腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Browser ] Microsoft Edge Chakra InlineArrayPush 的类型混淆漏洞(CVE-2018-8617) : https://bugs.chromium.org/p/project-zero/issues/detail?id=1705
-
[ Browser ] Microsoft Edge Chakra JIT InitClass 的类型混淆漏洞(CVE-2019-0539) : https://bugs.chromium.org/p/project-zero/issues/detail?id=1703
-
[ Browser ] Microsoft Edge Chakra JIT NewScObjectNoCtor 或 InitProto 导致的类型混淆漏洞(CVE-2019-0567) : https://bugs.chromium.org/p/project-zero/issues/detail?id=1702
-
[ Bug Bounty ] Microsoft MSRC 公布 Azure DevOps Bounty 奖励计划 : https://blogs.technet.microsoft.com/msrc/2019/01/17/azure-devops-bounty-program/
-
[ Crypto ] 针对破解使用相同随机数生成器,生成 RSA 密钥算法的介绍: https://algorithmsoup.wordpress.com/2019/01/15/breaking-an-unbreakable-code-part-1-the-hack/
-
[ Data Breach ] "Collection #1" 773万条数据泄露解析: https://www.troyhunt.com/the-773-million-record-collection-1-data-reach/
-
[ Forensics ] 从 PowerShell 内存转储中提取执行的脚本内容: http://www.leeholmes.com/blog/2019/01/17/extracting-forensic-script-content-from-powershell-process-dumps/
-
[ Forensics ] 对恶意树莓派设备的取证分析: https://blog.haschek.at/2018/the-curious-case-of-the-RasPi-in-our-network.html
-
[ iOS ] 了解和攻击 iOS 上的 Apple 文件系统: https://bxl1989.github.io/2019/01/17/apfs-remount.html
-
[ Linux ] Linux mremap() 中 TLB 的多个漏洞分析,来自 Project Zero: https://googleprojectzero.blogspot.com/2019/01/taking-page-from-kernels-book-tlb-issue.html
-
[ MalwareAnalysis ] 分析恶意软件的 COMmunication: https://0ffset.net/reverse-engineering/analyzing-com-mechanisms-in-malware/
-
[ MalwareAnalysis ] Rocke 组织最新使用的恶意软件可主动卸载云安全防护以规避检测: https://unit42.paloaltonetworks.com/malware-used-by-rocke-group-evolves-to-evade-detection-by-cloud-security-products/
-
[ MalwareAnalysis ] 针对 macOS 恶意软件 OSX.Dok 在圣诞节回归的攻击活动详细分析: https://www.sentinelone.com/blog/mac-malware-osx-dok-is-back-actively-infecting-victims/
-
[ Mobile ] Amazing breakdown of how SMS works,短信的键入、存储、发送、接收以及显示的细节介绍: https://scottbot.net/the-route-of-a-text-message/
-
[ Pentest ] 挖掘活动目录中的委派授权: https://www.notsosecure.com/hunting-the-delegation-access/
-
[ Attack ] 通过 Voltage Glitching 注入软件漏洞 : https://yifan.lu/2019/01/10/injecting-software-vulnerabilities-with-voltage-glitching/
-
-
[ Browser ] Microsoft Edge Chakra JIT JsBuiltInEngineInterfaceExtensionObject::InjectJsBuiltInLibraryCode 只清除 DisableImplicitFlags 漏洞(CVE-2019-0568) : https://bugs.chromium.org/p/project-zero/issues/detail?id=1709
-
[ Malware ] Freedom Fighting Mode (FFM) 的新命令 !elf 可以在远程及其的内存中运行本地二进制文件 : https://github.com/JusticeRage/FFM/commit/b9a5c787ec7fa99cf8eb2d72c90fed35f592a323
-
[ MalwareAnalysis ] Google Play Protect 对 PMA 家族 Zen 及其变体的分析: https://security.googleblog.com/2019/01/pha-family-highlights-zen-and-its.html