
腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Android ] Android sdcardfs 在没有正确锁定的情况下修改 current->fs 所导致漏洞的介绍(CVE-2018-9515): https://bugs.chromium.org/p/project-zero/issues/detail?id=1617
-
[ Attack ] 详细介绍了 Microsoft Office 中可以使用的各种攻击技巧: https://github.com/outflanknl/Presentations/blob/master/DerbyCon_2018_The_MS_Office_Magic_Show.pdf
-
[ Hardware ] Trusted Firmware 安全分区介绍,作者对 trustzone 中的可信固件的代码进行了权限分级,提出了可信固件中的安全分区概念: https://osfc.io/uploads/talk/paper/18/osfc_secure_partitions.pdf
-
[ iOS ] Apple 发布了 iOS 12.0.1的安全相关的改进内容: https://support.apple.com/en-us/HT209162
-
[ MalwareAnalysis ] 针对在威胁狩猎中如何制定长期有效的签名技巧的详细介绍: https://www.slideshare.net/DanielBohannon2/signaturesaredead-long-live-resilient-signatures
-
[ Others ] 使用 PowerShell 将 NetSh Trace ETL 文件转换成 PCAP 文件: https://chentiangemalc.wordpress.com/2018/10/08/convert-netsh-trace-etl-to-pcap-with-powershell/
-
[ Others ] 使用 Invoke-Confusion 调用远程代码的使用示例: https://homjxi0e.wordpress.com/2018/10/02/invoke-confusion-attack-of-powershell/
-
[ Pentest ] 滥用 Windows 库文件进行持久化: https://www.countercept.com/blog/abusing-windows-library-files-for-persistence/
-
[ Pentest ] 在渗透中通过 Mimikatz 工具获取服务账户的凭证: https://www.securifera.com/blog/2018/10/07/servicefu/
-
[ ReverseEngineering ] 对 qwertyoruiop Crackme 的逆向及 Keygen 的开发 : https://reverse.put.as/2018/10/06/reversing-and-keygenning-qwertyoruiop-crackme/
-
[ SecurityProduct ] Imperva SecureSphere 13 远程命令执行漏洞 EXP: https://www.exploit-db.com/exploits/45542/
-
[ Symbolic Execution ] 如何用符号执行来解决 FlareOn Level 6 挑战: http://ctfhacker.com/reverse/2018/09/16/flareon-2018-level6-angr.html
-
[ Tools ] Metro Apps 的其他 IEFO 密钥列表: http://www.hexacorn.com/blog/2018/10/08/additional-iefo-keys-for-metro-apps/
-
[ Tools ] 方程式组织后渗透框架 KillSuit 分析: https://speakerdeck.com/francisck/killsuit-the-equation-groups-swiss-army-knife-for-persistence-evasion-and-data-exfil
-
[ Tools ] 适用于 Linux 2018 的 bpftrace (DTrace 2.0) 工具发布: http://www.brendangregg.com/blog/2018-10-08/dtrace-for-linux-2018.html
-
[ Vulnerability ] 介绍 Windows Shim database 的攻击面及漏洞挖掘方法: https://www.whinysoot.com/slides/AFL_QBDI_KSE_On_a_Boat.pdf
-
[ Vulnerability ] 利用 NodeJS SSRF 漏洞获取 AWS 完全控制权限: http://10degres.net/aws-takeover-ssrf-javascript/
-
[ Vulnerability ] 通过利用 Chakra 中的设计缺陷绕过 CFG 保护机制 : https://github.com/Microsoft/ChakraCore/commit/4196f8097afdcc5fe01ce2966871712fb24003a3#diff-313e10e84814b5cb12117bf9fc497566
-
[ Web Security ] 如何将 PHP Phar 包转化成图像以绕过文件类型检测: https://www.nc-lp.com/blog/disguise-phar-packages-as-images
-
[ Attack ] What makes OS drivers dangerous for BIOS?作者详细介绍了 Rookit 修改 BIOS 的步骤和 BIOS 更新工具中驱动程序被滥用的风险: https://medium.com/@matrosov/dangerous-update-tools-c246f7299459
-
-
-
-
-
-
[ Vulnerability ] 对 mDNSOffloadUserClient.kext 中 UAF 漏洞的详细介绍: https://blogs.projectmoon.pw/2018/10/07/Use-After-Free-in-mDNSOffloadUserClient-kext/
-
[ Vulnerability ] Skia GPU 渲染中存在多个整数溢出漏洞(CVE-2018-16070): https://bugs.chromium.org/p/chromium/issues/detail?id=848716
-
[ Vulnerability ] 作者介绍了其发现的一个有趣的 Google 漏洞并因此漏洞获得了 3133.7 美元的奖励: http://www.sec-down.com/wordpress/?p=809