腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ iOS ] 如何通过 JavaScript 来 Dump iOS app: https://medium.com/0xcc/dump-ios-apps-in-javascript-part-i-f02ac4079e91
-
[ Pentest ] 绕过 Crowdstrike Falcon 检测,使用网络钓鱼邮件发送恶意 Excel 文件获取反向后门: https://0x00sec.org/t/bypassing-crowdstrike-falcon-detection-from-phishing-email-to-reverse-shell/10802
-
[ Tools ] 可以生成 PDF 和 PE 的 MD5 冲突的脚本: https://github.com/corkami/pocs/blob/master/collisions/README.md#pdf---pe
-
[ Windows ] 滥用 CDPSvc 服务修改 PATH 环境变量在 Windows 10 上实现持久化: https://www.a12d404.net/windows/2019/01/13/persistance-via-path-directories.html
-
[ WirelessSecurity ] 使用 LoRa 实现对 NFC 支付的中继攻击: https://salmg.net/2019/01/12/nfc-payment-relay-attacks-with-lora/
-
[ Android ] 黑客如何攻击朝鲜的 Android 设备: https://static.hacker.house/releasez/docs/Pyongyang_2407_HackerHouse_dc526.pdf
-
[ Browser ] Mom What Is Zero Multiplied By Infinity,针对 ChakraCore Loop 循环导致的越界读写漏洞(CVE-2018-8391)的分析: https://blogs.projectmoon.pw/2019/01/13/Story1-Mom-What-Is-Zero-Multiplied-By-Infinity/
-
[ Bug Bounty ] 作者介绍如何发现 GitHub XSS 漏洞并获得奖金的过程 : https://renaudmarti.net/posts/first-bug-bounty-submission/
-
[ Others ] hooking DirectX 获取游戏内的模型指纹(以 Vermintide 2 游戏为例): https://niemand.com.ar/2019/01/08/fingerprinting-models-when-hooking-directx-vermintide-2/
-
-
[ Tools ] the-book-of-secret-knowledge - 优秀网络资源收集清单(包含:系统管理/网络管理/开发/渗透测试/安全研究): https://github.com/trimstray/the-book-of-secret-knowledge
-
-
[ Vulnerability ] AudioCode IP 电话中的远程命令注入漏洞披露(CVE-2018-10093): https://sysdream.com/news/lab/2019-01-11-cve-2018-10093-remote-command-injection-vulnerability-in-audiocode-ip-phones/
-
[ Vulnerability ] AudioCode IP 电话中的存储型 XSS 漏洞披露(CVE-2018-10091): https://sysdream.com/news/lab/2019-01-11-cve-2018-10091-stored-xss-vulnerabilities-in-audiocode-ip-phones/
-
[ Vulnerability ] Microsoft DirectX 内存损坏漏洞(CVE-2018-8563)POC : https://pulsesecurity.co.nz/advisories/CVE20188563
-
[ Windows ] 在 Windows 10 SMode 上启用 Adminless Mode : https://tyranidslair.blogspot.com/2019/01/enabling-adminless-mode-on-windows-10.html