
腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Attack ] 对 Magecart 组织攻击电子产品零售商 Newegg 的调查分析报告: https://www.volexity.com/blog/2018/09/19/magecart-strikes-again-newegg/
-
[ Attack ] 内核模式的威胁与防御,Part 1: https://www.endgame.com/blog/technical-blog/kernel-mode-threats-practical-defenses-part-1
-
[ Browser ] WebRTC - VP8 Block Decoding UAF 漏洞披露(CVE-2018-6155): https://bugs.chromium.org/p/chromium/issues/detail?id=842265
-
[ Challenges ] ROP Primer CTF 挑战通关记录: http://www.hackingarticles.in/hack-the-rop-primer-1-0-1-ctf-challenge/
-
[ iOS ] 四种绕过 iOS SSL 验证和证书固定的方法: https://blog.netspi.com/four-ways-to-bypass-ios-ssl-verification-and-certificate-pinning/
-
[ MalwareAnalysis ] SmokeLoader 隐藏 C2 服务器的方法分析: https://int0xcc.svbtle.com/a-taste-of-our-own-medicine-how-smokeloader-is-deceiving-dynamic-configuration-extraction-by-using-binary-code-as-bait
-
[ MalwareAnalysis ] PyLocky 勒索软件分析: https://blog.trendmicro.com/trendlabs-security-intelligence/a-closer-look-at-the-locky-poser-pylocky-ransomware/
-
[ Others ] OSCP 考试经验分享: https://scund00r.com/all/oscp/2018/02/25/passing-oscp.html
-
[ Pentest ] CloudGoat 使用教程 Part 1:攻击 AWS EC2 服务以进行权限提升: https://medium.com/@rzepsky/playing-with-cloudgoat-part-1-hacking-aws-ec2-service-for-privilege-escalation-4c42cc83f9da
-
[ Pentest ] 如何给非域管理员用户赋予读取域控安全日志的权限: https://girl-germs.com/?p=1538
-
[ Programming ] 内存标记及如何提高 C/C ++ 内存安全性: https://arxiv.org/ftp/arxiv/papers/1802/1802.09517.pdf
-
[ Tools ] 可视化 Sysmon 日志并检测可疑设备行为: https://blog.jpcert.or.jp/2018/09/visualise-sysmon-logs-and-detect-suspicious-device-behaviour--sysmonsearch.html
-
[ Tools ] phishing-frenzy - Ruby on Rails 编写的钓鱼框架: https://github.com/pentestgeek/phishing-frenzy
-
[ Tools ] 如何通过 Kibana,Wazuh 和 Bro IDS 提高中小企业的威胁检测能力: https://www.netscylla.com/blog/2018/09/18/kibana-wazuh-bro.html
-
[ Tools ] Hex-Rays Microcode API 和对抗混淆编译器: http://www.hexblog.com/?p=1248
-
[ Windows ] Windows NtEnumerateKey 的双重引用导致的特权提升漏洞(CVE-2018-8410),来自 Project Zero: https://bugs.chromium.org/p/project-zero/issues/detail?id=1599 https://trapmine.com/blog/details-of-cve-2018-8410-windows-kernel-vulnerability-discovered-by-trapmine/
-
-
-
[ Browser ] 作者关于 Brave Browser 的三个漏洞,可以导致 UXSS 及地址栏欺骗等问题 : https://twitter.com/kinugawamasato/status/1042305282498412544 1) https://hackerone.com/reports/187542;2) https://hackerone.com/reports/188086; 3) https://hackerone.com/reports/188561
-
-
[ Hardware ] ARM v8.3 中的指针验证安全特性介绍: https://events.static.linuxfound.org/sites/events/files/slides/slides_23.pdf
-
[ Hardware ] 分析 Switch 6.0 trustzone 的 IDC 脚本,以及5.1.0到6.0.0的更新变化: https://twitter.com/SciresM/status/1042305803116371970
-
-
-
[ MalwareAnalysis ] 爆破Tomcat服务器,GandCrab 4.3勒索病毒成功入侵企业内网: http://www.freebuf.com/articles/es/184424.html
-
[ Pentest ] MSSQL 调用 xp_dirtree 结合 NTLM 中继攻击获取 MSSQL 最高权限: https://labs.asteriskinfosec.com.au/ntlm-relay-backflips/
-
-
[ Tools ] nmap-bootstrap-xsl - 将 nmap 结果输出进行 Bootstrap 美化的 XSL : https://github.com/honze-net/nmap-bootstrap-xsl