
腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Attack ] 针对传真机的攻击面研究: https://www.x41-dsec.de/lab/blog/fax/
-
[ Exploit ] Linux/x86 - Egghunter (0x50905090) + sigaction() Shellcode (27 bytes): https://www.exploit-db.com/exploits/45441/
-
[ Fuzzing ] 如何基于 AFL 开发 Java 的 Fuzz 工具介绍: https://www.modzero.ch/modlog/archives/2018/09/20/java_bugs_with_and_without_fuzzing/index.html
-
[ MalwareAnalysis ] 使用 Delphi 壳逃避恶意软件分类的技术分析: https://www.fireeye.com/blog/threat-research/2018/09/increased-use-of-delphi-packer-to-evade-malware-classification.html
-
[ MalwareAnalysis ] 门罗币挖矿恶意软件 Sustes 分析: https://marcoramilli.blogspot.com/2018/09/sustes-malware-cpu-for-monero.html
-
-
[ Others ] 介绍 PS4 漏洞相关信息的 wiki: http://www.psdevwiki.com/ps4/Working_Exploits
-
[ Pentest ] C# 后渗透测试库 SharpSploit 介绍: https://posts.specterops.io/introducing-sharpsploit-a-c-post-exploitation-library-5c7be5f16c51
-
[ Pentest ] VLAN Hopping 攻击技术与缓解措施介绍: https://www.alienvault.com/blogs/security-essentials/vlan-hopping-and-mitigation
-
[ Pentest ] 攻击 Exchange/OWA 收集域账户信息: https://www.youtube.com/watch?v=N1MEOLiCvBs
-
[ Popular Software ] Cisco IOS XE 软件的静态凭证漏洞,允许未经身份验证的攻击者以默认的用户名密码登陆设备(CVE-2018-0150): https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-xesc
-
[ Programming ] 使用 Ubuntu 进行 x86-64 汇编语言编程(PDF) : http://www.egr.unlv.edu/~ed/assembly64.pdf
-
-
[ Tools ] Metasploit 将 CVE-2018-8440 ALPC 漏洞添加到攻击模块中: https://github.com/rapid7/metasploit-framework/pull/10643
-
[ Tools ] Erays - 用于以太坊智能合约逆向工程的工具: https://github.com/teamnsrg/erays
-
[ Tools ] SharpBox - 一个基于 C# 的工具,通过 Dropbox API 对 Dropbox 进行压缩和加密: https://github.com/P1CKLES/SharpBox
-
[ Vulnerability ] 西部数码 My Cloud 中的身份验证绕过漏洞详情披露(CVE-2018-17153) : https://www.securify.nl/advisory/SFY20180102/authentication-bypass-vulnerability-in-western-digital-my-cloud-allows-escalation-to-admin-privileges.html
-
-
[ Vulnerability ] MGETTY 多处漏洞详情披露: https://www.x41-dsec.de/lab/advisories/x41-2018-007-mgetty/
-
[ Web Security ] IKEA.com 本地文件包含漏洞披露,PDF 解析的巧妙利用: https://medium.com/@jonathanbouman/local-file-inclusion-at-ikea-com-e695ed64d82f
-
[ Windows ] 捕获对 Gargoyle 内存扫描的逃避技术: https://www.countercept.com/blog/hunting-for-gargoyle-memory-scanning-evasion/
-
[ Windows ] 可以让 Windows 活动目录崩溃的 POC 代码: https://github.com/skelsec/windows_ad_dos_poc
-
[ Windows ] Windows JET 数据库引擎远程代码执行漏洞披露: https://www.zerodayinitiative.com/blog/2018/9/20/zdi-can-6135-a-remote-code-execution-vulnerability-in-the-microsoft-windows-jet-database-engine
-
-
[ Browser ] Windows10 下 64 位 Edge 浏览器 UAF 漏洞的高级利用: https://github.com/mrowensnobody/presentation/blob/master/Windows10%E4%B8%8B64%E4%BD%8DEdge%E6%B5%8F%E8%A7%88%E5%99%A8UAF%E6%BC%8F%E6%B4%9E%E7%9A%84%E9%AB%98%E7%BA%A7%E5%88%A9%E7%94%A8.pdf
-
[ MalwareAnalysis ] 如何使用 OSSEC 寻找可疑进程: https://isc.sans.edu/forums/diary/Hunting+for+Suspicious+Processes+with+OSSEC/24122/
-
[ MalwareAnalysis ] 支持 Windows 和 Linux 的新型恶意软件 Xbash 将僵尸网络、勒索软件以及挖矿功能进行了集成: https://thehackernews.com/2018/09/ransomware-coinmining-botnet.html
-
[ Pentest ] Windows 域环境渗透测试实验室项目 - OFFSHORE 发布:https://twitter.com/mrb3n813/status/1042225113679228928
-
[ SCADA ] 在 ICS 工控系统中 RAT(远程管理工具)所带来的威胁: https://securelist.com/threats-posed-by-using-rats-in-ics/88011/
-
-
[ Tools ] 使用 Python 编写 Burp 插件的教程: https://laconicwolf.com/2018/04/13/burp-extension-python-tutorial/
-