腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Attack ] 新的 Gmail 钓鱼方式 - 将邮件发送到对方的发件箱中: https://blog.cotten.io/hacking-gmail-with-weird-from-fields-d6494254722f
-
[ Attack ] 通过 Web Proxy Auto-Discovery(WPAD) 进行沙箱逃逸: https://github.com/hacksysteam/WpadEscape
-
[ Attack ] 使用 imap_open 绕过 php disable_functions 执行命令 : https://github.com/Bo0oM/PHP_imap_open_exploit; https://antichat.com/threads/463395/#post-4254681
-
[ Browser ] Safari 技术预览版本 70 发布: https://webkit.org/blog/8496/release-notes-for-safari-technology-preview-70/
-
[ Cloud ] AWS云安全相关的介绍,来自 Scott Piper: https://docs.google.com/presentation/d/1KXREbZCOC4XFoDX-wapC9H-bhxSZQG0h3KJpxUX0ErA/edit#slide=id.p
-
[ Debug ] 在 PANDA 动态调试平台上进行 Time-Travel 调试: https://raywang.tech/2018/11/14/Time-Travel-Debugging-in-PANDA/
-
[ Firmware ] 研究人员发现了多个类似于 Spectre 和 Meltdown 的漏洞: https://arstechnica.com/gadgets/2018/11/spectre-meltdown-researchers-unveil-7-more-speculative-execution-attacks/ Paper: https://arxiv.org/abs/1811.05441
-
[ iOS ] *OS device 中视频解码器驱动程序漏洞介绍(CVE-2018-4109): https://blog.zimperium.com/cve-2018-4109-overwriting-kernel-memory-video-packets/
-
[ MachineLearning ] 红队的机器学习 Part 1 - 通过进程列表结合机器学习检测沙盒环境: https://silentbreaksecurity.com/machine-learning-for-red-teams-part-1/
-
[ MalwareAnalysis ] 大型游戏狩猎:INDRIK SPIDER 从 DRIDEX 银行木马欺诈到 BitPaymer 勒索软件的演变: https://www.crowdstrike.com/blog/big-game-hunting-the-evolution-of-indrik-spider-from-dridex-wire-fraud-to-bitpaymer-targeted-ransomware/
-
[ Pentest ] Atlassian Jira 认证后上传后门执行代码的 Metasploit 利用模块: https://packetstormsecurity.com/files/150335/jira_plugin_upload.rb.txt
-
[ Protocol ] TCP / IP Illustrated 第1卷: http://www.cs.newpaltz.edu/~pletcha/NET_PY/the-protocols-tcp-ip-illustrated-volume-1.9780201633467.24290.pdf
-
[ Tools ] 免费开源的在线调查工具包列表分享: https://docs.google.com/document/d/1BfLPJpRtyq4RFtHJoNpvWQjmGnyVkfE2HYoICKOGguA/edit
-
[ Tools ] msf-autoshell - 通过 nessus 扫描结果利用 Metasploit 自动获取 shell 的工具: https://github.com/DanMcInerney/msf-autoshell
-
[ Tools ] scada-stuff - 用于对 SCADA/ICS 设备进行逆向分析与攻击的脚本工具集 : https://github.com/nezza/scada-stuff
-
[ Tools ] 使用 BenchmarkDotNet 和 PerfView 进行性能测试: https://adamsitnik.com/Sample-Perf-Investigation/
-
[ Tools ] ZIPFileRaider - 自动化测试 Web 应用 ZIP 处理漏洞的 Burp 插件: https://github.com/destine21/ZIPFileRaider
-
[ Virtualization ] Unikernel 容器介绍: https://blog.acolyer.org/2018/11/14/unikernels-as-processes/
-
[ Vulnerability ] Checkpoint 安全研究人员发现大疆无人机论坛的 XSS 漏洞,可进行会话劫持获取无人机存储的敏感信息: https://research.checkpoint.com/dji-drone-vulnerability/
-
[ Vulnerability ] Oracle WebLogic 远程代码执行漏洞(CVE-2018-2894)的验证视频: https://blog.detectify.com/2018/11/14/technical-explanation-of-cve-2018-2894-oracle-weblogic-rce/
-
[ Vulnerability ] wp-gdpr-compliance 反序列化漏洞披露: https://medium.com/alertot/serialization-flaw-in-wp-gdpr-compliance-8cfc8feb4ec3
-
[ Web Security ] 我是如何发现影响约 20 个 Uber 子域的 XSS 漏洞的: https://blog.fadyothman.com/how-i-discovered-xss-that-affects-over-20-uber-subdomains/
-
[ Windows ] Kaspersky 发现 Windows 提权漏洞(CVE-2018-8589) 针对 Win7 32位的新利用方式: https://securelist.com/a-new-exploit-for-zero-day-vulnerability-cve-2018-8589/88845/
-
-
[ Popular Software ] SwitchVPN for macOS 2.1012.03 提权漏洞详情(CVE-2018-18860): https://www.exploit-db.com/exploits/45854/
-
[ Windows ] Microsoft Build Engine Compromise - Part One : http://subt0x11.blogspot.com/2018/11/microsoft-build-engine-compromise-part_13.html