腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Attack ] 利用 Twitter 图像作为漏洞利用的 payload : https://twitter.com/i/web/status/1057718735987855360
-
[ Conference ] HITB2018PEK 大会议题陆续放出: https://conference.hitb.org/hitbsecconf2018pek/materials/
-
[ iOS ] iOS 12.0.1 的 Webkit 远程代码执行漏洞利用 : 1) https://twitter.com/Yalujb/status/1058038352677625857 2) https://github.com/externalist/exploit_playground/tree/master/jsc_prop_enum_uaf
-
[ iOS ] iOS 12/OS X 远程内核堆溢出 POC (CVE-2018-4407) : https://twitter.com/i/web/status/1057811965945376768
-
[ iOS ] iOS mediaserverd 漏洞与分析,来自 HITB2018PEK 上 Adam Donenfeld 的分享: https://conference.hitb.org/hitbsecconf2018pek/materials/D1T1%20-%20Finding%20Vulnerabilities%20in%20a%20Closed%20Source%20Video%20Decoder%20Driver%20-%20Adam%20Donenfeld.pdf
-
[ IoTDevice ] Cisco Talos 发现 Yi Technology 家用摄像机存在多处漏洞: https://blog.talosintelligence.com/2018/10/vulnerability-spotlight-Yi-Technology.html
-
[ MalwareAnalysis ] CasperPhpTrojan 恶意软件溯源,发现与 Lazarus 恶意软件存在诸多共同点: https://www.intezer.com/paleontology-the-unknown-origins-of-lazarus-malware/
-
[ MalwareAnalysis ] 如何为被恶意软件利用或已撤销的证书创建 YARA 规则: https://www.nextron-systems.com/2018/11/01/short-tutorial-how-to-create-a-yara-rule-for-a-compromised-certificate/
-
[ MalwareAnalysis ] Outlaw 黑客组织使用 Perl Shellbot 部署 IRC Bot 构建僵尸网络的技术分析: https://blog.trendmicro.com/trendlabs-security-intelligence/perl-based-shellbot-looks-to-target-organizations-via-cc/
-
[ Pentest ] 滥用 PowerShell DSC 进行横向渗透: https://posts.specterops.io/abusing-powershell-desired-state-configuration-for-lateral-movement-ca42ddbe6f06
-
[ SecurityProduct ] Cisco ASA 及 Firepower 威胁防御软件拒绝服务漏洞披露(CVE-2018-15454): https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181031-asaftd-sip-dos
-
[ Tools ] SharpCompile - Cobalt Strike的攻击脚本,提供实时编译和执行C#代码的功能: https://github.com/SpiderLabs/SharpCompile
-
[ Tools ] jarjarbigs.py - 可以合并 jar 文件并简化闭源 Java 应用程序的远程调试工具: https://mogwailabs.de/blog/2018/10/jarjarbigs/
-
[ Tools ] 针对一款开源的 Windows 内核模式漏洞利用保护机制工具包 SKREAM 的防护方案介绍: https://www.sentinelone.com/blog/skream-reloaded-randomizing-kernel-pool-allocations/
-
-
[ Tools ] Cobalt Strike Aggressor 自动化脚本分享: https://www.fortynorthsecurity.com/aggressorassessor-and-automation/
-
[ Vulnerability ] Sophos HitmanPro.Alert 本地提权漏洞详情披露(CVE-2018-3971): https://blog.talosintelligence.com/2018/11/TALOS-2018-0636.html
-
[ Windows ] Windows 运行时的内部工作原理,来自 HITB2018PEK 上 James Forshaw 的分享: https://conference.hitb.org/hitbsecconf2018pek/materials/D1T2%20-%20The%20Inner%20Workings%20of%20the%20Windows%20Runtime%20-%20James%20Forshaw.pdf
-
-
[ Vulnerability ] 开源流媒体服务器 Icecast 使用 snprintf 函数不当导致可越界写内存(CVE-2018-18820): https://lgtm.com/blog/icecast_snprintf_CVE-2018-18820
-
[ Vulnerability ] 在二进制文件中通过旧代码来寻找 0day,来自 HITB 2018 Thomas Dullien 的分享: https://conference.hitb.org/hitbsecconf2018pek/materials/D1T2%20-%20Some%20Experiments%20with%20Code%20Similarity%20-%20Halvar%20Flake.pdf