腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Attack ] Really enjoyed reading this post: "Playing games with an attacker". Detailed and entertaining! http://blog.0x3a.com/post/141950176719/playing-games-with-an-attacker-how-i-messed-with via @ _remixed
"与攻击者玩游戏: https://t.co/1TtflQsknZ 作者于今年 2 月份公开了一个网站, 用于追踪 CryptoWall 勒索软件, 从那时候开始,这个网站就被攻击者盯上了, 这篇 Blog 讲述作者与攻击者博弈的过程"
-
[ Attack ] Taiwan targeted with new cyberespionage back door Trojan | Symantec Connect Community http://ow.ly/104NDR
"Symantec 发现了一款定向攻击台湾的后门木马 Dripion: https://t.co/RDLxXUtWQB"
-
[ Attack ] Two more healthcare networks caught up in outbreak of hospital ransomware http://arstechnica.com/security/2016/03/two-more-healthcare-networks-caught-up-in-outbreak-of-hospital-ransomware/ #ransomware
"又有两家医疗机构网络爆发了勒索软件攻击: https://t.co/8rRM09w2Pa "
-
[ Attack ] The Anatomy Of A Nation-State Hack Attack https://packetstormsecurity.com/news/view/26476/The-Anatomy-Of-A-Nation-State-Hack-Attack.html
"剖析一次国家级黑客攻击, 来自 BBC 的报道: https://t.co/xW7A4TWouw"
-
[ Browser ] Let's build a browser engine! (Part 1 - 7) : https://limpet.net/mbrubeck/2014/08/08/toy-layout-engine-1.html
"自己写一个袖珍型浏览器引擎 Part 1: https://t.co/kPZ2iWvSbN 剩下的 Part 2 - 7: https://limpet.net/mbrubeck/ "
-
[ Browser ] You’ll be able to log into websites with your face in MS Edge and Windows 10. #Build2016
"Build 2016 大会上, 微软表示 Windows 10 Edge 浏览器将支持刷脸登陆, 这一技术被成为: Windows Hello 生物识别技术"
-
[ Browser ] Safari Technology Preview — a new way to try features and fixes that are coming to Safari. https://webkit.org/blog/6017/introducing-safari-technology-preview/ https://t.co/m8JYUBQ9iK
"为了更方便地让大家了解 Safari 浏览器的新特性, Apple 从今天开始推出 Safari 技术预览版: https://t.co/oHI4cNWLw2 https://t.co/m8JYUBQ9iK"
-
[ Defend ] Why doesn't traditional static endpoint #cyber protection work? Find out: http://bddy.me/1UC4VFN #endpoint https://t.co/Ie17Wr0SYG
"加强终端防护,对抗现代威胁, 来自 FireEye 的报告︰ https://t.co/dNzYJ5WrSz https://t.co/Ie17Wr0SYG"
-
[ Defend ] How will banking enforce #cybersecurity in the future? Learn how strategy can help prepare: http://symc.ly/1MRqOc6 https://t.co/MA8T6LVTdU
"金融机构如何为网络安全做好战略准备, 来自 Symantec Blog ︰ https://t.co/WyszJY7j9T Paper: http://www.symantec.com/content/en/us/enterprise/white_papers/cybersecurity-whitepaper-financial-wp-21352892.pdf "
-
[ Detect ] How to Detect and Automatically Revoke Unintended IAM Access with Amazon CloudWatch Events http://blogs.aws.amazon.com/security/post/Tx2XGINRKCK9XNS/How-to-Detect-and-Automatically-Revoke-Unintended-IAM-Access-with-Amazon-CloudWa
"如何在 AWS 云上实现对意外 API 调用的检测和权限的撤回: https://t.co/9X9kHE8cJq"
-
[ Firmware ] Intel Firmware Engine 2.0 has been released. New GUI, restore points & more. Available for download here: http://firmware.intel.com/learn/intel-firmware-engine/downloads #UEFI #IoT
"Intel 固件引擎 2.0 版本,这个引擎可以简化和加速固件镜像的开发过程︰ https://t.co/hyNgi18Bfm"
-
[ Forensics ] Generic RAID Reassembly using Block-Level Entropy https://www.insinuator.net/2016/03/generic-raid-reassembly-using-block-level-entropy/
"通过计算磁盘 Block 级熵,实现 RAID 取证还原: https://t.co/LARMbrImNt "
-
[ Hardware ] Let Me Get That Door for You: Remote Root Vulnerability in HID Door Controllers http://blog.trendmicro.com/let-get-door-remote-root-vulnerability-hid-door-controllers/
"我来为你开门 - HID 门禁系统远程 Root 漏洞, HID 是世界最大的门禁生产厂商之一: https://t.co/d9IDSqX591 "
-
[ Hardware ] 1,400 vulnerabilities found in automated medical supply system https://www.helpnetsecurity.com/2016/03/30/1400-flaws-automated-medical-supply-system/
"CareFusion 的自动化医疗补给系统被发现了 1400+ 个漏洞,更糟糕的是,受影响的这些软件已经过了维护期,厂商不会再提供补丁更新: https://t.co/dpAVpLzWsb"
-
[ Linux ] Recover from failed vdc cryptfs command https://blog.gentoo.moe/2016/03/recover-from-failed-vdc-cryptfs-command/ https://t.co/CKmo0RD7QO
"从失败的 vdc cryptfs 命令中恢复: https://t.co/p2vf3AdZOp https://t.co/CKmo0RD7QO"
-
[ Malware ] Ransomware Update: Today’s Bountiful Cornucopia of Extortive Threats https://blog.cylance.com/ransomware-update-todays-bountiful-cornucopia-of-extortive-threats
"勒索软件更新︰ 今天的聚宝盆敲诈威胁 - Cylance 对 PowerWare 和 Petya 的分析: https://t.co/GkprBKCrtV"
-
[ Network ] Root Servers Were Not Targets of 2015 DDoS Attack: https://threatpost.com/root-servers-were-not-targets-of-2015-ddos-attack/117082/ via @ threatpost
"Verisign 的两名研究员表示,2015 年 11 月 30 号, 3 台根域名服务器遭到 DDoS 攻击,而这次攻击中,根服务器并不是攻击者真正的目标,两个中国的 IP 地址才是: https://t.co/0SsxUKxtM2"
-
[ Network ] The Trouble with Tor https://blog.cloudflare.com/the-trouble-with-tor/
"The Trouble with Tor, 来自 CloudFlare Blog: https://t.co/bo3qIEUl89 "
-
[ Others ] Need a primer on Incident Detection & Response? Learn about the key concepts in this blog: https://community.rapid7.com/community/insightidr/blog/2016/03/29/what-is-incident-detection-and-response by @ KatherineAHayes #IDR
"应急检测和响应是什么, 来自 Rapid7 Blog: https://t.co/ONLgmjrWNS"
-
[ Others ] Bit-vector Support in Z3-str2 Solver and Automated Exploit Synthesis https://uwspace.uwaterloo.ca/bitstream/handle/10012/10022/Subramanian_Sanu.pdf?sequence=1
"Z3-str2 求解器的位向量支持,另外作者还提出了一种远程 Exploit 自动化构造的方法, Paper: https://t.co/UojXz24vTz "
-
[ Others ] Hack millions of devices with 0 skills! - Insecure VNC Servers around the world : http://hahasecurity.blogspot.in/2016/03/hack-millions-of-devices-with-0-skills.html
"零技能轻松黑掉数百万设备 - 不安全的 VNC 服务器遍地都是︰ https://t.co/FrK9thTYjl"
-
[ Pentest ] reverse proxying attacker tools http://room362.com/post/2015/reverse-proxying-attacker-tools/
"反向代理攻击工具: https://t.co/KvAvsj1VWt"
-
[ Pentest ] Check out the hottest #NextGen #PenTesting #Recon #RedTeam tools! http://www.crowdstrike.com/blog/next-gen-penetration-testing-recon-red-team/ ...no wait, this blog is just nikto & sqlmap :|
"下一代渗透测试 - 信息探测, 主要介绍了 sqlmap 和 nikto 两个工具: https://t.co/TXfvLC6ru9 "
-
[ Pentest ] Burp Tips and Tricks for Non-Webapp Testing - Part 1: Interception and Proxy Listeners http://parsiya.net/blog/2016-03-27-burp-tips-and-tricks-for-non-webapp-testing---part-1-interception-and-proxy-listeners/
"Burp 使用建议和技巧 - Part 1 ︰ 劫持和代理监听器: https://t.co/DrMD2EtJd2"
-
[ Pentest ] Cause Everyone is Watchin PowerShell.exe... https://github.com/Cn33liz/p0wnedShell Some great PowerShell payloads executing Inside InstallUtil cc @ Cneelis
"p0wnedShell - 执行 PowerShell Payloads, 不依赖 PowerShell.exe, 自己用 C# 写的一个运行环境: https://t.co/WZwzSXuf6p "
-
[ Popular Software ] Some Old SAP Systems Have Default Kernel User Accounts https://packetstormsecurity.com/news/view/26478/Some-Old-SAP-Systems-Have-Default-Kernel-User-Accounts.html
"一些比较老的 SAP 系统存在默认内核用户帐户: https://t.co/FpCim3JzKi"
-
[ Programming ] The Little Go Book : Free introduction to Google's Go programming language : http://openmymind.net/assets/go/go.pdf (pdf)
" 《The Little Go Book》, Google Go 语言编程书(PDF) ︰ https://t.co/sYDO2BMOqk "
-
[ SecurityProduct ] When your AV uses a third-party library that comes with trivially exploitable RCE. https://bugs.chromium.org/p/project-zero/issues/detail?id=773
"TrendMicro 反病毒软件默认启动远程调试桩监听,等待连接。 来自 Project Zero Issue 773: https://t.co/T608t72wXJ"
-
[ ThirdParty ] CENSUS advisory on a Kamailio (SIP server) remote heap buffer overflow (CVE-2016-2385): https://census-labs.com/news/2016/03/30/kamailio-seas-heap-overflow/
"Kamailio (SIP 服务器) 远程堆缓冲区溢出漏洞 (CVE-2016-2385),Kamailio 是 SIP 信令服务器的一个开源实现, 来自 CENSUS 的公告: https://t.co/9FXbXeRYdY"
-
[ Tools ] Reverse Engineering Sublime Text’s Fuzzy Match : https://blog.forrestthewoods.com/reverse-engineering-sublime-text-s-fuzzy-match-4cffeed33fdb#.pz7af8uer
"Sublime Text 编辑器强大的模糊匹配功能 ︰ https://t.co/Raksii0yyM"
-
[ Web Security ] XSSvectorMaker - Tool for making XSS vector under the specified conditions. https://int21h.jp/tools/XSSvectorMaker/
"XSSvectorMaker - XSS 攻击 Payload 生成、测试工具: https://t.co/PrxJV67dqt"
-
[ Web Security ] DOMXSScat - DOM based XSS passive scanner add-on for Fiddler4. https://int21h.jp/tools/DOMXSScat/
"DOMXSScat - DOM XSS 被动扫描工具, Fiddler4 的一个扩展: https://t.co/9ZuZPoaXaJ"
-
[ Windows ] Windows 10 now has support for Bash and the universe of open source command line tools. #Build2016 https://t.co/5KeBeVg0wU
"微软和 Canonical 合作, 启动 'Ubuntu on Windows' 项目, 将可以在 Windows 10 中直接运行 ELF 二进制程序, 而且不是通过虚拟机或者容器的方式,而是原生就支持, 微软技术人员将这种技术解释为: 实时将 Linux 系统调用翻译成 Windows 系统调用, 跟 Wine 项目的做法刚好相反。 来自 ZDNet 的报道: http://www.zdnet.com/article/microsoft-and-canonical-partner-to-bring-ubuntu-to-windows-10/ "