腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Android ] Android Keystore 为开发人员提供了一组保护用户数据的加密工具: https://android-developers.googleblog.com/2018/12/new-keystore-features-keep-your-slice.html
-
[ Android ] 基于 Android 移动设备的互联网流量中位置数据泄漏的分析(Paper) : https://arxiv.org/pdf/1812.04829.pdf
-
[ Backdoor ] Trend Micro 对 Shadow Brokers 泄漏的一款 clocksvc.exe 后门的分析: https://documents.trendmicro.com/assets/tech-brief-tildeb-analyzing-the-18-year-old-implant-from-the-shadow-brokers-leak.pdf
-
[ Language ] JavaScript Public and private class fields: https://developers.google.com/web/updates/2018/12/class-fields
-
[ Linux ] Linux 'userfaultfd' tmpfs File 权限绕过 : https://www.exploit-db.com/exploits/45983
-
[ Others ] 对 .net core 运行时的深入解析: http://mattwarren.org/2018/12/13/Exploring-the-.NET-Core-Runtime/
-
[ Others ] 对 2010 年初推出的游戏 DRM 系统的分析 Part 1: https://yingtongli.me/blog/2018/11/16/drm1-1.html
-
[ Others ] Virgin Media Hub 3.0 漏洞挖掘与后门: https://www.nccgroup.trust/uk/about-us/newsroom-and-events/blogs/2018/december/owning-the-virgin-media-hub-3.0-the-perfect-place-for-a-backdoor/
-
[ Others ] FLARE 脚本系列: 通过仿真实现 Objective-C 自动化代码分析: https://www.fireeye.com/blog/threat-research/2018/12/automating-objective-c-code-analysis-with-emulation.html
-
[ SecurityReport ] Rapid7 第三季度威胁报告中的三个关键趋势分析: https://blog.rapid7.com/2018/12/13/q3-threat-report-analyzing-three-key-detection-trends/
-
[ Tools ] get_payload.py - 通过安装 apk 来获取解密的 payload: https://twitter.com/i/web/status/1072888987285630976
-
[ Tools ] 使用 osquery 进行审计 Part 1 - Linux 审计框架简介: https://medium.com/palantir/auditing-with-osquery-part-one-introduction-to-the-linux-audit-framework-217967cec406 使用 osquery 进行审计 Part 2 - 配置和实现: https://medium.com/palantir/auditing-with-osquery-part-two-configuration-and-implementation-87a8bba0ef48
-
[ Tools ] Street-Party - 用于查看和修改视频会议 RTP 流的工具: https://github.com/googleprojectzero/Street-Party
-
[ Vulnerability ] YARA 代码执行漏洞挖掘与利用: https://bnbdr.github.io/posts/extracheese/
-
[ Vulnerability ] 视频会议的安全风险: 视频会议软件的研究中发现 11 个漏洞后的总结与建议,来自 Project Zero : https://googleprojectzero.blogspot.com/2018/12/adventures-in-video-conferencing-part-5.html
-
[ Vulnerability ] logitech: "Options" Craft WebSocket server 允许没有身份验证的访问,可能导致代码执行等安全问题: https://bugs.chromium.org/p/project-zero/issues/detail?id=1663
-
-
[ Pentest ] 使用渗透测试工具进行攻击 : https://blog.erratasec.com/2018/12/notes-about-hacking-with-drop-tools.html#.XBMcHNUzaUk
-
[ Web Security ] 我如何生成任意 Facebook 用户访问令牌的 : https://medium.com/bugbountywriteup/how-i-was-able-to-generate-access-tokens-for-any-facebook-user-6b84392d0342