腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Browser ] 介绍 Chrome SwiftShader 中存在的缺陷及如何进行利用,来自 Project Zero: https://googleprojectzero.blogspot.com/2018/10/heap-feng-shader-exploiting-swiftshader.html
-
[ Browser ] Safari 技术预览版 68 发布 : https://webkit.org/blog/8475/release-notes-for-safari-technology-preview-68/
-
[ Conference ] TenSec 2018 大会所有议题材料放出: https://share.weiyun.com/5IJZPBp
-
[ Firmware ] 逆向分析 ESP8266 固件系列: https://boredpentester.com/reversing-esp8266-firmware-part-1/
-
[ MalwareAnalysis ] TrendMicro 发现针对巴西用户的恶意软件滥用合法 Windows 组件 WMI 和 CertUtil : https://blog.trendmicro.com/trendlabs-security-intelligence/malware-targeting-brazil-uses-legitimate-windows-components-wmi-and-certutil-as-part-of-its-routine/
-
[ MalwareAnalysis ] AutoIT 恶意代码分析: https://isc.sans.edu/diary/24238
-
[ MalwareAnalysis ] Fall 2018 Exploit kits 回顾,来自 Malwarebytes: https://blog.malwarebytes.com/threat-analysis/2018/10/exploit-kits-fall-2018-review/
-
[ MalwareAnalysis ] McAfee 针对 Android/TimpDoor 恶意软件的分析: https://securingtomorrow.mcafee.com/mcafee-labs/android-timpdoor-turns-mobile-devices-into-hidden-proxies
-
[ Mitigation ] 通过 task_threads 来绕过 Apple 平台的二进制保护机制: https://bazad.github.io/2018/10/bypassing-platform-binary-task-threads/
-
[ Others ] Chrome WebRTC 的 VP9 处理中存在 UAF 漏洞(CVE-2018-16071): https://bugs.chromium.org/p/chromium/issues/detail?id=855211
-
[ Pentest ] 使用 presentationhost.exe 绕过 AppLocker 白名单限制: https://medium.com/@jpg.inc.au/applocker-bypass-presentationhost-exe-8c87b2354cd4
-
[ Programming ] Linux 上 TCP bind 和 listen 的内部实现: https://ops.tips/blog/how-linux-tcp-introspection/
-
[ Protocol ] 利用 Masscan 端口扫描程序学习 TCP/IP 协议: https://blog.erratasec.com/2018/10/masscan-as-lesson-in-tcpip.html#.W9BMw9UzaUk
-
[ Tools ] 通过 Intel® VTune™ Amplifier 对 .NET 的核心代码进行性能分析: https://blogs.msdn.microsoft.com/dotnet/2018/10/23/net-core-source-code-analysis-with-intel-vtune-amplifier/
-
[ Tools ] WindowsDefenderTools - 用于对 Windows Defender mpengine.dll 进行逆向工程的工具: https://github.com/v-p-b/WindowsDefenderTools/tree/recreate
-
[ Tools ] PESecInfo - 一款可以修改 ASLR 和 DEP 标志的简单工具: https://osandamalith.com/2018/10/24/pe-sec-info-a-simple-tool-to-manipulate-aslr-and-dep-flags/ GitHub: https://github.com/OsandaMalith/PESecInfo/releases
-
[ Vulnerability ] 多种系统平台的特权提升和利用相关的文章汇总: https://movaxbx.ru/2018/09/16/privilege-escalation-post-exploitation/
-
[ Vulnerability ] AppleT8015PPM.kext 中的越界读取漏洞披露(CVE-2018-4282): https://blog.zimperium.com/cve-2018-4282-bounds-read-vulnerability-applet8015ppm-kext/
-
[ Vulnerability ] Apache OFBiz 16.11.04 XML 外部实体注入漏洞: https://www.exploit-db.com/exploits/45673/
-
[ Vulnerability ] WebEx 中的 WebexUpdateService 存在漏洞,允许攻击者远程执行 System 权限的代码: https://blog.skullsecurity.org/2018/technical-rundown-of-webexec
-
[ Vulnerability ] tinc VPN 身份认证绕过和消息篡改等多个漏洞披露(CVE-2018-16737, CVE-2018-16738, CVE-2018-16758): https://labs.mwrinfosecurity.com/advisories/tinc-vpn
-
[ Vulnerability ] CVE-2018-3245 漏洞的 PoC : https://github.com/pyn3rd/CVE-2018-3245
-
[ Windows ] Windows 10 正在构建一个沙盒功能,可以让用户将不受信任的应用程序在一次性的虚拟机中运行: https://arstechnica.com/staff/2018/08/windows-10-to-get-disposable-sandboxes-for-dodgy-apps/
-
[ macOS ] 通过 Broadcom AirPort kext 中的缺陷(CVE-2018-4338)可以导致MacOS信息泄漏 : https://www.zerodayinitiative.com/blog/2018/10/24/cve-2018-4338-triggering-an-information-disclosure-on-macos-through-a-broadcom-airport-kext
-
[ MalwareAnalysis ] 分析通过 ADB 调试接口进行感染的后门 - Trinity : https://www.ixiacom.com/company/blog/trinity-p2p-malware-over-adb
-
[ Vulnerability ] 从 web 页面导航到 chrome://brave 可以导致RCE: 1)https://hackerone.com/reports/415178;2) https://hackerone.com/reports/415967;
-
[ Windows ] SandboxEscaper 公开了可以对 Windows 进行本地特权提升的 0day 漏洞 : https://twitter.com/SandboxEscaper/status/1054744201244692485