腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Attack ] Uh-oh Lenovo. PC maker pushes out malicious Angler exploit kit https://www.grahamcluley.com/2016/03/lenovo-angler-exploit-kit/
"攻击者攻破联想网站 startpage.lenovo.com,网站用户将被重定向至 Angler Exploit Kit: https://t.co/BpMzYzIPQu"
-
[ Exploit ] ropasaurusrex : a primer on return-oriented programming : https://blog.skullsecurity.org/2013/ropasaurusrex-a-primer-on-return-oriented-programming#
"以 PlaidCTF 的一道赛题为例详细介绍 ROP ︰ https://t.co/q9XYjr8USp"
-
[ Hardware ] TSATool : 3D printed TSA keys in a pocketable "Swiss Army" style tool : http://tsatool.com/ cc: @ darksim905 https://t.co/AkJxxp21LL
"TSATool - 3D 打印的 TSA 钥匙, 能放进口袋里的 '瑞士军刀' 级工具 ︰ https://t.co/R9eYMXOT73 https://t.co/AkJxxp21LL"
-
[ iOS ] [Blog] Objective-C Instrumentation with Frida - https://rotlogix.com/2016/03/20/objective-c-instrumentation-with-frida/ /cc @ fridadotre
"基于 Frida 框架的 Objective-C 插桩方法: https://t.co/hct858JHsi "
-
[ Linux ] x86_64 related clock sources : Timers & time management in Linux kernel(Part 6) : https://github.com/0xAX/linux-insides/blob/master/Timers/timers-6.md cc: @ 0xAX //linux-inside cont'd
"Linux-Insides 系列文章: Linux 内核的定时器和时间管理 Part 6 - x86_64 相关的时钟源 : https://t.co/6WOxAhoXVy"
-
[ Network ] Analyzing HTTPS Encrypted Traffic to Identify User Operating System, Browser and Application http://arxiv.org/abs/1603.04865
"通过被动地分析 HTTPS 加密流量,识别用户的操作系统、 浏览器和应用程序,Paper: https://t.co/2M60XLSz2D "
-
[ Network ] New IETF draft: SMTP Strict Transport Security https://tools.ietf.org/html/draft-margolis-smtp-sts-00
"新的 IETF 草案 ︰ SMTP 强制传输安全: https://t.co/qwFH4uH3g3"
-
[ NetworkDevice ] FortiOS (Fortinet) - Open Redirect and Cross Site Scripting http://goo.gl/fb/wIeNu6 #FullDisclosure
"FortiOS (Fortinet) 系统开放跳转漏洞+跨站漏洞, 来自 FullDisclosure 的公告: https://t.co/JrbZIU3ZCe "
-
[ NetworkDevice ] Netgear DGNv2200 multiple vulnerabilities (Bezeq firmware) http://goo.gl/fb/cDjuFt #FullDisclosure
"Netgear DGNv2200 路由器存在多个漏洞 (Bezeq 固件): https://t.co/IBHzngAxDb "
-
[ Others ] Markov Chains Explained Visually : http://setosa.io/ev/markov-chains/
"形象地解释马尔科夫链 ︰ https://t.co/1MT8folWmd"
-
[ Pentest ] Chuckle - An Automated SMB Relay Script http://goo.gl/MhMVuX #Chuckle #Linux #MSFconsole https://t.co/6d7RQNZ1wx
"Chuckle - 自动化地 SMB Relay 攻击脚本: https://t.co/2WufXs4s6N Github Repo: https://github.com/nccgroup/chuckle "
-
[ Pentest ] Great Intro to SQLMAP for those beginners worth the read ~ by Holly Graceful https://www.gracefulsecurity.com/introduction-to-sqlmap/
"SQLmap 渗透工具使用方法介绍: https://t.co/UkxCGPege0"
-
[ Pentest ] Basic Networking PowerShell cmdlets cheatsheet to replace netsh, ipconfig, nslookup and more from @ thomasmaurer http://buff.ly/1PfRRgR
"用 PowerShell 脚本替代 netsh ipconfig nslookup 等一些小工具: https://t.co/qTqVJVSBPe"
-
[ Pentest ] What to do after successfully breaking into a system? http://pwnwiki.io/#!index.md @ mubix @ WebBreacher @ tekwizz123 @ jakx_ @ TheColonial @ Wireghoul
"PwnWiki.io 网站收集了很多渗透中使用的工具、策略和方法, 主要关注获取访问权限之后可以干什么: https://t.co/XxSd9x4APG "
-
[ Sandbox ] Had an awesome time at #TR16, thanks to everyone involved. For those asking here's my slide deck http://www.slideshare.net/JamesForshaw1/the-joy-of-sandbox-mitigations
" The Joy of Sandbox Mitigations, James Forshaw 在 TR16 会议上的演讲: https://t.co/YBestbXBh3"
-
[ SecurityProduct ] Vulnerable #cybersecurity products are old news. The Witty Worm spread by exploiting ISS firewall products 12yrs ago http://www.caida.org/research/security/witty/
"安全产品出现漏洞不算是新闻了, 12 年前(2014 年), 就曾有 Witty 蠕虫通过攻击 ISS 防火墙产品的漏洞实现大面积传播: https://t.co/wXSNq1I6Xa"
-
[ ThirdParty ] AsusTEK asio.sys unsafe operation http://goo.gl/fb/IagPJL #FullDisclosure
"Windows 本身的安全性一直在提高,但第三方厂商可不是, 这次看看华硕 ASIO 驱动, Blog: https://t.co/rMh5qklMTH "
-
[ Tools ] transfer.sh : Easy file sharing from the command line : https://transfer.sh/ https://t.co/GQLNTv0PdF
"transfer.sh ︰从命令行轻松实现文件共享 ︰ https://t.co/XHIbEfaYva https://t.co/GQLNTv0PdF"
-
[ Tools ] PFP - A Python Interpreter for 010 Templates: http://d0cs4vage.blogspot.fr/2015/08/pfp-python-interpreter-for-010-templates.html?m=1
"PFP - 010 Editor 模板的 Python 解释器 ︰ https://t.co/Q3iu3sfob2"
-
[ Tools ] Conpot is a low interactive server side Industrial Control Systems honeypot https://www.honeynet.org/node/1276
"Conpot - 一个低交互地服务端工控系统蜜罐, 来自 HoneyNet: https://t.co/S3sXeFxeUA"
-
[ Web Security ] i made a thing that helps people practice exploiting LFI, RFI and CMD injection vulns in web apps https://github.com/paralax/lfi-labs
"lfi-labs - 用于测试本地文件包含、远程文件包含、命令行注入的一些 Web PHP 代码: https://t.co/I5hGv6wATr"
-
[ Web Security ] XSS hijack browser HTTP request: https://github.com/jackmasa/captureXHR/
"通过 Hook XMLHttpRequest 劫持浏览器的 HTTP 请求, Github Repo︰ https://t.co/aFPx0jj62T"
-
[ Windows ] A novel persistent injection to Windows machines http://goo.gl/fb/J43Cpt #FullDisclosure
"通过滥用 'DOS Devices' 注册表键,实现将 DLL 永久性地注入每一个用户态进程, 来自 FullDisclosure 的公告: https://t.co/U0xKyBKKDB 技术分析: http://securitygodmode.blogspot.com/2016/03/devinji-novel-injection-method.html "
-
[ Windows ] The Anatomy and (In)Security of Microsoft SQL Server Transparent Data Encryption (TDE), or How to Break TDE : http://simonmcauliffe.com/technology/tde/
"微软 SQL Server 透明数据加密 (TDE)的安全缺陷分析,或者说,How to Break TDE, Blog: https://t.co/vJVVqQqlWQ"