腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Android ] First Preview of Android N : http://android-developers.blogspot.in/2016/03/first-preview-of-android-n-developer.html
"Android N 开发者预览版的 API 和相关工具: https://t.co/TqWCxDELeu"
-
[ Android ] Paper "Building a Hybrid Experimental Platform for Mobile Botnet Research" Malatras & Beslay #Botconf 2015 #CybIN https://www.botconf.eu/2015/building-a-hybrid-experimental-platform-for-mobile-botnet-research/
" 搭建一个混合实验平台,研究手机 Botnet, 来自 2015 年的 Botconf 会议: https://t.co/UVTry7Pk9Q"
-
[ Android ] Fix for CVE-2016-0815 Android stagefright RCE https://android.googlesource.com/platform/frameworks/av/+/5403587a74aee2fb57076528c3927851531c8afb%5E%21/#F0 Looks exactly same bug as "DRMfright" Oct/2015 https://github.com/programa-stic/security-advisories/tree/master/Android/Stagefright/CVE-2015-3873
"Android CVE-2016-0815 stagefright RCE 漏洞的 Patch: https://t.co/XhyT0H1bdO 看起来和 2015 年 10 月的 "DRMfright" 像是同一个: https://t.co/5Bdcy6B4CI"
-
[ Android ] Patch for Android's CVE-2016-1621 bug. Remote Code Exec in mediaserver, looks like int sign issue parsing .MKV files https://android.googlesource.com/platform/external/libvpx/+/04839626ed859623901ebd3a5fd483982186b59d%5E%21/#F0
"Android CVE-2016-1621 漏洞的 Patch, 看起来像是 .MKV 文件解析时的整型符号处理问题: https://t.co/R1GSM5AKmu"
-
[ Android ] Android fixes obvious MediaTek wifi kernel driver buffer overflow while leaving four identical overflows in the code.
"Android 修复了一个很明显的 MediaTek WiFi 内核驱动的缓冲区溢出漏洞, 但代码里还有 4 个一样的漏洞"
-
[ Attack ] Shifting Tactics: Tracking changes in years-long espionage campaign against Tibetans https://citizenlab.org/2016/03/shifting-tactics/ #malware #china #APT
"策略转移 - 一个针对西.藏的长达多年的网络间谍行动, 来自 CitizenLab: https://t.co/XnuhVAY1wR "
-
[ Attack ] Discover the state of the threat landscape with our Latest Intelligence for February 2016 http://symc.ly/221SGmx https://t.co/Yo33aFo1vU
"Symantec 的月度威胁情报报告(二月份): https://t.co/eqKd9cmnoc https://t.co/Yo33aFo1vU"
-
[ Attack ] Massive Volume of Ransomware Downloaders being Spammed https://www.trustwave.com/Resources/SpiderLabs-Blog/Massive-Volume-of-Ransomware-Downloaders-being-Spammed
"TrustWave 发现最近以 JavaScript 附件作为勒索软件下载器的攻击数量猛增: https://t.co/ezLfhVgq4I "
-
[ Attack ] Chinese ISP's traffic injection based ads platform was abused for Trojan's drive-by downloading: http://drops.wooyun.org/papers/13595
"国内基于运营商流量注入的广告平台被木马滥用, 来自乌云 Drops 的文章: 网络暗黑世界的“域影”攻击:运营商劫持LOL等客户端海量级挂马︰ https://t.co/h1loXuOflw"
-
[ Attack ] New post: Exploit Kits in 2015: Flash Bugs, Compromised Sites, Malvertising Dominate http://bit.ly/1YB2ZMd @ TrendMicro
"威胁不会停止, Exploit Kits 也不例外。 Trend Micro 这篇 Blog 总结 Exploit Kit 在 2015 年发生的新变化,包括所用的 Flash 漏洞和攻击的网站: https://t.co/W4jbKw3uNK "
-
[ Attack ] Lessons from Operation RussianDoll http://www.fireeye.com/blog/threat-research/2016/03/lessons-from-operation-russian-doll.html
"俄罗斯套娃(RussianDoll)攻击行动中学到的经验, 来自 FireEye Blog: https://t.co/RexrzrYtI4 "
-
[ Cloud ] New blog post: Cloud Security & Trust https://www.insinuator.net/2016/03/cloud-security-trust/
"Insinuator 在 云安全、合规、信任 会议上的演讲 <云安全与信任>: https://t.co/29Ur4wVGM6"
-
[ Debug ] pykd 0.3.0.38 Released! http://pykd.codeplex.com/releases/view/620279 many changes, recommended for upgrade
"Windbg 的调试扩展 pykd 发布 0.3.0.38 版本: https://t.co/vCD2zDL6Gd "
-
[ Detect ] Hypro - VMI on BitVisor to detect hidden rootkits. http://ow.ly/ZgVNB
"Hypro - 基于 BitVisor 的 VMI 检测 Rootkits, BitVisor 是个轻量级的 Hypervisor, Github Repo: https://t.co/8kaBJOMTDH"
-
[ Detect ] Counting the Frequency of Indirect Branches to Detect Return-Oriented Programming Attacks http://www.lbd.dcc.ufmg.br/colecoes/dsn/2015/020.pdf
"通过统计间接跳转的频率, 检测 ROP 攻击, Paper: https://t.co/PADr50J2uf"
-
[ Forensics ] Forensic Challenges : http://www.amanhardikar.com/mindmaps/ForensicChallenges.html
"取证分析挑战题资料收集(脑图)︰ https://t.co/oB02WGF4Ag"
-
[ Fuzzing ] bNumEndpoints==0 in USB config descriptor…same bug described ~2 years ago,disregarded by MS http://blog.quarkslab.com/usb-fuzzing-basics-from-fuzzing-to-bug-reporting.html https://twitter.com/NCCGroupInfosec/status/707859018690199552
"USB 配置描述符中的 bNumEndpoints==0 - 两年前的同一个 Bug 微软没在意. 来自 QuarksLab 2014 年的一篇 Blog: USB Fuzzing 基础: https://t.co/HSBrK8heJh "
-
[ iOS ] IORegistryIterator竞争条件漏洞分析与利用 - http://nirvan.360.cn/blog/?p=1005 by 360's Nirvan Team
"IORegistryIterator 竞争条件漏洞分析与利用, 来自 360 Nirvan Blog: https://t.co/xCIR0lR8Au "
-
[ iOS ] New blog post: Exploring the Physical Address Space on iOS http://embeddedideation.com/2016/03/10/exploring-the-physical-address-space-on-ios/
"探索 iOS 的物理地址空间 - 在早期的 iOS 版本中, 保护设施还不强, 有很多方法可以 Dump 固件,Boot ROM 的漏洞也可以用于在设备启动早期接管控制权.但慢慢地一个个漏洞都被修复了.方法也就少了,但仍然有一些内核或架构的功能可以允许我们探索底层信息, Blog: https://t.co/rKoEou4xZy "
-
[ IoTDevice ] Simple reverse engineering of Corsair USB mouse LED control protocol http://boredhackerblog.blogspot.com/2016/03/reversing-corsair-sabre-led-control-and.html
"海盗船 USB 鼠标 LED 控制协议简单逆向: https://t.co/Arml7yTFCi"
-
[ Malware ] The three heads of the Cerberus-like Cerber ransomware https://blogs.technet.microsoft.com/mmpc/2016/03/09/the-three-heads-of-the-cerberus-like-cerber-ransomware/
"微软 TechNet Blog 对 Cerberus 勒索软件家族的分析: https://t.co/bCRcDL1to7 "
-
[ Malware ] “SORRY.i_have_to_do_this” - RC4 encrypted message left by #PlugX #APT coder https://securelist.com/blog/virus-watch/74150/plugx-malware-a-good-hacker-is-an-apologetic-hacker/ #China https://t.co/IIUt0mNlEy
"一个好黑客一定是谦卑的, Kaspersky 最近捕获的样本中, 在 RC4 加密中有一段字符串 "Sorry.i_have_to_do_this", Blog: https://t.co/QD6Hdtk1tF #China https://t.co/IIUt0mNlEy"
-
[ Others ] New blog post: Docker, DevOps & Security https://www.insinuator.net/2016/03/docker-devops-security/
"Docker, DevOps 与安全: https://t.co/LdLwONkjBf"
-
[ Others ] I fuzzed the SPIR-V parser & NVIDIA compiler & found out Vulkan eruption is easy to trigger. http://allsoftwaresucks.blogspot.ru/2016/03/fuzzing-vulkans-how-do-they-work.html https://t.co/biZzqd3klH
"用 AFL Fuzz 高性能图形接口 Vulkans, Blog: https://t.co/87ILvkLI0g https://t.co/biZzqd3klH"
-
[ Pentest ] DET : Data Exfiltration Toolkit : https://github.com/sensepost/DET
"DET︰ 数据渗透(盗取)工具包, 来自南非 SensePost 公司的 Github Repo ︰ https://t.co/x0ERsvJ8fI"
-
[ Popular Software ] . @ Adobe #Flash Player Update Patches 18 Remote Code Execution Flaws: https://threatpost.com/flash-player-update-patches-18-remote-code-execution-flaws/116707/ via @ threatpost
"Adobe Flash 发布 3 月份的补丁更新公告, 本次修复 18 个远程代码执行漏洞, 来自 ThreatPost 的报道: https://t.co/aRobNAUtfe 官方公告: https://helpx.adobe.com/security/products/flash-player/apsb16-08.html "
-
[ Popular Software ] [SE-2012-01] Broken security fix in Oracle Java SE 7/8/9 http://seclists.org/fulldisclosure/2016/Mar/31
"Broken security fix in Oracle Java SE 7/8/9, 来自 FullDisclosure 的公告: https://t.co/EJx1Ya87u5 这份公告中有一个演讲链接, JavaLand 2016 会议 Adam Gowdiak 谈 Java 的安全问题: http://www.security-explorations.com/materials/se-javaland.pdf "
-
[ ReverseEngineering ] Codemap is a binary analysis tool for "run-trace visualization" provided as IDA plugin. https://github.com/c0demap/codemap
"Codemap - 二进制 Trace 可视化分析工具,现在是以 IDA 插件形式提供, Github Repo: https://t.co/3Kmrd8VTSZ 官方网站: http://codemap.kr/ "
-
[ SecurityProduct ] #DragonPunch Comodo AV & Dragon Browser Local Privilege Elevation #Exploit #asciiart #greetz #sploitlikeits1999 http://pastebin.com/meQvnLRU
"Comodo 反病毒软件 & Dragon 浏览器本地提取 Exploit, 来自 Pastebin: https://t.co/pf7fSpJlAg"
-
[ SecurityProduct ] Working on an unusual exploit for Comodo Antivirus, just *scanning* a file can exfiltrate keystrokes. #wtf https://t.co/NKmPGh2DMW
"正在研究 Comodo 反病毒软件的一个不常见的 Exploit, 仅通过扫描文件就可以盗取键盘击键信息: https://t.co/NKmPGh2DMW"
-
[ ThreatIntelligence ] Part 2 of @ pdxbek's threat intel foundations blog series is now live — Threat Intelligence: Crawl, Walk, Analyze — https://community.rapid7.com/community/infosec/blog/2016/03/10/threat-intelligence-foundations-crawl-walk-analyze-part-2
"Rapid7 威胁情报系列文章第二篇: https://t.co/mQ0Thih2a2"
-
[ Tools ] A patch for IDA for OSX serves executable code over HTTP >< ... SHA1 is submitted over the same insecure channel http://www.hexblog.com/?p=1016
"OS X 版本 IDA 6.9 的 Qt 组件偶尔会 Crash,官方已经修复了这个 Bug,现提供 Patch 下载: https://t.co/8Dd4d2Wd7v"
-
[ Tools ] toolsmith #114: WireEdit and Packet Manipulation http://holisticinfosec.blogspot.com/2016/03/toolsmith-114-wireedit-and-packet.html
"WireEdit - 网络数据包操作工具: https://t.co/m5t7jtKueR"
-
[ Tools ] Introducing Pencil: A Microframework Inspired By Flask For Rust https://fengsp.github.io/blog/2016/3/introducing-pencil/
"Pencil - 受 Flask 启发,写的一个微型 Web 应用框架: https://t.co/1dhVkPOLmJ"
-
[ Tools ] This is super cool: highlight, copy, and translate text from any image. https://projectnaptha.com/
"Naptha 项目 - 从任何图片中高亮、复制和翻译文本: https://t.co/s3Fz3ECb7b"
-
[ Windows ] Nice piece by @ _mhastings_ on DLL Search Order Hijacks and detection via Tanium: https://blog.tanium.com/dont-hijack-me-bro-searching-for-dll-load-order-attacks-with-tanium/
"DLL 搜索顺序劫持攻击及其检测, 来自 Tanium Blog: https://t.co/wkc7vyUMoQ"
-
[ Windows ] NCC Group Advisory: Win 10 USB Mass Storage driver arb code execution in kernel mode - https://www.nccgroup.trust/uk/our-research/windows-10-usb-mass-storage-driver-arbitrary-code-execution-in-kernel-mode/ by Andy Davis - CVE-2016-0133
"Windows 10 USB 大存储设备驱动任意代码执行漏洞(CVE-2016-0133)公告,这个漏洞是由 NCC Group 的研究员发现的,现在 NCC Group 发了一个公告描述这个漏洞: https://t.co/PmfRRbFED9 另外除了这个 USB 驱动的公告, NCC Group 还发了一个 Office 内存破坏漏洞(MS16-029/CVE-2016-0021)的公告: https://www.nccgroup.trust/uk/our-research/microsoft-office-memory-corruption-vulnerability/ "