腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Firmware ] 使用 IDA 分析 ARM 固件的视频教程: https://twitter.com/LiveOverflow/status/1088857398415106048
-
[ Fuzzing ] 如何通过 IOCTL Fuzzing 发现内核漏洞: https://trapmine.com/blog/from-0-to-ring0day-sifirdan-ioctl-fuzzing-ve-kernel-zafiyet-kesfi/
-
[ macOS ] 针对 macOS/iOS CVE-2019-6231 漏洞的详细分析: https://www.fortinet.com/blog/threat-research/detailed-analysis-of-macos-ios-vulnerability-cve-2019-6231.html
-
[ Pentest ] 从打印机到 Parent 域控制器的攻击记录: http://niiconsulting.com/checkmate/2019/01/intrusion-testing-from-evil-printers-to-parent-domain-controllers/
-
[ Pentest ] 使用 SystemPropertiesAdvanced.exe 以及 DLL 劫持绕过 UAC: https://egre55.github.io/system-properties-uac-bypass/
-
[ ReverseEngineering ] 适用于 Windows crash 分析的符号服务器(AMD、NVIDIA、Intel、Microsoft、Chrome): https://twitter.com/i/web/status/1088913344378023936
-
[ Tools ] Xendbg 适用于 Xen Hypervisor 的调试器: https://www.nccgroup.trust/us/about-us/newsroom-and-events/blog/2019/january/xendbg-a-full-featured-debugger-for-the-xen-hypervisor/
-
[ Tools ] 隐写术相关工具和资源收集列表: https://0xrick.github.io/lists/stego/
-
[ Vulnerability ] Cisco RV320 的 Dump 配置和远程 RCE 的漏洞利用: https://github.com/0x27/CiscoRV320Dump