腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Android ] Android 系统中通过 RSSI 广播泄漏敏感数据的漏洞详情披露(CVE-2018-9581): https://wwws.nightwatchcybersecurity.com/2018/11/11/cve-2018-9581/
-
[ Blockchain ] 以太坊智能合约安全检查列表: https://github.com/knownsec/Ethereum-Smart-Contracts-Security-CheckList
-
[ Browser ] 即将发布的 V8 v7.2 版本中推出更容易调试的异步功能: https://twitter.com/i/web/status/1062000102909169670
-
[ Defend ] 防止被 Hack 的安全指南 : https://motherboard.vice.com/en_us/article/d3devm/motherboard-guide-to-not-getting-hacked-online-safety-guide
-
[ Exploit ] 一些新的 PHP Exploit 技术介绍: https://files.ripstech.com/slides/PHP.RUHR_2018_New_PHP_Exploitation_Techniques.pdf
-
[ Linux ] Linux Kernel Runtime Guard(LKRG)0.5 版本发布 : https://www.openwall.com/lists/announce/2018/11/12/1
-
[ MalwareAnalysis ] 对恶意软件 "TSCookie" 的详细分析,发现其中存在错误无法读取配置: https://blogs.jpcert.or.jp/en/2018/11/tscookie2.html
-
[ MalwareAnalysis ] 在 Office 文档的嵌入式视频中插入恶意 URL 的感染流程分析: https://blog.trendmicro.com/trendlabs-security-intelligence/hide-and-script-inserted-malicious-urls-within-office-documents-embedded-videos/
-
[ Mitigation ] 关于 Mitigation Bypass 和漏洞利用技巧的多个议题分享,来自 Yunhai Zhang : https://twitter.com/i/web/status/1061859512150159360
-
[ Pentest ] 从内存加载 DLL: https://www.joachim-bauch.de/tutorials/loading-a-dll-from-memory/
-
[ Pentest ] 使用浏览器 URL 协议进行横向渗透: https://medium.com/@mattharr0ey/lateral-movement-using-url-protocol-e6f7d2d6cf2e
-
[ SecurityReport ] Cure53 对 CrypTech/DiamondKey 项目的安全审计报告: https://cryptech.is/wp-content/uploads/2018/10/CT-01-report.pdf
-
[ Tools ] poshkatz - Mimikatz PowerShell 模块: https://github.com/STEALTHbits/poshkatz
-
[ Tools ] 如何利用 CoreUI.framework 构建 QuickLook 插件来可视化的检查car 文件的内容: https://blog.timac.org/2018/1112-quicklook-plugin-to-visualize-car-files/
-
-
[ Tools ] Sacara VM 加壳工具使用介绍: http://antonioparata.blogspot.com/2018/11/sacara-vm-vs-antivirus-industry.html
-
[ Tools ] my-arsenal-of-aws-security-tools - 开源 AWS 安全工具列表: https://github.com/toniblyx/my-arsenal-of-aws-security-tools
-
[ Tools ] 如何开发 Burp 扩展 : https://devilslab.in/files/Burp%20Extension%20Writing%20Workshop.pdf
-
[ Vulnerability ] WordPress Van Ons WP GDPR Compliance 插件的远程代码执行漏洞(CVE-2018-19207): https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19207
-
[ Windows ] Microsoft Windows win32k.sys 无效指针缺陷: https://nafiez.github.io/security/pointer/2018/11/09/Microsoft-win32ksys-invalid-pointer.html
-
-
[ Challenges ] Pwn2Own TOKYO 2018 第一天的比赛安排及部分结果公布 : https://www.zerodayinitiative.com/blog/2018/11/12/welcome-to-pwn2own-tokyo-2018-day-one
-
-
-
[ Pentest ] 红队基础设施的日志聚合与监控: https://medium.com/rvrsh3ll/attack-infrastructure-log-aggregation-and-monitoring-6348ce760875
-
[ Pentest ] BadGPO - 使用组策略进行持久化和横向渗透: http://www.sicherheitsforschung-magdeburg.de/uploads/journal/MJS_052_Willi_GPO.pdf
-
[ SecurityProduct ] Cisco ASA 安全产品拒绝服务漏洞(CVE-2018-15454)披露 : https://blog.nsfocusglobal.com/threats/vulnerability-analysis/cisco-asa-security-product-denial-of-service-vulnerability-cve-2018-15454-threat-alert/
-
[ Vulnerability ] Google MyAccount 价值 7500$ 的点击劫持漏洞披露: https://apapedulimu.click/clickjacking-on-google-myaccount-worth-7500/