
腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Android ] CVE-2016-0728 vs Android : https://www.mulliner.org/blog/blosxom.cgi/security/CVE-2016-0728_vs_android.html cc: @ collinrm
"Linux 内核提权漏洞 CVE-2016-0728 对 Android 用户的影响: https://t.co/Jqnccm8ier "
-
[ Browser ] IE7-11 new XSS vector no interaction <div onactivate=alert('Xss') id=xss style=overflow:scroll> demo: http://codepen.io/anon/pen/adRQqM#xss #xss in URL
"IE7-11 新的 XSS 向量: https://t.co/5e2n4VdEkt "
-
[ Exploit ] Protecting Windows Networks – EMET : http://dfir-blog.com/2016/02/06/protecting-windows-networks-emet/
"启用 EMET,防护 Windows Exploits, 来自 DFIR Blog: https://t.co/ccdGzJCYbG"
-
[ Hardware ] Hacking fixed key remotes with (only) RFCat : http://andrewmohawk.com/2015/08/31/hacking-fixed-key-remotes-with-only-rfcat/
"只用 RFCat Hacking 固定密钥, 来自 AndrewNohawk Blog: https://t.co/YN5YC0MDyr"
-
[ Hardware ] Bypassing Rolling Code Systems http://andrewmohawk.com/2016/02/05/bypassing-rolling-code-systems/
"绕过汽车的滚动码系统, 来自 AndrewNohawk Blog: https://t.co/b8kkbB32TH"
-
[ Linux ] #MalwareMustDie #BLOG: MMD-0052-2016 - SkidDDOS #ELF infection Jan-Feb 2016 http://blog.malwaremustdie.org/2016/02/mmd-0052-2016-skidddos-elf-distribution.html Tks 4GREATdata! https://t.co/94Psf3lDyB
"SkidDDoS 样本 2016 1-2 月份的感染情况, 来自 MalwareMustDie Blog: https://t.co/RlDQxqhV3d "
-
[ Popular Software ] Exploiting Deserialization in Perl v5.8 : http://www.agarri.fr/kom/archives/2016/02/06/deserialization_in_perl_v5_8/index.html
"Exploiting Perl 5.8 版本的反序列化问题, 来自 Agarri Blog: https://t.co/ZM313xvJrC"
-
[ ReverseEngineering ] Reverse engineering the ARM1 : http://www.righto.com/2015/12/reverse-engineering-arm1-ancestor-of.html, ARM1 processor's flags, reverse engineered : http://www.righto.com/2016/02/the-arm1-processors-flags-reverse.html
"逆向 ARM1 - iPhone 的始祖: https://t.co/PR70r0QrvJ 逆向ARM1 处理器标志位: https://t.co/o4wsuUvEC5"