腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Android ] Apktool v2.1.0 Released http://connortumbleson.com/2016/03/27/apktool-v2-1-0-released/
"Apktool v2.1.0 发布,详细的发布日志: https://t.co/TearGaEvGY"
-
[ Android ] Setting up the new @ kalilinux #Nethunter 3.0 on a OnePlusOne is so straight-forward. Thanks guys! @ _binkybear https://github.com/offensive-security/nethunter-LRT
"nethunter-LRT - nethunter Root 工具包,将 nethunter 安装到支持的设备上: https://t.co/FwVzf5qQzd"
-
[ Attack ] Btw, a year later @ bsdaemon provided a nice analysis of the initial vector at #TR12: https://www.troopers.de/media/filer_public/30/40/30403bef-bfbd-403d-9525-00272e67a22b/tr12_day01_branco_into_the_darkness.pdf [PDF]
"走进黑暗世界 - 剖析定向攻击, 来自 Troopers 会议演讲︰ https://t.co/bmKMHWYPlF "
-
[ Attack ] Worth a re-read: https://securelist.com/files/2015/02/Equation_group_questions_and_answers.pdf
"Kaspersky 2015 年 2 月发布的关于 Equation(方程式) 的问答形式的分析报告︰ https://t.co/qJS2CySP4J"
-
[ Attack ] #Medicaid management information systems are increasingly vulnerable http://bddy.me/1MMETYf #infosec https://t.co/eccfBOZ12l
"医疗管理信息系统正面临越来越多的漏洞威胁, 来自 FireEye Blog: https://t.co/nrIc4rCkhF https://t.co/eccfBOZ12l"
-
[ Debug ] "WinDbg the easy way" http://www.debuginfo.com/articles/easywindbg.html
" Windbg 直接上手有一些难度,那有没有简单的呢? 有, 它弟弟 - cdb: https://t.co/U0NH597aSI"
-
[ Fuzzing ] The Fuzzing Project (eh16) http://cdn.media.ccc.de/events/eh2016/h264-sd/eh16-75-eng-The_Fuzzing_Project_sd.mp4
"The Fuzzing Project, CCC 会议视频(MP4 下载): https://t.co/wpmlMfitXb"
-
[ Fuzzing ] I Can Haz Fuzz? Fuzzing OpenSSL for fun and profit: https://github.com/benlaurie/openssl/tree/fuzz/fuzz Send me patches!
"用 libfuzzer Fuzz OpenSSL︰ https://t.co/eqaiP2b70U "
-
[ Hardware ] Cyber-attack on cars over CAN protocol : http://dn5.ljuska.org/cyber-attacks-on-vehicles-2.html ,vircar : https://github.com/dn5/vircar cc: @ dn5__
"通过 CAN 协议攻击汽车 ︰ https://t.co/PT9UPRoQYC vircar 工具, vircar 可以虚拟一台汽车,模拟 CAN 网络: https://t.co/QEWdbkbDKZ "
-
[ Industry News ] Exploit derivatives: a way towards decentralized security rewards http://sirdarckcat.blogspot.com/2016/03/creating-decentralized-security-rewards.html
"构建一个去中心化的安全奖励市场: https://t.co/ZvGWs39Bq8"
-
[ IoTDevice ] 3DS Code Injection through “Loader” http://yifan.lu/2016/03/28/3ds-code-injection-through-loader/ https://t.co/qbXYb1MQ7L
"通过 'Loader' 实现任天堂 3DS 游戏机的代码注入: https://t.co/3NtZhEVuvN https://t.co/qbXYb1MQ7L"
-
[ Linux ] Improving Bash Forensics Capabilities http://ow.ly/3cU75z
"改进 Bash 的取证特性,Bash 本身会记录历史,通过重新编译,可以允许 Bash 将历史命令日志发送到远端 Syslog 服务器: https://t.co/EJkNFlYsDj"
-
[ Linux ] Here’s the xnu/amd64 syscall path. Few interesting things: must use syscall instr, four types of valid syscalls. https://gist.github.com/yrp604/23e86dce9ca12bf514ef
"amd64 平台 XNU 系统调用路径图: https://t.co/qw1ggJRNB8"
-
[ Malware ] POS Malware Tool ‘Treasurehunt’ Targets Small US-Based Banks, Retailers: https://threatpost.com/pos-malware-tool-treasurehunt-targets-small-us-based-banks-retailers/117014/ via @ threatpost
"'Treasurehunt' - 一款定制的 POS 机恶意软件,攻击目标为美国的小银行、 零售商, 来自 ThreatPost 的报道︰ https://t.co/TBPENujhTj 来自 FireEye 的分析: https://www.fireeye.com/blog/threat-research/2016/03/treasurehunt_a_cust.html "
-
[ Malware ] “道有道”的对抗之路 - http://blogs.360.cn/360mobile/2016/03/24/analysis_of_daoyoudao/
"“道有道”的对抗之路 - https://t.co/aRIBeyNaXd"
-
[ Malware ] McAfee Labs Unlocks LeChiffre Ransomware https://blogs.mcafee.com/mcafee-labs/mcafee-labs-unlocks-lechiffre-ransomware/
"McAfee Labs 最近收到一个 LeChiffre 勒索软件样本,经过分析,发现可以解密它加密后的文件: https://t.co/Rb8H34MOzD"
-
[ Mitigation ] My exploit for the Flash Isolated Heap http://googleprojectzero.blogspot.com/2016/03/life-after-isolated-heap.html
" Flash 隔离堆出现以后的生活, 来自 Project Zero Natalie Silvanovich: https://t.co/XgWNOn2vOB"
-
[ Others ] 影响所有Nexus手机的漏洞,浅析CVE-2015-1805 - https://translate.google.com/translate?sl=auto&tl=en&js=y&prev=_t&hl=en&ie=UTF-8&u=http%3A%2F%2Fbobao.360.cn%2Flearning%2Fdetail%2F2810.html&edit-text=&act=url https://github.com/panyu6325/CVE-2015-1805
"影响所有 Nexus 手机的漏洞,浅析 CVE-2015-1805: http://bobao.360.cn/learning/detail/2810.html Github Repo: https://t.co/OGzYCtnoUX"
-
[ Others ] How I Could Compromise 4% (Locked) Instagram Accounts https://www.arneswinnen.net/2016/03/how-i-could-compromise-4-locked-instagram-accounts/
"我是如何攻破 4% 的(临时锁定的) Instagram 账户的: https://t.co/ZtbPl8WI4Q"
-
[ Others ] .@ martingalloAR on SAP archive file formats https://www.troopers.de/media/filer_public/60/07/60072443-f818-44b9-8a61-0d51cba18a35/sapcartalk-slides.pdf https://t.co/JsnogEFEV2
"深入分析 SAP 归档文件格式, 来自 Troopers 会议演讲: https://t.co/cRg9X48yGG https://t.co/JsnogEFEV2"
-
[ Others ] FBI no longer needs Apple's help to crack encryption on terrorist's iPhone: https://threatpost.com/fbi-breaks-into-terrorists-encrypted-iphone/117043/
"FBI 表示他们不再需要苹果公司协助解锁恐怖分子的 iPhone 了, 他们自己搞定了: https://t.co/bBzOpUrtkR"
-
[ Pentest ] HP printer exploitation tool, hijetter.exe source code & library from Phenoelit http://www.phenoelit.org/hp/download.html
"惠普(HP)打印机漏洞利用工具, 来自 Phenoelit: https://t.co/ihJuSrdqYV"
-
[ Popular Software ] Adobe Flash PCRE Regex Complication Logic Issue https://packetstormsecurity.com/files/136456/GS20160328155434.tgz
"Adobe Flash PCRE 正则编译逻辑问题(CVE-2015-0318): https://t.co/pfcPGzIpEO Project Zero Issue 199: https://bugs.chromium.org/p/project-zero/issues/detail?id=199 "
-
[ Popular Software ] Patch me if you can : https://www.troopers.de/media/filer_public/6e/a1/6ea1f857-11b7-4823-b2a4-9de93213f0f6/troopers16_patch_me_if_you_can_final.pdf (Slides) cc: @ WEareTROOPERS
"Patch me if you can ,来自 Troopers 会议演讲, 主要介绍企业管理软件 SAP、SMP 系统的一些安全问题︰ https://t.co/SpnuN0R3e3 "
-
[ Programming ] Build web application with Golang : https://astaxie.gitbooks.io/build-web-application-with-golang/content/en/preface.html (Free html book)
"用 Golang 语言写 Web 应用程序,在线图书: https://t.co/gB8ITDbTpl "
-
[ Sandbox ] Detecting Wine via internal and legacy APIs http://www.hexacorn.com/blog/2016/03/27/detecting-wine-via-internal-and-legacy-apis/ #DFIR #malware
"利用一些 Internal API 或古老的 API 探测 Wine 执行环境: https://t.co/K3ga57iwP3 "
-
[ SecurityProduct ] Attacking Next Generation Firewalls - Breaking PAN-OS : https://www.troopers.de/media/filer_public/a5/4d/a54da07e-3780-4f83-b4ac-8c620666a60a/paloalto_troopers.pdf (Slides*) cc: @ WEareTROOPERS || @ _fel1x
"攻击 Palo Alto 下一代防火墙 - Breaking PAN-OS, 来自 Troopers 会议演讲, 作者为 Felix Wilhelm: https://t.co/QJmBmx0L0G "
-
[ ThirdParty ] [Bug Bounty] http://Uber.com 遠端代碼執行 - Remote Code Execution via Flask Jinja2 Template Injection http://blog.orange.tw/2016/03/bug-bounty-ubercom-ubercom-remote-code.html?m=1
"Uber.com Bug Bounty 计划之 Flask Jinja2 模板注入远程代码执行漏洞: https://t.co/4RsifuGz4Q"
-
[ ThirdParty ] Shopping cart app @ ZenCart patched a handful of XSS bugs this month - http://ow.ly/100Wv3
"开源电商系统 ZenCart 本月修复了多个 XSS 漏洞, 来自 ThreatPost 的报道: https://t.co/s6qy2HJ2nI"
-
[ Tools ] Retargetable Decompiler Online https://retdec.com/decompilation/
"可定制目标的在线反编译工具: https://t.co/4kdPhlpyEj"
-
[ Tools ] New version of Message Analyzer - Microsoft's own, not wellknown, network traffic logging tool: https://www.microsoft.com/en-us/download/details.aspx?id=44226
"Message Analyzer 发布 v1.4 版本, Message Analyzer 是个协议流量分析工具,也可以监控事件, 是微软官方的一个工具 ︰ https://t.co/u7djheX25W"
-
[ Tools ] How to Monitor Your External Network Using Shodan: http://buff.ly/1LLUfRR
"如何用 Shodan 命令行工具监控外网环境, 订阅告警提醒:: https://t.co/mR0aE2wvrD"
-
[ Tools ] Just released pysap v0.1.9 on GitHub https://github.com/CoreSecurity/pysap and PyPi https://pypi.python.org/pypi/pysap/!
"pysap - 用于构造 SAP 网络协议数据包的 Python 库: https://t.co/vUh4ELKPAf PyPi Package: https://t.co/dS8xPHpBBj "
-
[ Tools ] Microsoft.Diagnostics.Runtime Had some time with this over the weekend. Very cool stuff here. https://github.com/Microsoft/dotnetsamples/tree/master/Microsoft.Diagnostics.Runtime/CLRMD
"CLR MD - 用于构建诊断工具的 C# API: https://t.co/f0RoyR5lCi"
-
[ Tools ] Toward Full Elasticity in Distributed Static Analysis http://research.microsoft.com/pubs/258715/tr.pdf
"微软基于云的分布式静态分析框架,因为是在云上,CPU、内存、存储都有了很大的弹性。可以实现大规模的程序分析, Paper: https://t.co/AoFlQIPO47 "
-
[ Web Security ] Another full featured webshell with GIF header Sample on VT https://www.virustotal.com/en/file/34c929276d0376ba07bfaae1893c4a1211a50d2b766837dcc2fd292cd25b6284/analysis/ Source http://pastebin.com/FNruff4p https://t.co/LlYjZWCmNo
"一个全功能型的 WebShell 样本(带有 GIF 文件头), VirusTotal 的分析结果: https://t.co/OwBro6QB94 Pastebin 上的源码: https://t.co/ZzSHfOicSH https://t.co/LlYjZWCmNo"
-
[ Windows ] Some Windows Kernel Object Type from XP to 10 https://onedrive.live.com/redir?resid=A352EBC5934F0254%213231 https://t.co/Xcjq8mT3qi
"从 Win XP 到 Win 10, Windows 内核的一些对象类型: https://t.co/j7RbFHIU7d https://t.co/Xcjq8mT3qi"
-
[ Windows ] Wrote up a post about tracking differences in a process heap manually and with Intel's Pin. http://www.codereversing.com/blog/archives/286 Happy holidays
"HeapDiff - 进程堆变化跟踪、比较工具,作者利用两种方法实现,一种是入侵性的,通过枚举和拷贝一个单独进程的堆结构实现。另一种是入侵性的,通过 Intel Pin 插桩工具实现: https://t.co/M6W3X6B2Mj "
-
[ Windows ] TempRacer – Windows Privilege Escalation Tool http://www.darknet.org.uk/2016/03/tempracer-windows-privilege-escalation-tool/
"TempRacer - C# 语言写的 Windows 提权工具: https://t.co/AXoXx2kmK9"