腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Android ] Hack a mobile phone’s fingerprint sensor in 15 minutes https://www.helpnetsecurity.com/2016/03/07/hack-a-mobile-phones-fingerprint-sensor-in-15-minutes/
"15 分钟内黑掉手机的指纹传感器 - 利用 2D 打印的指纹破解手机指纹锁, 国外 HelpNetSecurity 的报道: https://t.co/ZCBNslsGFX Paper: http://www.cse.msu.edu/rgroups/biometrics/Publications/Fingerprint/CaoJain_HackingMobilePhonesUsing2DPrintedFingerprint_MSU-CSE-16-2.pdf 国内 Freebuf 的报道: http://www.freebuf.com/news/97981.html "
-
[ Android ] Latest Android Nexus security bulletin out; more Mediaserver trouble. https://threatpost.com/google-fixes-critical-android-mediaserver-bugs-again/116614/ via @ threatpost
"Android 2016 年 3 月份的漏洞公告, 其中包括 6 个严重漏洞, 8 个高危漏洞, 来自 ThreatPost 的报道: https://t.co/DVsybuDChv Android 官方公告: https://source.android.com/security/bulletin/2016-03-01.html "
-
[ Android ] Inspeckage - Android Package Inspector http://blog.tempest.com.br/antonio-martins/inspeckage-android-package-inspector.html
"Inspeckage - Android 动态分析工具,监控 Android 应用运行时的行为: https://t.co/Nfzk63zESr"
-
[ Attack ] Operation Transparent Tribe - APT Targeting Indian Diplomatic & Military Interests: http://buff.ly/1L6E1SX #InfoSec https://t.co/Zlgfqdx1Ti
"透明部落 APT 攻击行动 - 针对印度外交及军事目标, 来自 ProofPoint 的报告: https://t.co/lma58nnMRk https://t.co/Zlgfqdx1Ti"
-
[ Detect ] The Underhanded #PowerShell Contest just launched! Be evil and help move malicious PS detection forward! https://blogs.msdn.microsoft.com/powershell/2016/03/07/announcing-the-underhanded-powershell-contest/
"微软发起了一个称作 'Underhanded PowerShell' 的比赛, 用于帮助 PowerShell 脚本分析工具检测那些鬼鬼祟祟的代码: https://t.co/3hZNewmz5b"
-
[ Firmware ] Reverse Engineering Samsung S6 Modem http://arm.ninja/2016/03/04/reverse-engineering-samsung-s6-modem/, by @ theqlabs https://t.co/47GNXmGZzV
"逆向 Samsung S6 Modem, Blog: https://t.co/ONPluZ7Owj https://t.co/47GNXmGZzV"
-
[ Hardware ] Coping a 3D Model by recording the sounds of a 3D Printer with a smartphone http://securityaffairs.co/wordpress/45114/hacking/coping-3d-models-3d-printer-smartphone.html
"加州大学欧文学院的研究员表示,通过用智能手机记录 3D 打印机的声音, 可以还原 3D 打印的原始模型, 来自 SecurityAffairs 的报道: https://t.co/PvO8MhLnjE "
-
[ Hardware ] Hacking industrial vehicles openly exposed on the internet (TGU) http://jcarlosnorte.com/security/2016/03/06/hacking-tachographs-from-the-internets.html
"从互联网上 Hacking 开放 TGU 的工业车辆, Blog: https://t.co/YnhClPHajC"
-
[ Hardware ] Looking for our car hacking tools / data / scripts? http://illmatics.com/content.zip
"Chris 和 Charlie 的 Car Hacking 工具/Slides/脚本, 压缩包下载: https://t.co/mGK9Gn3uNU"
-
[ Hardware ] we just released our formerly-customers-only manuals for #Osmocom #OpenBSC and related projects publicly under GFDL: https://www.sysmocom.de/news/sysmocom-publicly-releases-osmocom-user-manuals/
"德国 Sysmocom 公司开放了 Osmocom 项目的大量文档, Osmocom 项目的全称是开源移动通信, 主要是蜂窝网络方面的开源实现, 但之前这方面的文档很少: https://t.co/tfn2NFzHb3"
-
[ iOS ] Apple iOS v9.2.1 - Multiple PassCode Bypass Vulnerabilities (App Store Link… http://goo.gl/fb/fffJzT #FullDisclosure
"Apple iOS v9.2.1 多个密码绕过漏洞, 来自 FullDisclosure 的公告: https://t.co/vSnjHcAH4u "
-
[ Linux ] Hella useful syscall table: http://syscalls.kernelgrok.com/
"Linux 内核系统调用表(除了系统调用号,还包括各寄存器参数信息、对应代码文件行数): https://t.co/8ikGzmLJ4k"
-
[ Linux ] Let's code a TCP/IP stack (Part 1) : Ethernet & ARP : http://www.saminiir.com/lets-code-tcp-ip-stack-1-ethernet-arp
"自己写一个微型 TCP/IP 协议栈 Part 1: 以太网与 ARP, Blog: https://t.co/hWmTyvFfaD"
-
[ Others ] Well then. SQL Server, coming to Linux :) https://blogs.microsoft.com/blog/2016/03/07/announcing-sql-server-on-linux/ https://t.co/ox5WaMbOUz
"微软宣布推出 Linux 版本 SQL Server, 将于 2017 年年中发布: https://t.co/FKs0uqPAH6 https://t.co/ox5WaMbOUz"
-
[ Others ] FLIF - Free Lossless Image Format : http://flif.info/index.html
"FLIF - 一种无损图像格式(遵循 LGPL): https://t.co/tkdJRSyTXW"
-
[ Pentest ] [Blog] Maintaining Persistence via SQL Server – Part 1: Startup Stored Procedures http://bit.ly/21T0xpS
"渗透测试过程中,通过 SQL Server 维持对目标的持久化访问 - Part 1:存储过程。来自 NetSPI Blog: https://t.co/BievJG7cxs"
-
[ Programming ] How to Write a Video Player in Less Than 1000 Lines : http://dranger.com/ffmpeg/
"如何用不到 1000 行的代码写一个视频播放器: https://t.co/kRoCHzcXw3"
-
[ ReverseEngineering ] Reversing the Nintendo 64 Copy Protection Chip https://www.youtube.com/watch?v=HwEdqAb2l50
"逆向任天堂 64 的复制保护芯片(Youtube 视频, RECon 2015): https://t.co/YRJgS1pnmw"
-
[ ReverseEngineering ] FLOSS - uses static analysis techniques to automatically deobfuscate strings from malware bin. Based on vivisect https://github.com/fireeye/flare-floss
"Floss - 用静态分析技术自动化地反混淆恶意代码字符串的工具, 来自 FireEye Labs 的工具, Github Repo: https://t.co/pEPVEDK2xO"
-
[ ThirdParty ] (CVE-2016-1234) - glob: buffer overflow with GLOB_ALTDIRFUNC due to incorrect NAME_MAX limit assumption https://sourceware.org/bugzilla/show_bug.cgi?id=19779
"glibc 2.24 GLOB_ALTDIRFUN 不正确处理 NAME_MAX 造成缓冲区溢出(CVE-2016-1234): https://t.co/kGIInqdFWe "
-
[ Tools ] DIRB – Domain Brute-forcing Tool http://www.darknet.org.uk/2016/03/dirb-domain-brute-forcing-tool/
"DIRB - 域名爆破工具: https://t.co/w6x5gK4nEp"
-
[ Web Security ] Fiddler 4.6.2.2 ~ web debugging , browser, HTTP/S traffic recording, proxy, web session manipulation http://www.telerik.com/fiddler @ TelerikFiddler
"Fiddler 4.6.22 - 跨平台、跨浏览器的 Web 调试代理,支持性能测试、HTTP(s)流量抓取等功能: https://t.co/x86XTKjYii "
-
[ Windows ] To determine which security vendors have drivers installed. Filter Driver Allocated Altitudes: https://msdn.microsoft.com/en-us/library/windows/hardware/dn265170(v=vs.85).aspx Use fltmc.exe
"如何确定 Windows 安装了哪些安全厂商的驱动? 查看微软分配的 Altitudes 表: https://t.co/WMHhtTbYll "
-
[ Windows ] NCC Group Blog: Sysinternals SDelete: when secure delete fails - https://www.nccgroup.trust/uk/about-us/newsroom-and-events/blogs/2016/march/sysinternals-sdelete-when-secure-delete-fails/ by @ edeca
"NCC Group 发现了 Sysinternals 工具集中 SDelete 的一个 Bug, 在某些情况下可以使 SDelete 删除失败,但是却显示成功: https://t.co/gpyzTqIhN2"