腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Android ] 使用 FRIDA 为 Android 应用进行脱壳的操作指南: https://www.fortinet.com/blog/threat-research/defeating-an-android-packer-with-frida.html
-
[ Attack ] 利用 Shellter 躲避恶意代码检测软件: https://www.securityartwork.es/2018/11/05/evading-av-with-shellter-i-also-have-sysmon-and-wazuh-ii/
-
[ Firmware ] 通过 PS4 Aeolia 处理器固件上的漏洞实现代码执行: https://fail0verflow.com/blog/2018/ps4-cec/
-
[ Forensics ] 如何使用 Passive DNS 记录进行事件响应: https://securityintelligence.com/how-to-use-passive-dns-to-inform-your-incident-response/
-
[ Industry News ] 微软发布.NET Standard 2.1 : https://blogs.msdn.microsoft.com/dotnet/2018/11/05/announcing-net-standard-2-1/
-
[ MalwareAnalysis ] 窃取伊朗用户 Instagram 与 Telegram 隐私的攻击活动分析: https://blog.talosintelligence.com/2018/11/persian-stalker.html
-
[ MalwareAnalysis ] Unit42 发现有攻击者使用去年的 Office 漏洞(CVE-2017-11882) 攻击欧洲用户: https://researchcenter.paloaltonetworks.com/2018/11/unit42-inception-attackers-target-europe-year-old-office-vulnerability/
-
[ Mobile ] FRIDA 脚本绕过 Android FLAG_SECURE 检查 : https://serializethoughts.com/2018/10/07/bypassing-android-flag_secure-using-frida/
-
[ Others ] 内存标记技术及其如何提高 C/C++ 内存安全性介绍,来自 CppCon 2018: https://www.youtube.com/watch?v=lLEcbXidK2o
-
[ Pentest ] 红队的故事 Part 2 - 从 SQL 注入到域管理员: https://www.tarlogic.com/en/blog/red-team-tales-0x02-from-sqli-to-domain-admin/
-
[ Pentest ] 渗透测试中关于 HTA 文件的多种攻击手法介绍: https://medium.com/tsscyber/pentesting-and-hta-bypassing-powershell-constrained-language-mode-53a42856c997
-
[ Popular Software ] 印象笔记 Windows 客户端 6.15 本地文件读取和远程命令执行漏洞(CVE-2018-18524): https://paper.seebug.org/736/
-
-
[ SecurityAdvisory ] Android 2018 年 11 月安全公告发布: https://source.android.com/security/bulletin/2018-11-01
-
[ SecurityAdvisory ] Apache 发布 Apache Struts 安全通报(CVE-2016-1000031): https://www.us-cert.gov/ncas/current-activity/2018/11/05/Apache-Releases-Security-Advisory-Apache-Struts
-
[ Tools ] McFLY - 一款用于 Web 应用程序的时间调试器 : https://arxiv.org/pdf/1810.11865.pdf
-
[ Tools ] 用于 GDB 和 GEF 工具的命令备忘清单: https://github.com/zxgio/gdb_gef-cheatsheet
-
[ Tools ] Nuuo NVRmini2 RCE 漏洞的 Metasploit 利用模块开发: http://www.berkdusunur.net/2018/11/development-of-metasploit-module-after.html
-
[ Tools ] IDA 7.2 更新内容一览: https://www.hex-rays.com/products/ida/7.2/
-
[ Tools ] Sysinternals ProcDump 工具的 Linux 版: https://github.com/Microsoft/ProcDump-for-Linux
-
[ Vulnerability ] 智能合约重入漏洞的相关信息与利用方式介绍: https://console-cowboys.blogspot.com/2018/11/blockchain-exploitation-labs-part-1.html
-
[ Vulnerability ] Symfony PHP 框架内的 forward() 方法导致的远程代码执行漏洞详情: https://blogs.securiteam.com/index.php/archives/3781
-
[ Vulnerability ] Dell OpenManage Network Manager 多处漏洞及 POC 披露(CVE-2018-15767, CVE-2018-15768): https://seclists.org/fulldisclosure/2018/Nov/21
-
[ Vulnerability ] Microsoft 提供一个名 "Microsoft Authenticator" 的 Android 应用,用于双因素身份验证,但该应用允许被屏幕截图 : https://wwws.nightwatchcybersecurity.com/2018/09/05/microsoft-authenticator-for-android-allows-screen-capture/
-
[ Bug Bounty ] 如何使用浏览器对网站源代码进行静态分析 - 初学者的漏洞赏金猎人指南: https://medium.com/@_bl4de/how-to-perform-the-static-analysis-of-website-source-code-with-the-browser-the-beginners-bug-d674828c8d9a
-
-
[ Malware ] 介绍恶意代码开发 Part 1, 简单的回连 CMD Shell : https://scriptdotsh.com/index.php/2018/09/04/malware-on-steroids-part-1-simple-cmd-reverse-shell/
-
[ Others ] PRISMA 白帽子黑客训练系列文档:https://www.prismacsi.com/en/documents/
-
-
[ Tools ] Shellter Pro 工具对混淆功能进行了改进 : https://www.shellterproject.com/shellter-pro-obfuscation-improvements/
-
[ Virtualization ] VMX 是如何在系统中启用以及 VMX 初始化的操作介绍: https://revers.engineering/day-2-entering-vmx-operation/