腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Attack ] 滥用 kubelet 默认配置攻击 Kubernetes 集群: https://labs.mwrinfosecurity.com/blog/attacking-kubernetes-through-kubelet/
-
[ Browser ] IE 脚本引擎漏洞 CVE-2018-8653 的分析: https://securingtomorrow.mcafee.com/other-blogs/mcafee-labs/ie-scripting-flaw-still-a-threat-to-unpatched-systems-analyzing-cve-2018-8653/
-
[ Browser ] JavaScript Engine (V8、ChakraCore、JavaScriptCore、SpiderMonkey、JScript) 多个漏洞的 POC 合集: https://github.com/tunz/js-vuln-db
-
[ MalwareAnalysis ] TrendMicro 发现大范围的垃圾邮件活动使用 JavaScript 恶意脚本传播勒索软件、挖矿软件、间谍软件以及蠕虫: https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/javascript-malware-in-spam-spreads-ransomware-miners-spyware-worm
-
[ Tools ] Google Chrome 开发团队发布的 URL 显示指南: https://chromium.googlesource.com/chromium/src/+/master/docs/security/url_display_guidelines/url_display_guidelines.md
-
[ Tools ] 计算机与网络安全,来自 Purdue 大学 Avinash Kak 教授的讲义: https://engineering.purdue.edu/kak/compsec/NewLectures/
-
[ Tools ] Invoke-Apex - 基于 PowerShell 的后渗透测试工具包: https://github.com/securemode/Invoke-Apex
-
[ Tools ] 通过 PowerShell 编写 WinDbg 脚本,Blog updated: http://www.leeholmes.com/blog/2009/01/21/scripting-windbg-with-powershell/
-
[ Tools ] Metasploit Framework 5.0 版本发布公告: https://blog.rapid7.com/2019/01/10/metasploit-framework-5-0-released/
-
[ Tools ] bypass-firewalls-by-DNS-history - 通过寻找 DNS 历史来绕过 WAF 直接访问真实 IP 地址的工具: https://github.com/vincentcox/bypass-firewalls-by-DNS-history
-
[ Virtualization ] VMware Workstation SVGA 逃逸技术分享,来自 BlueHat V18 和 BlackHat Europe 2018 的演讲议题: https://census-labs.com/news/2019/01/11/straight-outta-vmware-microsoft-bluehat-v18-black-hat-europe-2018/
-
[ Vulnerability ] Microsoft Windows Insufficient UI Warning 的远程代码执行漏洞(ZDI-19-013),ZDI 已确认,但 Microsoft 决定不修复: http://hyp3rlinx.altervista.org/advisories/MICROSOFT-WINDOWS-VCF-FILE-INSUFFICIENT-WARNING-REMOTE-CODE-EXECUTION.txt