腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Browser ] Safari 技术预览版 73 发布: https://webkit.org/blog/8555/release-notes-for-safari-technology-preview-73/
-
[ Browser ] Internet Explorer 脚本引擎远程代码执行漏洞(CVE-2018-8389)POC: https://github.com/tunz/js-vuln-db/blob/master/jscript/CVE-2018-8389.md
-
[ Browser ] Chrome 将禁止扩展程序的跨域提取功能: https://groups.google.com/a/chromium.org/forum/#!topic/chromium-extensions/BQEhuSNVhHw
-
[ Forensics ] Windows 注册表取证分析: https://www.fireeye.com/blog/threat-research/2019/01/digging-up-the-past-windows-registry-forensics-revisited.html
-
[ Fuzzing ] 通过二维输入空间探测进行文件系统模糊测试: https://csdl.computer.org/csdl/proceedings/sp/2019/6660/00/666000a577.pdf
-
[ Language ] 微软对 .NET 开源的过程介绍: https://medium.com/microsoft-open-source-stories/starting-the-net-open-source-revolution-e0268b02ac8a
-
[ Linux ] Linux/x86 - wget chmod execute over execve /bin/sh -c Shellcode (119 bytes): https://www.exploit-db.com/exploits/46103
-
[ Malware ] virii - 远古计算机病毒源代码的收集: https://github.com/guitmz/virii
-
[ Programming ] 如何通过 Extended Feature Enable Register (EFER) 进行 Windows Syscall Kook: https://revers.engineering/syscall-hooking-via-extended-feature-enable-register-efer/
-
[ Programming ] 使用 .NET Core 2.2 和 Application Insights 监控 GC 和 内存分配: https://stebet.net/monitoring-gc-and-memory-allocations-with-net-core-2-2-and-application-insights/
-
[ ReverseEngineering ] 对 StarCraft 地图的逆向工程: https://0xeb.net/wp-content/uploads/2018/02/StarCraft_EUD_Emulator.pdf
-
[ Side Channel ] 硬件无关的测信道攻击方法介绍,OS Page Cache 攻击(Paper): https://arxiv.org/pdf/1901.01161.pdf
-
[ Tools ] LeakLooker - 使用 Shodan 快速寻找可公开访问数据库的工具: https://hackernoon.com/leaklooker-find-open-databases-in-a-second-9da4249c8472
-
[ Tools ] uul - 让 uul ELF 二进制文件同时在多个 *nix 风格的系统上运行的项目: https://github.com/linuxthor/uul
-
[ Tools ] r2frida-wiki - 关于 r2frida 的使用维基: https://github.com/enovella/r2frida-wiki
-
[ Vulnerability ] Intel 周二修补了三处高危漏洞以及两处中危漏洞,其中一无线管理应用的漏洞可导致本地提权: https://threatpost.com/intel-patches-privilege-escalation-bugs/140665/
-
[ Vulnerability ] systemd-journald 中多个漏洞披露(CVE-2018-16864、CVE-2018-16865、CVE-2018-16866)及 Exploit: https://www.openwall.com/lists/oss-security/2019/01/09/3
-
[ Vulnerability ] xterm.js 的远程代码执行漏洞(CVE-2019-0542)补丁发布: https://twitter.com/_fel1x/status/1083085715565621250
-
-
-
[ Browser ] 深入解析 JScript 的 Garbage Collection(GC) : https://gist.github.com/sudhackar/20eef22e8790ee05a3b325513daf858b