腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Browser ] ungoogled-chromium - 一款增强隐私保护和透明度的定制版 Chromium 浏览器: https://github.com/Eloston/ungoogled-chromium
-
[ Hardware ] 介绍如何逆向集成电路: https://twitter.com/i/web/status/1064683397883191298
-
[ Hardware ] Apple T2 平台带来的安全性提升: https://duo.com/labs/research/secure-boot-in-the-era-of-the-t2
-
[ Linux ] 如何对 Linux 进行持久化攻击的介绍 : https://www.imperva.com/blog/dirtycow-bug-drives-attackers-to-a-backdoor-in-vulnerable-drupal-web-servers/
-
[ Linux ] Linux MPLAB-X 软件存在可导致特权提升的堆溢出漏洞: https://twitter.com/i/web/status/1064610006438424576
-
[ MalwareAnalysis ] Sednit 组织使用的 Zebrocy 恶意软件分析: https://www.welivesecurity.com/2018/11/20/sednit-whats-going-zebrocy/
-
[ MalwareAnalysis ] Sofacy 组织最新 'Cannon' 木马分析: https://researchcenter.paloaltonetworks.com/2018/11/unit42-sofacy-continues-global-attacks-wheels-new-cannon-trojan/
-
[ MalwareAnalysis ] OceanLotus 组织针对东南亚的水坑攻击活动分析: https://www.welivesecurity.com/2018/11/20/oceanlotus-new-watering-hole-attack-southeast-asia/
-
[ Popular Software ] Protonmail 加密架构分析: https://eprint.iacr.org/2018/1121.pdf
-
[ Popular Software ] Adobe Flash 中可导致远程代码执行的类型混淆漏洞分析(CVE-2018-15981): https://www.ragestorm.net/blogs/?p=421
-
[ Standard ] Microsoft 发布 Windows 10 和 Windows Server 2016 安全审核和监控参考标准: https://www.microsoft.com/en-us/download/details.aspx?id=52630
-
[ Standard ] 由美国国家标准与技术研究所 (NIST) 发布的数字身份指南,身份验证和生命周期管理指南: https://pages.nist.gov/800-63-3/sp800-63b.html
-
[ Tools ] De-DOSfuscator 一款对 cmd.exe 执行命令进行记录的工具介绍 : https://www.fireeye.com/blog/threat-research/2018/11/cmd-and-conquer-de-dosfuscation-with-flare-qdb.html
-
[ Tools ] msf-elf-in-memory-execution - 内存执行 ELF 的 Metasploit 后渗透测试模块: https://github.com/fbkcs/msf-elf-in-memory-execution
-
[ Tools ] out-of-tree - 内核漏洞利用开发工具发布 : https://twitter.com/ZeroNights/status/1064900216107749377/photo/1
-
[ Vulnerability ] Atlantis Word Processor 多处远程代码执行漏洞披露(CVE-2018-4038、CVE-2018-4039、CVE-2018-4040): https://blog.talosintelligence.com/2018/11/Atlantis-Word-Processor-RCE-vulns.html
-
[ Vulnerability ] phpBB 3.2.3: Phar 反序列化远程代码执行漏洞详情披露: https://blog.ripstech.com/2018/phpbb3-phar-deserialization-to-remote-code-execution/
-
[ Vulnerability ] 在受限环境中通过 Mozilla Firefox 绕过限制执行系统命令: https://www.contextis.com/en/blog/escaping-from-mozilla-firefox-in-restricted-environments
-
[ Windows ] Windows DfMarshal Unmarshaling 导致的特权提升漏洞( CVE-2018-8550),来自Project Zero : 1) https://bugs.chromium.org/p/project-zero/issues/detail?id=1644 2) https://www.exploit-db.com/exploits/45893
-
[ Crypto ] 最佳安全实践:在 Java 和 Android 中使用AES进行对称加密: https://proandroiddev.com/security-best-practices-symmetric-encryption-with-aes-in-java-7616beaaade9
-
[ MalwareAnalysis ] 如何创建无法检测的 Payload : https://null-byte.wonderhowto.com/how-to/hacking-macos-create-undetectable-payload-0189715
-
[ Tools ] BloodHound 黑客手册: https://www.ernw.de/download/BloodHoundWorkshop/ERNW_DogWhispererHandbook.pdf
-
[ Vulnerability ] Ruby OpenSSL Library X.509 证书绕过漏洞披露(CVE-2018-16395):https://tools.cisco.com/security/center/viewAlert.x?alertId=59175