/p/show?id=2309404285641759270427&sudaref=t.co&display=0&retcode=6102
-
-
[ Mobile ] ARM ShellCode 相关技术的深入讨论: https://www.slideshare.net/saumilshah/make-arm-shellcode-great-again
-
[ Tools ] Windows Hypervisor Platform Client项目和对HAXM的小型实验项目 : 1)https://github.com/StrikerX3/whvpclient 2)https://github.com/StrikerX3/haxmclient 3)https://github.com/intel/haxm
-