腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Bug Bounty ] Bug Bounty write up 收集: http://karankumar.co.uk/2018/01/02/all-about-bug-bounty/
-
[ Fuzzing ] 编写 Hyper-V “Bridge” Fuzzing - Part 1 WDF: http://www.alex-ionescu.com/?p=377
-
[ Linux ] 如何攻破 Play-with-Docker 的容器,并在 Host 主机中实现代码执行: https://www.cyberark.com/threat-research-blog/how-i-hacked-play-with-docker-and-remotely-ran-code-on-the-host/
-
[ MalwareAnalysis ] Magecart 组织通过入侵电子商务网站的第三方广告供应商来插入恶意代码窃取网站用户数据: https://blog.trendmicro.com/trendlabs-security-intelligence/new-magecart-attack-delivered-through-compromised-advertising-supply-chain/
-
[ Programming ] .NET 中不安全的 X509Certificate.Equals 方法探究: https://posts.specterops.io/subverting-x509certificate-equals-in-net-92b97d1ae59b
-
[ Tools ] 优秀 DNS 信息收集网站 dnsdumpster.com : https://twitter.com/i/web/status/1085465178840346624
-
[ Tools ] volatility-wnf - 浏览并 Dump Windows Notification Facilities 的工具: https://github.com/citronneur/volatility-wnf
-
[ Tools ] NetNTLMtoSilverTicket - 实现 SpoolSample -> NetNTLMv1 -> NTLM -> Silver Ticket 攻击链的工具: https://github.com/NotMedic/NetNTLMtoSilverTicket
-
[ Vulnerability ] rssh 中通过 allowcp 参数绕过受限环境执行任意的漏洞披露: https://esnet-security.github.io/vulnerabilities/20190115_rssh
-
[ Vulnerability ] Hacking Jenkins Part 1 - 动态路由机制中的漏洞挖掘: https://devco.re/blog/2019/01/16/hacking-Jenkins-part1-play-with-dynamic-routing/
-
[ Vulnerability ] ntpsec v1.1.3 中最新修复的四处漏洞详情披露(CVE-2019-6443、CVE-2019-6444、CVE-2019-6445、CVE-2019-6442): https://dumpco.re/blog/ntpsec-bugs
-
[ Vulnerability ] ES 文件资源管理器 HTTP 服务端口打开漏洞披露(CVE-2019-6447): https://github.com/fs0c131y/ESFileExplorerOpenPortVuln
-
[ Vulnerability ] 攻击 Epic Games 游戏平台接管任意 Fortnite 玩家账户: https://research.checkpoint.com/hacking-fortnite/
-
[ Windows ] 从 Windows XP 到 Windows 10 未记录的内核结构: https://www.vergiliusproject.com/
-
[ WirelessSecurity ] LoRa Reverse Engineering and AES EM Side-Channel Attacks using SDR: https://twitter.com/cn0Xroot/status/1085420361255014400
-
[ APT ] 疑似DarkHydrus APT组织针对中东地区的定向攻击活动分析: https://ti.360.net/blog/articles/latest-target-attack-of-darkhydruns-group-against-middle-east/
-
[ Cloud ] Microsoft Azure 团队宣布推出新的 Grafana 与 Microsoft Azure Monitor 日志集成功能: https://azure.microsoft.com/zh-cn/blog/azure-monitor-logs-in-grafana-now-in-public-preview/
-
[ Detect ] 使用 JA3 和 JA3S 进行 TLS 指纹识别: https://engineering.salesforce.com/tls-fingerprinting-with-ja3-and-ja3s-247362855967
-
[ Industry News ] Microsoft 和 VirusTotal 合作对恶意签名的 MSI 文件进行检测: https://www.bleepingcomputer.com/news/security/microsoft-and-virustotal-team-up-to-detect-malicious-signed-msi-files/
-
[ Mobile ] 如何让 Android 应用为 64 位 CPU 做好准备,来自 Android Developers Blog: https://android-developers.googleblog.com/2019/01/get-your-apps-ready-for-64-bit.html
-
[ Vulnerability ] unauth kublet API 10250 暴露可能导致代码执行: https://carnal0wnage.attackresearch.com/2019/01/kubernetes-unauth-kublet-api-10250.html
-
[ Vulnerability ] 未认证的 kublet API 10250 令牌窃取 & kubectl 访问 & 执行: https://carnal0wnage.attackresearch.com/2019/01/kubernetes-unauth-kublet-api-10250_16.html