腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Android ] Signal is using docker and a custom apk signature verifier to do (mostly) reproducible builds : https://whispersystems.org/blog/reproducible-android/
"Signal-Android - 一个开源的私有通讯工具 ︰ https://t.co/UlmgPQdhNL Github: https://github.com/whispersystems/Signal-Android "
-
[ Android ] How to test for CVE-2016-2402 and similar certificate pinning flaws https://koz.io/pinning-cve-2016-2402/
"如何测试 CVE-2016-2402 以及类似的 Certificate Pinning 问题: https://t.co/az87a30Q7J"
-
[ Attack ] #Unit42 analyst @ malware_traffic explains how the #ElTest campaign's path to Angler EK evolved over time http://bit.ly/25z9qnT
"Palo Alto 对 EITest 攻击行动的追踪进展,该行动最早活跃于 2014 年 10 月: https://t.co/4CnwzekCyT"
-
[ Attack ] Why Hospitals Are the Perfect Targets for Ransomware http://www.wired.com/2016/03/ransomware-why-hospitals-are-the-perfect-targets/ via @ WIRED
"为什么医院是勒索软件的最佳攻击目标: https://t.co/0tsmK5yS9o "
-
[ Attack ] WordPress and Joomla users get hacked with fake jQuery https://blog.avast.com/wordpress-and-joomla-users-get-hacked-be-aware-of-fake-jquery
"大量的 WordPress 和 Joomla 网站被注入假 jQuery 库, 450 万用户受影响, 来自 Avast Blog: https://t.co/CwGIQG5iN0"
-
[ Browser ] CrossFire: An Analysis of Firefox Extension-Reuse Vulnerabilities http://www.onarlioglu.com/publications/ndss2016crossfire.pdf
"CrossFire︰ Firefox 浏览器扩展重用漏洞分析, Paper: https://t.co/ixl45sGtvc CrossFire 是这篇 Paper 中提出的一个用于检测扩展重用漏洞的静态分析工具"
-
[ Browser ] Finally got around to finish the blog post about Chromium's process model - https://netsekure.org/2016/03/30/chromium-internals-process-model/.
"Chromium 的进程模型: https://t.co/DxwYHy6YCH Chromium 官方的文档: https://www.chromium.org/developers/design-documents/process-models "
-
[ Cloud ] Slides from my Build session, "Building Resilient Services: Learning Lessons from Azure": https://onedrive.live.com/redir?resid=D026B4699190F1E6!2604&authkey=!AGgJt8z0FW6pZ0U&ithint=file%2cpptx https://t.co/F9BUl1su7T
"Build 大会演讲: 构建弹性服务 - Azure 云上学到的经验教训, Slides ︰ https://t.co/8jf4OzYBkF https://t.co/F9BUl1su7T"
-
[ Defend ] Disrupt the Attack Chain: @ Rapid7's Approach to Incident Detection & Response [INFOGRAPHIC] https://www.rapid7.com/resources/infographics/rapid7-insightidr-disrupt-the-attack-chain.jsp https://t.co/HYxvAfOsYi
"破坏攻击链 - Rapid7 的应急响应和检测方法(一张图): https://t.co/Az6pnq6QM3 https://t.co/HYxvAfOsYi "
-
[ Detect ] Save time & identify security alerts that matter. Read our eBook: http://bddy.me/1UEHVpC #DFIR #cybersecurity https://t.co/3z1OFxhpBt
"节省时间, 只关注重要的告警, 来自 FireEye 的报告 ︰ https://t.co/ihwPUiR7Rm https://t.co/3z1OFxhpBt"
-
[ Exploit ] 64-bit Linux Return-Oriented Programming : http://crypto.stanford.edu/~blynn/rop/
"64-bit Linux ROP ︰ https://t.co/U2ri9Leg1z"
-
[ Exploit ] Combining x86 and x64 shellcode for Linux https://odzhan.wordpress.com/2016/03/31/x64-shellcodes-linux/
"Linux x64 一个反弹 Shell 的 Shellcode,另外作者在文章最后通过几个字节实现将 x86 和 x64 Shellcode 合成一个: https://t.co/qHsu4h37LJ "
-
[ Exploit ] Understanding Process Memory (Win32) : https://drive.google.com/file/d/0B0tBYiOD2uG7SlI2YzdQbnRlbUk/view cc: @ k3170Makan
"了解 Win32 进程的内存布局: https://t.co/HNGSwcmIbB "
-
[ Fuzzing ] I'm proud to announce a radically new version of AFL: http://lcamtuf.coredump.cx/afl/
"AFL Fuzz 工具发布一个全新版本 - 企业版 ︰ https://t.co/x09sBa2D1S"
-
[ Hardware ] How To Build Your Own Rogue GSM BTS For Fun And Profit https://evilsocket.net/2016/03/31/how-to-build-your-own-rogue-gsm-bts-for-fun-and-profit/
"如何构建一个属于自己的假基站: https://t.co/KTj6zji31t "
-
[ iOS ] [Blog] You Down 'Wit XPC - http://www.lifeform-labs.com/blog/2016/3/31/you-down-wit-xpc #mobile #ios
"Apple XPC 框架浅析,以及如何用 IDA 和 LLDB 调试分析 XPC 服务, 来自 Lifeform Labs Blog: https://t.co/sUNhByFm3R XPC 是一个轻量级的 IPC 框架"
-
[ iOS ] . #SideStepper Allows for MiTM Between #iOS Devices, MDM Tools: https://threatpost.com/sidestepper-allows-for-mitm-between-ios-devices-mdm-tools/117103/ via @ threatpost
"利用 SideStepper 漏洞,可以实现 iOS 设备和 MDM 工具之间的中间人攻击,攻击者可以向手机安装新的配置或者是 CA 根证书, ThreatPost 的报道: https://t.co/jy9t9aRd9i 该漏洞由 Check Point 研究员发现: http://www.checkpoint.com/resources/sidestepper-ios-vulnerability/ "
-
[ Linux ] Have a Linux ext4 data corruption bug… "ext4 data corruption due to punch hole races" (some security implications). https://bugzilla.suse.com/show_bug.cgi?id=972174
"Linux ext4 数据损坏的 Bug - 通过竞争条件触发同一块区域的页错误: https://t.co/tdz0hJl5UU"
-
[ Malware ] New post: Tax Day Extortion: PowerWare Crypto-ransomware Targets Tax Files http://bit.ly/22RrydY @ TrendMicro
"纳税日的勒索 - PowerWare 勒索软件加密税收相关的文件, 来自 TrendMicro Blog: https://t.co/iNR5duZYaR "
-
[ Malware ] The evolution of Brazilian #Malware - https://kas.pr/aK46 #brazil https://t.co/thhhhPNs5S
"巴西恶意软件的发展历程, 来自 Kaspersky Blog: https://t.co/2pvspeAuK3 https://t.co/thhhhPNs5S"
-
[ Malware ] More about #Petya Stage 1 decryptor: https://hshrzd.wordpress.com/2016/03/31/petya-key-decoder/ - tests in progress, any remarks welcome!
"Petya 勒索软件的第一步 - 解密过程分析 ︰ https://t.co/X5oNDux4Z5 "
-
[ Malware ] The Linux Remaiten malware is building a Botnet of IoT devices http://securityaffairs.co/wordpress/45820/iot/linux-remaiten-iot-botnet.html
"Linux 恶意软件 Remaiten 正在构建一个 IoT 设备组成的 Botnet, 来自 SecurityAffairs 的报道: https://t.co/J4N2svFxof 来自 WeLiveSecurity 的技术分析: http://www.welivesecurity.com/2016/03/30/meet-remaiten-a-linux-bot-on-steroids-targeting-routers-and-potentially-other-iot-devices/ "
-
[ Malware ] Top Exploit Kits Round Up | March Edition https://blog.malwarebytes.org/threat-analysis/exploits-threat-analysis/2016/03/top-exploit-kits-round-up-march-edition/
"顶级 Exploit Kits 收集(3 月版), 来自 MalwareBytes Blog: https://t.co/yaqdtslZ5N"
-
[ Malware ] Fileless Infections: An Overview https://blog.malwarebytes.org/cybercrime/2016/03/fileless-infections-an-overview/
"无文件型恶意软件概览 - 怎么执行以及藏在哪的问题, 来自 MalwareBytes Blog: https://t.co/EzTbBc6VUb"
-
[ Mitigation ] Code-Pointer Integrity http://dslab.epfl.ch/proj/cpi/
"CPI(代码指针完整性) - 快速、精确的控制流劫持保护: https://t.co/wDepG8B0PC 上海交大软件安全小组对该论文的翻译: http://securitygossip.com/blog/2016/03/30/2016-03-30/ "
-
[ Others ] [BLOG] Implementing a Custom Directive Handler in #Clang http://blog.quarkslab.com/implementing-a-custom-directive-handler-in-clang.html
"在 Clang 中实现一个自定义指令 Handler: https://t.co/wNXGolCe4x"
-
[ Others ] Lots of pre-auth command injections in Netgear products. Vendor was unresponsive after 90 days so released. https://www.blackhat.com/docs/asia-16/materials/asia-16-Costin-Automated-Dynamic-Firmware-Analysis-At-Scale-A-Case-Study-On-Embedded-Web-Interfaces.pdf Slide 35
"大规模的固件自动化动态分析 - 嵌入式 Web 接口案例分析, 来自 BlackHat Asia 2016 会议: https://t.co/AifUqgya08 前段时间推送过相关的 Paper: http://arxiv.org/pdf/1511.03609v1.pdf "
-
[ Others ] Releasing "Bypassing Browser Security Policies For Fun And Profit" WhitePaper + Slides + Test Suite - http://goo.gl/0VsUG6 #SOP #BHASIA
"Bypassing Browser Security Policies For Fun And Profit, 来自作者在 BlackHat Asia 2016 会议的演讲: https://t.co/o2IaQ9a0h3 "
-
[ Others ] New Blogpost: https://blog.binaryedge.io/2016/03/31/security-of-a-country-portugal/ - Security of a country - Portugal
"《一个国家的安全》系列文章之葡萄牙 ︰ https://t.co/UTc5gXGtIG "
-
[ Pentest ] Burp Tips/Tricks for Non-Webapp Testing - Part 1: Interception & Proxy Listeners : http://parsiya.net/blog/2016-03-27-burp-tips-and-tricks-for-non-webapp-testing---part-1-interception-and-proxy-listeners/ ,Part 2: http://parsiya.net/blog/2016-03-29-burp-tips-and-tricks-for-non-webapp-testing---part-2-history-intruder-scanner-and-more/
"昨天推送了《Burp 使用建议和技巧 - Part 1 ︰ 劫持和代理监听器》 : https://t.co/QbqFWQzwNo 今天是 Part 2 History, Intruder, Scanner: https://t.co/HLivzUgXcm"
-
[ Pentest ] RWSH (Ray's Web SHell) - A semi-interactive PHP web shell and Python client http://www.doyler.net/security-not-included/introducting-rwsh-rays-web-shell
"RWSH (Ray's Web Shell) - 半交互式的 Web Shell: https://t.co/uvzMfH9Buu 开源, Github Repo: https://github.com/doyler/SecurityTools/tree/master/Shells/Web/RWSH "
-
[ Popular Software ] Docker UI v0.10.0 - Multiple Client Side Cross Site Request Forgery Web… http://goo.gl/fb/usGRzA #FullDisclosure
"DockerUI v0.10.0 多个跨站请求伪造漏洞, DockerUI 是 Docker 远程 API 的 Web 接口, 来自 FullDisclosure 的公告: https://t.co/n7kTBwPAV4 "
-
[ Sandbox ] Subgraph's sandboxing Oz looks very promising: https://github.com/subgraph/oz you can sandbox arbitrary applications with seccomp and NS seperation
"Subgraph 公司的 Oz 项目 - 去年推送过这个工具,这是个沙盒系统,基于 Linux 的 Seccomp 和命名空间等机制,实现为应用提供一个隔离的沙盒环境, 也还支持网络桥接。 Github Repo: https://t.co/8sYm1nNTUr"
-
[ ThirdParty ] Vulnerability Spotlight: Lhasa (LZH/LHA) Integer Underflow Exploit http://blogs.cisco.com/security/talos/vulnerability-spotlight-lhasa-integer-underflow-exploit
"Talos 发现了一个 Lhasa 压缩工具(库)的一个整数下溢漏洞(CVE-2016-2347): https://t.co/VxiKiV6ZPe"
-
[ ThirdParty ] Python v2.7 v1.5.4 iOS - Filter Bypass & Persistent Vulnerability http://goo.gl/fb/7wIVj2 #FullDisclosure
"Python v2.7 v1.5.4 iOS 执行环境存在过滤器绕过和一个持久型注入漏洞, 来自 FullDisclosure 的公告: https://t.co/Km00kvwXyf "
-
[ Tools ] Download all of Microsoft's patches and symbols with our new tool https://github.com/NorthBit/bulletin-scraper
"bulletin-scraper - 利用该工具可以下载微软所有的补丁文件,提取可执行文件,下载相关的调试符号: https://t.co/PXmUBvTBTr"
-
[ Tools ] Online tool to quickly find common rop gadgets in executables http://ropshell.com/
"找 ROP Gadgets 的在线工具: https://t.co/GGVsC5AQVJ "
-
[ Tools ] Our rupture tool implementing compression side-channel TLS attacks is now open source: https://ruptureit.com
"rupture - 一个边信道攻击框架,可以攻击所有基于压缩的加密攻击 ︰ https://t.co/Hr8Bt8xGQc"
-
[ Web Security ] Trend Micro (SSO) - (Backend) SSO Redirect & Session Vulnerability http://goo.gl/fb/QQ5GaV #FullDisclosure
"趋势科技单点登陆(SSO) Web 服务存在任意 URL 跳转漏洞, 来自 FullDisclosure 的公告: https://t.co/gK1P2SuEvk "
-
[ Windows ] From Telemetry to Open Source: an Overview of Windows 10 Source Tree http://blog.ptsecurity.com/2016/03/from-telemetry-to-open-source-overview.html
"从开源到遥测技术: Windows 10 源码树概览: https://t.co/AgQkj2JXkJ"
-
[ Windows ] Interesting CFG Improvements in Redstone 1 ("Windows Anniversary Update") https://t.co/P7suiVGg8B
"Windows 10 Redstone 1 在 CFG 上做了一些有趣的改进: https://t.co/P7suiVGg8B"
-
[ Windows ] Mind The Gap – Exploit Free Whitelisting Evasion Tactics https://www.insinuator.net/2016/03/mind-the-gap-exploit-free-whitelisting-evasion-tactics/
"前两周推送过 Casey Smith 在 Troopers 会议讲应用白名单绕过技术的 PoC 代码, 今天是 Slides: https://t.co/1zUhhVdqDP"
-
[ Windows ] Run iOS Simulator inside Visual Studio on your PC. What is life even? #Build2016
"马上,将可以在 Visual Studio 中直接开发 iOS 和 Android 应用程序了, VS 自带 iOS 和 Android 模拟器。 来自微软中国的微博: http://weibo.com/1678298567/DoR3Wtn9f "