腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ APT ] APT33 组织使用 Ruler 攻击 Outlook 客户端的手法分析: https://www.fireeye.com/blog/threat-research/2018/12/overruled-containing-a-potentially-destructive-adversary.html
-
[ Attack ] 攻击 HTTP 认证的多种方式介绍: https://www.hackingarticles.in/multiple-ways-to-exploiting-http-authentication/
-
[ Exploit ] Danderspritz 的 Exploit 模块介绍及如何开发 : https://hackernoon.com/inside-of-danderspritz-post-exploitation-modules-18a4f2761130
-
[ iOS ] iOS 渗透测试工具 Part 3: Frida 与 Objection: https://www.allysonomalley.com/2018/12/20/ios-pentesting-tools-part-3-frida-and-objection/
-
[ IoTDevice ] Twinkly Twinkly Little Star - 攻击智能圣诞灯: https://labs.mwrinfosecurity.com/blog/twinkly-twinkly-little-star
-
[ Linux ] Linux 进程感染,Part 1: https://www.tarlogic.com/en/blog/linux-process-infection-part-i/
-
[ MalwareAnalysis ] 对一款 Android 窃取短信的恶意软件详细分析: https://maxkersten.nl/binary-analysis-course/malware-analysis/android-sms-stealer/
-
[ Vulnerability ] Netatalk 缓冲区溢出漏洞(CVE-2018-1160)的发现与利用: https://medium.com/tenable-techblog/exploiting-an-18-year-old-bug-b47afe54172