腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Defend ] 在 Linux 内核中是如何减少 C 语言所带来的危险(Video): https://www.youtube.com/watch?v=FY9SbqTO5GQ
-
[ MalwareAnalysis ] 如何反编译使用 AutoIT Obfuscation(.AU3) 混淆的恶意代码: https://0xffff0800.blogspot.com/2019/01/defeating-au3-obfusticated-malware.html
-
[ Tools ] tarnish - 针对 Chrome 扩展程序的静态分析工具: https://github.com/mandatoryprogrammer/tarnish
-
[ Virtualization ] 编写 Hyper-V “Bridge” Fuzzing - 第二部分 Hypercalls & MDLs : http://www.alex-ionescu.com/?p=471
-
[ Network ] 打造在 HTTP 代理环境下的反向 Socks 通道: https://labs.portcullis.co.uk/blog/reverse-port-forwarding-socks-proxy-via-http-proxy-part-1/
-
[ Pentest ] 滥用基于资源的约束委派攻击 Active Directory: https://shenaniganslabs.io/2019/01/28/Wagging-the-Dog.html
-
-
[ Tools ] Turbo Intruder - BurpSuite 高速 Intruder 攻击插件介绍: https://portswigger.net/blog/turbo-intruder-embracing-the-billion-request-attack
-
[ Vulnerability ] python-gnupg gnupg.GPG.encrypt 和 gnupg.GPG.decrypt 的输入验证错误(CVE-2019-6690) : https://blog.hackeriet.no/cve-2019-6690-python-gnupg-vulnerability/
-
[ Vulnerability ] 我是如何访问到运输公司 140000 名员工的个人数据的: https://medium.com/@thbcn/how-did-i-access-the-personal-data-of-140-000-employees-of-a-transport-company-ad2edb7b7dd8
-
[ Web Security ] JWT 中的签名安全问题研究: https://www.nccgroup.trust/uk/about-us/newsroom-and-events/blogs/2019/january/jwt-attack-walk-through/
-
[ Web Security ] 滥用 Flask secret key 生成 session cookie 绕过认证: https://blog.paradoxis.nl/defeating-flasks-session-management-65706ba9d3ce
-
[ Web Security ] 多个顶级公司可以通过滥用因素认证逻辑漏洞实现在不需要知道账户密码时进行登录(Google、Microsoft、Instagram、Cloudflare): https://medium.com/@lukeberner/how-i-abused-2fa-to-maintain-persistence-after-a-password-change-google-microsoft-instagram-7e3f455b71a1