
腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Attack ] 内核模式中的 webcam 拦截和保护: https://www.virusbulletin.com/uploads/pdf/magazine/2018/201809-through-the-looking-glass.pdf
-
[ Attack ] 介绍一个 COM 劫持问题的演示和 POC: https://twitter.com/i/web/status/1044783437960400897
-
[ Backdoor ] 在野外发现的首个 UEFI rootkit - LoJax 分析,来自 ESET: https://www.welivesecurity.com/2018/09/27/lojax-first-uefi-rootkit-found-wild-courtesy-sednit-group/
-
[ Browser ] 如何利用一个 Safari 信息泄露: https://phoenhex.re/2018-09-26/safari-array-concat
-
[ Browser ] Microsoft Edge 浏览器沙箱逃逸漏洞(CVE-2018-8355),来自 Project Zero : https://bugs.chromium.org/p/project-zero/issues/detail?id=1598&;desc=5
-
[ Browser ] V8 中的代码缓存优化机制的详细介绍: https://twitter.com/i/web/status/1045327208053657602
-
[ Compiler ] 微软用 C# 重写了其 C# 编译器并将其开源的始末: https://medium.com/microsoft-open-source-stories/how-microsoft-rewrote-its-c-compiler-in-c-and-made-it-open-source-4ebed5646f98
-
[ Compiler ] 深入解析 .NET 09,Just-In-Time(JIT)编译 : https://www.dsibinski.pl/2018/09/net-internals-09-just-in-time-jit-compilation/
-
[ Fuzzing ] 如何通过模糊测试来检测 Windows Linux 子系统的安全性: https://www.slideshare.net/AnthonyLAOUHINETSUEI/wsl-reloaded
-
[ iOS ] PanguTeam 在 iPhone XS 上实现了 iOS 12 越狱,在最新的A12芯片上绕过了 PAC 缓解机制 : https://twitter.com/SparkZheng/status/1045265728318754816/photo/1
-
[ Linux ] Linux IRDA 驱动 UAF 漏洞详情披露(CVE-2018-6554、CVE-2018-6555): https://blogs.securiteam.com/index.php/archives/3759
-
[ MalwareAnalysis ] 来自 avast 对 IoT Botnet Torii 的分析: https://blog.avast.com/new-torii-botnet-threat-research
-
[ MalwareAnalysis ] 新的 KONNI 恶意软件对欧亚和东南亚地区进行针对性攻击,Paloalto 对此做出了技术分析: https://researchcenter.paloaltonetworks.com/2018/09/unit42-new-konni-malware-attacking-eurasia-southeast-asia/
-
[ Pentest ] 通过 COM 绕过 AppLocker CLM : https://www.mdsec.co.uk/2018/09/applocker-clm-bypass-via-com/
-
[ Popular Software ] Cisco Webex Network Recording Player 栈溢出漏洞披露(CVE-2018-15421): https://www.zerodayinitiative.com/blog/2018/9/27/cve-2018-15421-examining-a-stack-based-overflow-in-the-cisco-webex-network-recording-player
-
[ ReverseEngineering ] 替换 Windows 中的 Driver Altitude Checks: https://revers.engineering/superseding-driver-altitude-checks-on-windows/
-
[ ThreatIntelligence ] Acamar - 一款子域名收集工具: https://github.com/si9int/Acamar
-
[ Tools ] Wasmjit - 一款适用于 Linux 内核模式的 WebAssembly Runtime 工具: https://github.com/rianhunter/wasmjit
-
[ Tools ] Windows Token 操作套件 Tokenvator 第2版发布: https://blog.netspi.com/tokenvator-release-2/
-
[ Windows ] 通过行为监控、AMSI 和下一代 AV 检测无文件恶意软件攻击: https://cloudblogs.microsoft.com/microsoftsecure/2018/09/27/out-of-sight-but-not-invisible-defeating-fileless-malware-with-behavior-monitoring-amsi-and-next-gen-av/
-
-
[ Pentest ] 绕过 Duo 双因素身份验证: https://www.n00py.io/2018/08/bypassing-duo-two-factor-authentication-fail-open/
-