腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Android ] 专为 HackRF 和 Proxmark 3 而构建的支持多种测试功能的 Android 内核 Shuriken : https://scriptdotsh.com/index.php/2018/12/26/shuriken-android-kernel-on-steroids/
-
[ Browser ] Chakra 引擎中可以导致远程代码执行的 JIT 漏洞(CVE-2018-8629)PoC: https://github.com/phoenhex/files/blob/master/pocs/cve-2018-8629-chakra.js
-
[ Exploit ] Microsoft Exchange Server 特权提升漏洞(CVE-2018-8581)利用 : https://github.com/WyAtu/CVE-2018-8581/
-
[ Hardware ] 评估便携式路由器的安全性:深入分析硬件内部: https://blog.malwarebytes.com/101/how-tos/2018/12/assessing-the-security-of-a-portable-router-a-look-inside-its-hardware-part-deux/
-
[ Industry News ] 黑客通过 IPMI Remote console 接口使用 JungleSec 勒索软件感染 Linux 服务器: https://securityaffairs.co/wordpress/79219/malware/junglesec-ransomware-ipmi.html
-
[ Pentest ] 打破域林安全边界 - 攻击域林间的信任: http://www.harmj0y.net/blog/redteaming/not-a-security-boundary-breaking-forest-trusts/
-
[ Pentest ] ws-na.amazon-adsystem.com(Amazon) 反射型 XSS 漏洞披露: https://medium.com/@newp_th/reflected-xss-on-ws-na-amazon-adsystem-com-amazon-f1e55f1d24cf
-
[ Protocol ] 利用侧信道攻击 4G 和 5G 蜂窝寻呼协议 : https://relentless-warrior.github.io/files/paging-ndss19-preprint.pdf
-
[ Protocol ] HTTP Security Headers 与工作原理介绍: https://www.netsparker.com/whitepaper-http-security-headers/
-
[ SecurityReport ] Paloalto 2018 年第 3 季度 Web 威胁分析总结: https://unit42.paloaltonetworks.com/web-based-threats-2018-q3-malicious-urls-and-domains-take-a-dip/
-
[ Tools ] audit-radius - radius 认证服务器审计工具: https://github.com/ANSSI-FR/audit-radius
-
[ Tools ] 通过 Dnstap 来改进 DNS 日志记录: https://www.vanimpe.eu/2018/12/27/dnstap-for-improved-dns-logging-on-ubuntu/
-
[ Tools ] 通过 Docker 和共享内存运行 end-to-end srsLTE 系统的最小实例: https://github.com/pgorczak/srslte-docker-emulated
-
[ Tools ] DVSA - 易受攻击的 serverless 应用程序漏洞演练环境及课程: https://twitter.com/i/web/status/1078008081177559042
-
[ Vulnerability ] Guardzilla Security Video System GZ521W 型号中硬编码密码漏洞(CVE-2018-5560) : https://www.0dayallday.org/guardzilla-video-camera-hard-coded-aws-credentials/
-
[ Vulnerability ] 一个可以部分控制写入内容的 Windows 特权文件写漏洞: https://github.com/SandboxEscaper/randomrepo/blob/master/angrypolarbearbug.rar
-
[ Windows ] Windows SMB Server 漏洞(MS17-010)支持回连 Shell 的利用 : https://github.com/mez0cc/MS17-010_WORAWIT
-
[ Windows ] Windows 10 设备安全研究议题 PPT,来自 WinHEC 2018 大会: https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RE2IIVu
-
[ Vulnerability ] SMB 协议上的挂载点滥用可绕过客户端的符号链接保护策略: https://tyranidslair.blogspot.com/2018/12/abusing-mount-points-over-smb-protocol.html https://bugs.chromium.org/p/project-zero/issues/detail?id=138