腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Android ] New post: Critical ‘CVE-2015-1805’ Vulnerability Allows Permanent Rooting of Most Android Phones http://bit.ly/1pZnbME @ TrendMicro
" CVE-2015-1805 漏洞允许攻击者永久性地 Root Android 手机, 来自 TrendMicro 的分析: https://t.co/tGKoYyvG3j "
-
[ Attack ] New strains of server-side #ransomware, like #SamSam and #Maktub, are hitting hospitals - http://ow.ly/103t6y
"威胁预警: 新类型的服务端勒索软件正向医院袭来: https://t.co/Pb5KyO4QFl 来自 CheckPoint 的分析: http://blog.checkpoint.com/2016/03/28/check-point-threat-alert-samsam-and-maktub-ransomware-evolution/ "
-
[ Browser ] Hooking Firefox PR_Write with Frida https://wiremask.eu/articles/hooking-firefox-with-frida/
"用 Frida 动态插桩框架 Hook Firefox 浏览器,通过 Hook PR_Write 函数可以监控 Firefox 的写文件和网络传输操作(仅用 15 行代码): https://t.co/Pxl9OHh1G2 "
-
[ Browser ] My sensors privacy report. Cross-device, fingerprinting, info leaks, tracking http://lukaszolejnik.com/SensorsPrivacyReport.pdf for Sensors API under work at @ w3c
"浏览器中有很多传感器相关的设备 API,这篇 Paper 分析这些 API 有可能带来的隐私泄露问题 : https://t.co/OjYECAjroI"
-
[ Defend ] Defending against persistent attackers: What we’ve learned http://blogs.microsoft.com/cybertrust/2016/03/28/defending-against-persistent-attackers-what-weve-learned/
"在与持续攻击者的对抗中我们学到了什么, 来自微软 Blog: https://t.co/HLBkHDvsjD"
-
[ Firmware ] UEFITool NE A23 released with VSS NVRAM support. Please test it on your UEFI firmware, new GH issues appreciated. https://github.com/LongSoft/UEFITool/releases/tag/NE.A23
"UEFITool - UEFI 固件查看器和编辑器, NE Alpha23 版本发布, 支持 NVAR、VSS 格式解析, 基于 Qt5.6 构建: https://t.co/UDzt1ep8bQ"
-
[ Hardware ] More engineering can be found here : http://hackaday.com/2016/02/18/guardbunny-active-rfid-protection-going-open-hardware/ :) /cc @ KristinPaget
"RFID 防护设备 GuardBunny 开源了, HackADay 的文章 ︰ https://t.co/TUOq64eSuF Github Repo: https://github.com/kristinpaget/GuardBunny "
-
[ Hardware ] Yet Another Car Hacking Tool : http://asintsov.blogspot.in/2016/03/yet-another-car-hacking-tool.html ,Slides : http://www.slideshare.net/AlexeySintsov/testing-can-network-with-help-of-cantoolz , https://github.com/eik00d/CANToolz https://t.co/oSua0XewuQ
"推送过两次 CANToolz 这个 Car Hacking 工具了, 这次这篇 Blog 是 CANToolz 作者讲如何用这个工具 ︰ https://t.co/I2MDB7OLPt Slides︰ https://t.co/5e2oQ5lZ7O Github Repo: https://t.co/IeUgvQNdzO "
-
[ Hardware ] Oh my! Quad-core 64bit MIPS processors execute ARM and x86 instructions (HT: @ angealbertini) http://www.electronicsweekly.com/news/products/micros/quad-core-64bit-mips-processors-execute-arm-x86-instructions-2015-09/
"中国龙芯发布两款 4 核处理器,基于 MIPS 架构,通过二进制翻译,可以执行 ARM 和 x86 指令: https://t.co/PubdSz7sQh"
-
[ iOS ] so about that: http://deadhacker.com/2016/03/25/the-terrorists-phone/
"恐怖分子的手机 ︰ https://t.co/tVGWE7LGqv"
-
[ Linux ] Quickly Identify Suspicious Activity With Sysdig (Part 2) : https://sysdig.com/blog/fishing-for-hackers-part-2/ ,Part 1 : https://sysdig.com/blog/fishing-for-hackers/ cc: @ sysdig
"前天推送过《等黑客上钩 - 一次 Linux 服务器攻击案例分析》 : https://t.co/tSAtagUHyO 今天是 Part 2: 用 Sysdig 工具快速定位可疑的活动: https://t.co/O4Ph1qlGGP "
-
[ Malware ] CVE-2016-1001 has been added to Angler EK. http://malware.dontneedcoffee.com/2016/03/flash-up-to-2000306.html
"Angler EK 已经集成了 Flash CVE-2016-1001 漏洞: https://t.co/q7JYzsja7S"
-
[ Network ] How to Prepare for a DDoS Attack https://blog.radware.com/security/2016/03/how-to-prepare-for-a-ddos-attack/
"如何为一次 DDoS 攻击做防御准备, 来自 Radware Blog: https://t.co/6HlAqRKcKj"
-
[ Network ] Troopers 16: Wireshark in IP version 6 https://www.insinuator.net/2016/03/troopers-16-wireshark-in-ip-version-6/
"Wireshark 中的 IPv6, 来自 Troopers 2016 会议: https://t.co/qmNAWqJZzK 相关的 Slides: https://www.troopers.de/media/filer_public/9c/c5/9cc5e4e1-1f2c-4d0b-9f69-87059eb9e931/ernw_tr16_ipv6_secsummit_ipv6-in-wireshark_jcarrell.pdf "
-
[ Others ] When People Sleep: Determine Facebook Activity Using Google Chrome, Javascript and Python | Automating OSINT Blog http://bit.ly/1RKjAhh
"如何判断某个人一天中几点在 Facebook 上最活跃? 用 Chrome, JavaScript, Python 写个工具分析一下: https://t.co/nZVIuSRIqu"
-
[ Others ] My talk from @ enigmaconf is up: https://www.youtube.com/watch?v=-r-B1uOj0W4 It's a mixture of PPP history and some general advice on how to get started in CTFs
"组建一个有竞争力的黑客团队(Youtube 视频) ︰ https://t.co/HfHHdcZv26 "
-
[ Others ] A great explanation of handwriting recognition, 50 years ago http://jackschaedler.github.io/handwriting-recognition/ https://t.co/dbX5AiZrDA
"手写体识别技术: https://t.co/VUQH4yzPED https://t.co/dbX5AiZrDA"
-
[ Pentest ] Static Binaries for Pentesting Internal Networks - Precompiled for Ease of use https://github.com/ZephrFish/static-tools
"一些静态编译的常用渗透工具,方便内网渗透测试时使用: https://t.co/fPJEukawev"
-
[ Popular Software ] Check out what we've learned in the past 10 years of protecting Gmail users #enigma2016 http://goo.gl/ob5g1b https://t.co/flwCVTKPDv
"在过去 10 年的 Gmail 防护中,我们学到了什么, 来自 Google Blog: https://t.co/m9hTkTUAQK Slides : http://www.slideshare.net/elie-bursztein/lessons-learned-while-protecting-gmail "
-
[ SecurityProduct ] Bitdefender Vaccine now supports also CTB-Locker, Locky, TeslaCrypt http://securityaffairs.co/wordpress/45765/malware/bitdefender-anti-ransomware-vaccine.html
"Bitdefender 推出了一款可以预防勒索软件的 '疫苗': https://t.co/l70PRFcEYp"
-
[ Tools ] Decoding VBE http://blog.didierstevens.com/2016/03/29/decoding-vbe/
"Didier Stevens 分享了一个用于解码编码后的 VBS 脚本的工具: https://t.co/4dBiZTSTZ7"
-
[ Tools ] Assembly x86 Emulator : http://carlosrafaelgn.com.br/Asm86/
"一个在线版的 x86 模拟器 ︰ https://t.co/w1m9fGNiB1"
-
[ Tools ] Introducing a new section on Shodan to discover databases on the Internet: http://buff.ly/1MuILCc
"Shodan 引擎支持搜索互联网上暴露的数据库了︰ https://t.co/XZ0AAeqwSI"
-
[ Vulnerability ] Introduction to Memory Corruption Bugs (stack-based) : https://drive.google.com/file/d/0B0tBYiOD2uG7d1Q1d0k1VUdPbWs/view https://t.co/gc5ndfUwWN
"栈上的内存破坏漏洞简介, Google Drive︰ https://t.co/ERT6FNjsIL https://t.co/gc5ndfUwWN"
-
[ Web Security ] Send a Location Ping to Facebook Friends using only public_profile as a third party app http://philippeharewood.com/send-a-location-ping-to-facebook-friends-using-only-public_profile-as-a-third-party-app/ $5000 #bugbounty
"仅用 public_profile 权限, 向 Fackbook 朋友列表发送位置更新消息: https://t.co/0isRbns1WY "
-
[ Windows ] HackSys Extreme Vulnerable Driver 1.10 released with use of Uninitialized Variable module. https://github.com/hacksysteam/HackSysExtremeVulnerableDriver cc: @ BlackHatEvents
"HackSys 的 Extreme Vulnerable Driver 驱动漏洞利用实验环境更新为 1.10 了, 加入了一些未初始化变量相关的模块: https://t.co/6EsokCgWbu "
-
[ WirelessSecurity ] EN| Awesome Learn Wifi Security https://canyoupwn.me/en-awesome-learn-wifi-security/ ( a listing with several tools and tutorials )
"WiFi 安全相关的资料收集, 包括一些工具、图书、Blog 列表: https://t.co/lHYm7Gozeb "