腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Fuzzing ] 使用 DeepState 对 API 进行模糊测试,Part 1: https://blog.trailofbits.com/2019/01/22/fuzzing-an-api-with-deepstate-part-1/
-
[ Hardware ] Microsoft 对 Intel 80386 上 x86 指令集的介绍: https://blogs.msdn.microsoft.com/oldnewthing/20190121-00/?p=100745
-
[ iOS ] iOS 12.1.3 安全更新详情: https://support.apple.com/en-us/HT209443
-
[ macOS ] macOS Mojave 10.14.3 安全更新内容: https://support.apple.com/en-us/HT209446
-
[ MalwareAnalysis ] McAfee 对 Anatova 勒索软件的技术分析: https://securingtomorrow.mcafee.com/other-blogs/mcafee-labs/happy-new-year-2019-anatova-is-here/
-
[ Pentest ] 反向代理与 URL 路径解析的不一致性研究: https://www.slideshare.net/GreenD0g/reverse-proxies-inconsistency
-
[ Pentest ] 使用 mshta.exe 绕过应用程序白名单的多种方法: https://www.hackingarticles.in/bypass-application-whitelisting-using-mshta-exe-multiple-methods/
-
[ Pentest ] 滥用 Office Web Add-ins 加载项建立对目标邮箱的持久化访问: https://www.mdsec.co.uk/2019/01/abusing-office-web-add-ins-for-fun-and-limited-profit/
-
[ Popular Software ] Nagios XI 历史提权漏洞分析: https://medium.com/tenable-techblog/rooting-nagios-via-outdated-libraries-bb79427172
-
[ Popular Software ] 如何通过 QL 在 Ghostscript 中寻找类型混淆漏洞: https://lgtm.com/blog/ghostscript_typeconfusion
-
[ ReverseEngineering ] 逆向基于 Philips TriMedia CPU 架构的 IP 摄像机 - Part 1: https://blog.quarkslab.com/reverse-engineering-a-philips-trimedia-cpu-based-ip-camera-part-1.html
-
[ Tools ] 通过 hex-rays microcode IDA 插件在反汇编中去除编译器优化: https://www.msreverseengineering.com/blog/2019/1/22/removing-an-annoying-compiler-optimization-with-a-hex-rays-microcode-plugin
-
[ Tools ] 静态二进制代码分析工具 BinCAT 1.1 发布,支持 AMD64: https://github.com/airbus-seclab/bincat/releases/tag/v1.1
-
[ Tools ] WinAFL 增加了基础 Intel PT 跟踪模式: https://github.com/googleprojectzero/winafl/blob/master/readme_pt.md
-
[ Vulnerability ] apt/apt-get 远程命令执行漏洞披露(CVE-2019-3462): https://justi.cz/security/2019/01/22/apt-rce.html
-
[ Vulnerability ] MySQL 客户端允许 MySQL 服务器请求任何本地文件,可导致客户端被入侵: https://gwillem.gitlab.io/2019/01/20/sites-hacked-via-mysql-protocal-flaw/
-
[ Windows ] 近期 Windows 上被公开的三个 0day 漏洞分析: https://blog.0patch.com/2019/01/one-two-three-micropatches-for-three.html
-
[ Pentest ] 使用 AndrewSpecial 绕过 EDR 防御转储 lsass.exe 内存: https://astr0baby.wordpress.com/2019/01/21/andrewspecial-stealthy-lsass-exe-memory-dumping/
-
[ Symbolic Execution ] Symbolic Implementation of the Best Transformer (Paper): https://www.cs.cornell.edu/courses/cs711/2005fa/papers/rsy-vmcai04.pdf