腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ APT ] APT IOCs 收集整理: https://github.com/sapphirex00/Threat-Hunting
-
[ Challenges ] Drupalgeddon 2 POP 攻击链解析: https://blog.ripstech.com/2019/complex-drupal-pop-chain/
-
[ Exploit ] TurboFan String.lastIndexOf JSCall 节点输入错误漏洞的利用: https://github.com/JeremyFetiveau/TurboFan-exploit-for-issue-762874
-
[ Fuzzing ] Structure-Aware - 通过 libFuzzer 进行结构感知的 fuzz : https://github.com/google/fuzzer-test-suite/blob/master/tutorial/structure-aware-fuzzing.md
-
[ Hardware ] 深入解析阿波罗引导电脑(AGC)的磁芯内存: http://www.righto.com/2019/01/inside-apollo-guidance-computers-core.html
-
[ Hardware ] FPGA 的编程介绍- LED Blinker with Mojo v3: https://blog.k3170makan.com/2019/01/fpgas-introduction-to-fpgas-led-blinker.html
-
[ Industry News ] Nintendo Switch 的新版本固件在4小时内被攻破: https://www.hackread.com/new-firmware-version-of-nintendo-switch-hacked/
-
[ iOS ] voucher_swap : iOS 12 中 CVE-2019-6225 漏洞的发现与利用,来自 Project Zero: https://googleprojectzero.blogspot.com/2019/01/voucherswap-exploiting-mig-reference.html
-
[ iOS ] iOS/macOS: if_ports_used_update_wakeuuid() 中的16字节未初始化内核栈泄漏(CVE-2019-6209): https://bugs.chromium.org/p/project-zero/issues/detail?id=1714
-
[ Pentest ] 滥用 Kerberos S4U2Self 实现在活动目录中的持久化控制: https://alsid.com/company/news/abusing-s4u2self-another-sneaky-active-directory-persistence
-
[ Programming ] ES2019 中新的 JavaScript 特性: https://twitter.com/mathias/status/1090380500739506176
-
-
[ Tools ] Sn0int - 半自动 OSINT 框架和包管理器: https://github.com/kpcyrd/sn0int
-
[ Vulnerability ] systemd-journald 的两个漏洞介绍(CVE-2018-16865、CVE-2018-16866)及利用方法, Part 1: https://capsule8.com/blog/exploiting-systemd-journald-part-1/
-
[ Vulnerability ] Cisco Talos 披露 coTURN 中存在的三个漏洞(CVE-2018-4056、CVE-2018-4058、CVE-2018-4059) : https://blog.talosintelligence.com/2019/01/vulnerability-spotlight-multiple.html
-
[ Vulnerability ] DuckDuckGo XXE 漏洞详情披露: https://hackerone.com/reports/483774
-
[ Vulnerability ] 基于资源约束委派的 MSSQL RCE POC: https://gist.github.com/3xocyte/0dc0bd4cb48cc7b4075bdc90a1ccc7d3
-
[ Windows ] Windows 权限滥用:审计、检测与防御: https://medium.com/palantir/windows-privilege-abuse-auditing-detection-and-defense-3078a403d74e
-
[ ReverseEngineering ] .NET 函数反汇编及分析 : https://wojciechnagorski.com/2019/01/generates-disassembly-of-.net-functions/
-
-
[ Tools ] Windows 应用程序白名单工具 AaronLocker 搬到了 GitHub: https://blogs.msdn.microsoft.com/aaron_margosis/2019/01/28/aaronlocker-moved-to-github/
-