腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Android ] File-encrypting #Android #ransomware strikes as adult applications http://b0n1.blogspot.com/2016/03/file-encoder-android-ransomware-adult-applications.html #malware https://t.co/UIfNVDYvea
"伪装成成人应用的 Android 文件加密勒索软件: https://t.co/4X7VxTZ6rc https://t.co/UIfNVDYvea"
-
[ Android ] Millions Of Android Devices Vulnerable To Stagefright https://packetstormsecurity.com/news/view/26435/Millions-Of-Android-Devices-Vulnerable-To-Stagefright.html
"数百万的 Android 设备受 Stagefright 漏洞的影响: https://t.co/7QRgPhx5hj"
-
[ Attack ] Suckfly: Revealing the secret life of your code signing certificates http://www.symantec.com/connect/ko/blogs/suckfly-revealing-secret-life-your-code-signing-certificates
"Suckfly - 一个中国的 APT 组织, 贪婪无比,盗取了大量的代码签名证书, 来自 Symantec Blog: https://t.co/MYEC1Uq8Qn "
-
[ Browser ] An incredibly long & boring analysis of an Edge use-after-free bug that's neither a security issue nor exploitable: http://blog.skylined.nl/20160316001.html
"SkyLined 的新 Blog: Edge 浏览器 CTreePosGap::PartitionPointers UAF 漏洞 ︰ https://t.co/Vt7uaJSHyG 由于 MemGC 保护的存在, 内存不会立即释放,也因为这个,微软没有认, 所以 SkyLined 认为他可以分享出来了, 这个问题目前还是未修复状态 "
-
[ Browser ] Bypassing SOP and shouting hello before you cross the pond http://labs.detectify.com/2016/03/17/bypassing-sop-and-shouting-hello-before-you-cross-the-pond/ #sopbypass #cve20153755 #poc
"Bypassing SOP & 过河之前先别喊: https://t.co/HpgJWvFGYs 这篇 Blog 提到,作者发现了一个 Firefox SOP Bypass 漏洞(CVE-2015-3755), 但后来发现自己的 Mac OS X 并不是最新版本, 升级后发现这个漏洞被修复了. 作者还提到, 这个漏洞去年被玄武实验室 xisigr 发现并报告给了 Safari (在 Safari 上只能欺骗 URL)"
-
[ Browser ] Bypassing NoScript Security Suite Using Cross-Site Scripting and MITM Attacks https://mazinahmed.net/uploads/Bypassing%20NoScript%20Security%20Suite%20Using%20Cross-Site%20Scripting%20and%20MITM%20Attacks.pdf
"通过跨站脚本和中间人攻击绕过 Firefox NoScript 扩展的保护, PDF: https://t.co/ZXaayL5zMq"
-
[ Browser ] Seek and Destroy Non-Secure References Using the moarTLS Analyzer https://textplain.wordpress.com/2016/03/17/seek-and-destroy-non-secure-references-using-the-moartls-analyzer/ https://t.co/zOfl34NKIH
"moarTLS - 作者写了一个 Chrome 浏览器扩展,用于发现 HTTPS 页面引用的非 HTTPS 资源: https://t.co/qHeY9QucEn https://t.co/zOfl34NKIH"
-
[ Defend ] McAfee Uses Web Beacons That Can Be Used To Track Users,Serve Advertising : https://duo.com/assets/pdf/bring-your-own-dilemma.pdf (pdf)
"BYOD 场景为企业带来了安全风险, 来自 DUO Security 的这篇报告探讨几个 OEM 厂商的笔记本为企业网带来的安全问题︰ https://t.co/OCQHKsK8rX "
-
[ Defend ] Guidance to avoiding vulnerabilities in programming languages http://www.open-std.org/jtc1/sc22/wg14/www/docs/n2018.pdf
" 这篇 Paper 谈如何从编程语言的角度避免漏洞, 类似安全编码指南: https://t.co/OkkYrLluPO "
-
[ Detect ] Wondering if adversaries are scanning and abusing TR-069, here is a TR-069 honeypot https://github.com/omererdem/honeything
" TR-069 协议蜜罐工具, TR-069 提供了对下一代网络中家庭网络设备进行管理配置的通用框架、消息规范、管理方法和数据模型. Github Repo: https://t.co/MWJxHJkhOy"
-
[ Fuzzing ] NextGen is a new Capstone-dependent genetic fuzzer for Unix file, syscall & network! https://github.com/2trill2spill/nextgen
"NextGen - 基于 Capstone 反汇编引擎的 Fuzzer, 该 Fuzzer 采用遗传算法, 支持对 Unix 文件、Syscall、网络的 Fuzz, Github Repo: https://t.co/qtHOHAFMSn"
-
[ Industry News ] [White Paper] If you don’t have cyber insurance, here’s why you should http://bddy.me/2571udi #infosec https://t.co/yTmjt2AkFr
"FireEye 关于网络安全保险发展趋势的报告,认为势在必行: https://t.co/ZbMbZRtYZh #infosec https://t.co/yTmjt2AkFr"
-
[ iOS ] Ha, has this Android Trojan paid any royalty fee to Apple for its app name and icon? http://blog.avlyun.com/2016/03/2849/maliciousappstore/ https://t.co/mQXKDkNEJU
"安天 AVL 联合猎豹首曝“多米诺”恶意应用市场 APP, 来自安天 Blog: https://t.co/MjdZvIb3Oy https://t.co/mQXKDkNEJU"
-
[ iOS ] code signing is a pain? just use https://github.com/kpwn/921csbypass!
"iOS 9.2.1 代码签名绕过 PoC: https://t.co/fNcIbyCidF !"
-
[ iOS ] Who’s Breaking into Your Garden : iOS and OS X Malware You May or May Not Know : https://github.com/secmobi/slides/blob/master/2016.AppleMalware_BsidesSF.pdf (pdf) cc: @ claud_xiao
"谁闯进了你的花园 - 你可能认识或不认识的 iOS 和 OS X 恶意软件, 来自 Claud Xiao 在 BsidesSF 会议的演讲︰ https://t.co/bsxZKUGZFX "
-
[ Mac OS X ] Presentation Update: Analysis and Correlation of Mac Logs http://www.mac4n6.com/blog/2016/3/17/cypwviye6np7113k5yghbt3ds8sz7l #DFIR #mac4n6
"Mac OS X 日志分析和关联, 来自作者在 CTIN 会议的演讲: https://t.co/FG8Uc7ic9r "
-
[ Malware ] Nemucod Adds Ransomware Routine | Fortinet Blog http://ow.ly/ZAxjl
"据 Fortinet 对新捕获的 Nemucod 样本分析发现,知名 JavaScript 恶意代码家族 Nemucod 最近新添加了下载 TeslaCrypt 勒索软件的功能: https://t.co/BKJ0U9dfps"
-
[ Others ] @ HackSysTeam We do, @ Zerodium acquires VM guest-to-host escapes (VMware, VirtualBox, etc) for $50,000. See: https://www.zerodium.com/program.html
" Zerodium 收购 Guest 虚拟机逃逸漏洞的价格是 5w 刀, 包括 VMware, VirtualBox,等 ︰ https://t.co/aiZv4h9vYt"
-
[ Others ] Microsoft adds new OneDrive Bounty Program at http://bit.ly/21y9Q9n. Submissions accepted at secure@ microsoft.com.
"OneDrive 也加到了微软的 Bug Bounty 计划中: https://t.co/uxMzOJJRPC "
-
[ Others ] PoC||GTFO 0x11 is now available on the EU mirror over SSL and #IPv6 freshly minted by @ travisgoodspeed at #TR16! https://www.alchemistowl.org/pocorgtfo/
"PoC||GTFO 杂志更新第 11 期: https://t.co/qD2iVPJ0x6"
-
[ Others ] #Pwn2Own 2016 Awards: Master of Pwn Tencent Security Team Sniper (KeenLab and PC Manager). https://t.co/bxgbfk3a60
"Pwn2Own 2016 比赛结束了, 腾讯安全狙击手团队(KeenLab 和电脑管家)获得了最终的 MASTER OF PWN 2016. 来自 ZDI 官方的报道: http://community.hpe.com/t5/Security-Research/Pwn2Own-2016-Day-two-crowning-the-Master-of-Pwn/ba-p/6842863#.VutvzialilM https://t.co/bxgbfk3a60"
-
[ Others ] Advanced Testing with Go by @ mitchellh https://speakerdeck.com/mitchellh/advanced-testing-with-go #golang
"基于 Go 语言的高级软件测试: https://t.co/qa19U2xom4 "
-
[ Others ] Cve-2016-0040 semi poc https://github.com/Rootkitsmm/cve-2016-0040/blob/master/poc.cc , local privilege escalating
"Windows 内核在处理 WMI 相关功能时存在本地提取漏洞(CVE-2016-0040), PoC: https://t.co/Po4T3uhLhE 作者 R00tkitSMM 还为这个漏洞写过一篇 Blog: http://ioctl.ir/index.php/2016/02/13/cve-2016-0040-story-of-uninitialized-pointer/ "
-
[ Others ] Complete Tour of PE and ELF: Part 2 http://resources.infosecinstitute.com/complete-tour-of-pe-and-elf-part-2/
"PE ELF 一次完整的旅行, 来自 InfoSec Blog, Part 2: https://t.co/I161rc8T2t Part 3: http://resources.infosecinstitute.com/complete-tour-of-pe-and-elf-part-3/#article Part 1: http://resources.infosecinstitute.com/complete-tour-of-pe-and-elf-part-1/#article "
-
[ Pentest ] I Have the Power(View) - PowerView & offensive Active Directory enumeration tool written in PowerShell: http://www.slideshare.net/harmj0y/i-have-the-powerview cc: @ harmj0y
"PowerView - 攻击性的 Active Directory 枚举工具, 用 PowerShell 编写。 来自 作者在 Troopers 的演讲: https://t.co/3UMm1ayf7K "
-
[ Pentest ] Abusing GPO Permissions http://www.harmj0y.net/blog/redteaming/abusing-gpo-permissions/
"滥用 GPO(组策略对象) 权限, Blog: https://t.co/DNA27crLYY"
-
[ Popular Software ] If you haven't already, patch your Ruby on Rails (CVE-2016-2098): https://groups.google.com/forum/#!msg/rubyonrails-security/ly-IH-fxr_Q/WLoOhcMZIAAJ ( exploit: /?id[inline]=<%25_ruby_code_%25> )
"赶紧升级你的 Ruby on Rails 吧, Ruby on Rails ActionPack (有可能)远程代码执行漏洞(CVE-2016-2098), 来自 Google Groups: https://t.co/fsdRAMv0wN "
-
[ Popular Software ] Adobe Flash op_pushwith Incorrect Jit Optimization https://packetstormsecurity.com/files/136264/GS20160317052509.tgz
"Adobe Flash 在检查 op_pushwith Opcode 控制流路径时不正确,导致抛出异常。利用这个漏洞可以实现代码执行(CVE-2014-0586): https://t.co/zzKFdEmP66"
-
[ Sandbox ] Sandboxing: Aid in Digital Forensic Research https://www.researchgate.net/profile/Asif_Iqbal40/publication/283349465_Sandboxing_Aid_in_Digital_Forensic_Research/links/56361c4f08ae75884114de70.pdf
"沙箱在数字取证领域的帮助: https://t.co/DwNa4JHIaB "
-
[ ThreatIntelligence ] Here’s the slides from my “Passive Intel Gathering and Analytics w/ Just-Metadata” talk at @ WEareTROOPERS #TR16 - http://www.slideshare.net/CTruncer/passive-intelligence-gathering-and-analytics-its-all-just-metadata
"被动地情报收集和分析 - 全是元数据, 来自 TROOPERS 会议: https://t.co/k0J3jsteym"
-
[ Tools ] SHIPS – Centralized Password Management for Linux & Windows. https://www.trustedsec.com/january-2015/introducing-ships-centralized-local-password-management-windows/
"SHIPS — Linux 和 Windows 集中式密码管理方案: https://t.co/OW70P6Qw9F"
-
[ Tools ] OpenSGX: An Open Platform for SGX Research https://github.com/sslab-gatech/opensgx http://ina.kaist.ac.kr/~dongsuh/paper/opensgx.pdf https://github.com/sslab-gatech/opensgx/blob/master/Opensgx_tutorial_v1.pdf https://t.co/0vVRHyIeHE
"用于研究 Intel SGX 的开放平台 - OpenSGX: https://t.co/7CNtSmPvdr https://t.co/MsikMePIrg https://t.co/cPP8vawT8P https://t.co/0vVRHyIeHE "
-
[ Tools ] New Security Tool: Enteletaor - Broker & MQ Injection tool http://goo.gl/fb/6wo2gx #FullDisclosure
"Enteletaor - 消息队列和 Broker 攻击工具,可以实现对 Redis, RabbitMQ 和 ZeroMQ 消息队列的攻击, 来自 FullDisclosure: https://t.co/GdAM9Iy7sj Github Repo: https://github.com/cr0hn/enteletaor "
-
[ Tools ] WinDBG Anti-RootKit Extension v1.5 released http://sww-it.ru/2015-02-15/1242#.VuXglsjs4Ig.twitter
"WinDbg Anti-RootKit 扩展 v1.5 版本: https://t.co/LiO9WWg8qI"
-
[ Virtualization ] Introducing SimpleVisor: an Intel x64 Windows-specific hypervisor with less than 10 lines of assembly. Learn more at http://ionescu007.github.io/SimpleVisor/
"SimpleVisor: Intel x64 Windows Hypervisor, 这个 Hypervisor 有两个目标: 只用最少量的汇编代码和最少量的 VMX(虚拟机扩展)相关的代码, Blog: https://t.co/76tVnTiJlH Github Repo: https://github.com/ionescu007/SimpleVisor "
-
[ Web Security ] WordPress Bulletproof Security Plugin Multiple Cross Site Scripting… http://goo.gl/fb/y0jPDI #FullDisclosure
"WordPress BulletProof 插件多个跨站漏洞, 来自 FullDisclosure: https://t.co/gJEdqwUf8T "