腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Others ] 2019 版 OSINT 开源情报收集指南: https://www.randhome.io/blog/2019/01/05/2019-osint-guide/
-
[ Tools ] Modlishka - 一款灵活且功能强大的反向代理工具 : https://github.com/drk1wi/Modlishka
-
[ APT ] APT 攻击中通过使用合法程序的 DLL 劫持漏洞来加载恶意代码的例子: https://www.a12d404.net/security/2019/01/01/side-loading-fun.html
-
[ Forensics ] 从 PowerShell 进程转储中提取历史操作的取证方法: http://www.leeholmes.com/blog/2019/01/04/extracting-activity-history-from-powershell-process-dumps/
-
[ MalwareAnalysis ] 分析使用 Fallout 漏洞利用工具包分发 Vidar 隐私窃取软件和 GandCrab 勒索软件的威胁活动: https://blog.malwarebytes.com/threat-analysis/2019/01/vidar-gandcrab-stealer-and-ransomware-combo-observed-in-the-wild/
-
[ Operating System ] 针对 PC 的实模式、保护模式和长模式,以及相应汇编代码的介绍 : https://www.codeproject.com/Articles/45788/The-Real-Protected-Long-mode-assembly-tutorial-for
-
[ Pentest ] 使用 ICMP 隧道进行 C2 通信的研究: https://medium.com/bugbountywriteup/ping-power-icmp-tunnel-31e2abb2aaea
-
-
-
[ Vulnerability ] Apache OpenOffice 的缓冲区溢出漏洞(CVE-2018-11790)披露: https://blogs.securiteam.com/index.php/archives/3758
-
[ Vulnerability ] 从 Virus Total 中寻找敏感信息泄漏: https://medium.com/@YumiSec/virus-total-the-best-way-to-disclose-your-company-secrets-92988396f36a