腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Attack ] 将 .Net 程序注入到非托管进程: https://movaxbx.ru/2018/10/23/injecting-net-assemblies-into-unmanaged-processes/
-
[ Attack ] 介绍针对 Jenkins 服务器漏洞的攻击方法,并且通过对其的滥用达到进一步控制: https://www.crowdstrike.com/blog/your-jenkins-belongs-to-us-now-abusing-continuous-integration-systems/
-
[ Attack ] Windows UAC Bypass 利用: https://cxsecurity.com/issue/WLB-2018100205
-
[ Browser ] Firefox 63 发布: https://www.mozilla.org/en-US/firefox/63.0/releasenotes/
-
[ Challenges ] HITCON CTF 2018 - One Line PHP 挑战题解: https://blog.orange.tw/2018/10/hitcon-ctf-2018-one-line-php-challenge.html
-
[ Conference ] POC2018 大会议程: http://powerofcommunity.net/schedule.htm
-
[ Hardware ] 搭建自己的硬件植入工具: https://research.kudelskisecurity.com/2018/10/23/build-your-own-hardware-implant/
-
[ IoTDevice ] 使用 SDR 攻击汽车钥匙: https://www.lufsec.com/hacking-car-key-fobs-with-sdr/
-
[ MalwareAnalysis ] 恶意邮件活动利用 sLoad 下载者向英国和意大利分销 Ramnit 银行木马: https://www.proofpoint.com/us/threat-insight/post/sload-and-ramnit-pairing-sustained-campaigns-against-uk-and-italy
-
[ MalwareAnalysis ] 介绍 Apple 新架构的优缺点及其对恶意软件的影响: https://www.sentinelone.com/blog/inside-safari-extensions-malicious-plugins-remain-mojave/
-
[ Tools ] 远程打印机服务探测脚本发布: https://twitter.com/mysmartlogon/status/1053945624465412096
-
[ Tools ] 作者 0xffff0800 共享了其恶意软件样本库,包括APT组织的恶意代码: https://twitter.com/i/web/status/1054634703498563585
-
[ Tools ] 仿真编程技术研究(Paper) : http://personals.ac.upc.edu/vmoya/docs/emuprog.pdf
-
[ Tools ] 使用 Falco 来检测 jQuery 文件上传插件的漏洞(CVE-2018-9206): https://sysdig.com/blog/detecting-jquery-file-upload-plugin-vulnerability-using-falco-cve-2018-9206/
-
[ Vulnerability ] 如何通过 Hackability 来测试并利用未知的浏览器渲染引擎的功能: https://2018.appsec.eu/presos/Hacker_Exploiting-Unknown-Browsers_Gareth-Heyes_AppSecEU2018.pdf
-
[ Vulnerability ] 配置错误的 Amazon S3 存储服务器是如何泄漏用户大量数据的: https://www.upguard.com/breaches/out-of-pocket-how-an-isp-exposed-administrative-system-credentials
-
[ Web Security ] 用于保护 Web 服务的基本 HTTP 头介绍: https://pentest-tools.com/blog/essential-http-security-headers/
-
[ Windows ] winspy - 一款可以创建 Windows 反向连接后门的工具 : https://github.com/TunisianEagles/winspy
-
[ WirelessSecurity ] 详细介绍 Zigbee 协议及其安全性的分析和测试 : 1) https://research.kudelskisecurity.com/2017/11/01/zigbee-security-basics-part-1/; 2) https://research.kudelskisecurity.com/2017/11/08/zigbee-security-basics-part-2/; 3) https://research.kudelskisecurity.com/2017/11/21/zigbee-security-basics-part-3/
-
[ Others ] 非常规手段上传下载二进制文件: http://blog.nsfocus.net/unconventional-means-uploading-downloading-binary-files/
-
[ ReverseEngineering ] 逆向 Windows Defenders 仿真器(DEFCON 26 Video): https://www.youtube.com/watch?v=2NawGCUOYT4
-
[ Vulnerability ] 三种不基于 Web 的 XSS 漏洞点介绍: https://websec.ca/publication/blog/Three-Non-Web-based-XSS-Injections