
腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Android ] Results of PoC Publishing https://securelist.com/blog/research/74724/results-of-poc-publishing/
" Kaspersky 这篇 Blog 谈 PoC 公开与 Android 系统碎片化的问题,过早的公开 PoC 有可能为恶意攻击者提供 '帮助': https://t.co/VPcLhdZ7HF "
-
[ Browser ] Google fixes five vulnerabilities w/ Chrome update, awards $20K to bug hunters - http://ow.ly/H15o3008MCU
"Chrome 浏览器更新 50.0.2661.102 版本,本次更新共修复了 5 个漏洞,其中 3 个为高危: https://t.co/YrwbOwZtMk"
-
[ Browser ] Microsoft Edge Accessibility documentation now live at https://developer.microsoft.com/en-us/microsoft-edge/platform/documentation/accessibility/
"Edge 浏览器关于 Accessibility 的文档: https://t.co/FwpH8gnGcO"
-
[ Debug ] Debugging Debuggers - Symbolic Debugging With DWARF : http://backtrace.io/blog/images/bbcon2016-sbahra.pdf (Slides)
"Debugging Debuggers - 基于 DWARF 格式的有符号调试是如何实现的, Slides︰ https://t.co/OXdSQIf5xx "
-
[ Forensics ] Grabbing key artifacts 1 by 1 off a mounted filesystem is tedious - this script's been useful for others https://github.com/hiddenillusion/IR/blob/master/Triage/WindowsTriage.py #DFIR
" Windows 取证分析时,在文件系统中一个个的找文件太耗时,这个脚本可以帮助我们: https://t.co/K9wflKll21 "
-
[ Fuzzing ] Pretty slick: fuzzing+PANDA taint & concolic exec+constraint solving for test case generation: http://publications.lib.chalmers.se/records/fulltext/228478/228478.pdf
" 基于 Concolic Execution 技术的多平台二进制程序测试, Paper ︰ https://t.co/HsKWCJdGlu"
-
[ Hardware ] Hacking Gesture-Based Security https://www.schneier.com/blog/archives/2016/05/hacking_gesture.html
"攻击触摸屏基于手势的认证: https://t.co/hrTIyH5pvP"
-
[ Linux ] CVE-2016-0758 - Because decoding ASN.1 in kernel is fun http://www.openwall.com/lists/oss-security/2016/05/12/9 #yolo
"Linux 内核在解析 x509 ASN.1 DER 格式时存在漏洞(CVE-2016-0758): https://t.co/C9mw6F8jj7 "
-
[ Linux ] here's another Linux bpf UAF http://seclists.org/oss-sec/2016/q2/332
"又一个 Linux 内核 bpf UAF, PoC: https://t.co/NDATLkcug7 影响 Master 分支最新版本"
-
[ MachineLearning ] In-depth Machine Learning Course w/ Python https://pythonprogramming.net/machine-learning-tutorial-python-introduction/
" 基于 Python 的深度学习教程: https://t.co/65jI97AoSg "
-
[ Malware ] New post: Chinese-language Ransomware Makes An Appearance http://bit.ly/27gLQwY @ TrendMicro
" 中文版勒索软件出现,来自 TrendMicro Blog: https://t.co/CZ4YX9DiAt "
-
[ Malware ] Cerber #ransomware partners with the #Dridex spam distributor http://bddy.me/221wZCU
" Cerber 勒索软件利用 Dridex 传播: https://t.co/JkMUCK17wN "
-
[ Others ] Server-Side Request Forgery Takes Advantage of Vulnerable App Servers https://blogs.mcafee.com/mcafee-labs/server-side-request-forgery-takes-advantage-vulnerable-app-servers/
" McAfee Blog 介绍 SSRF(服务端请求伪造漏洞): https://t.co/1twb5hXTij"
-
[ Others ] Covert Communication Techniques Used By Next Gen High Tech Terrorists http://securityaffairs.co/wordpress/47243/terrorism/covert-communications-terrorists.html
"高科技恐怖分子所用的隐蔽通信技术: https://t.co/31oUo03F6B"
-
[ Pentest ] Building an EmPyre with Python http://www.harmj0y.net/blog/empyre/building-an-empyre-with-python/
" EmPyre 渗透测试框架的搭建和使用, EmPyre 框架用 Python 语言编写: https://t.co/QCHDEPrIBs "
-
[ Popular Software ] #Adobe #Flash Player #security updates available (APSB16-15) - details @ http://adobe.ly/1OlaZ3c
"Adobe Flash 昨天发布 APSB16-15 漏洞公告, 本次共修复 25 个漏洞: https://t.co/A3yuBVEbwR 其中 CVE-2016-4117 已经在野外攻击中出现: https://helpx.adobe.com/security/products/flash-player/apsa16-02.html http://www.welivesecurity.com/2016/05/12/adobe-flash-zero-day-in-wild/"
-
[ Popular Software ] Huawei Mobile Broadband HL Service Local Privilege Escalation http://goo.gl/fb/kXPi6e #FullDisclosure
"华为在 Windows 系统的服务 '移动宽带 HL 服务' 存在 SYSTEM 本地提权漏洞,来自 FullDisclosure 公告: https://t.co/flYfIXrRzh "
-
[ SecurityProduct ] A Glance at Cylance http://secureallthethings.blogspot.com/2016/05/a-glance-at-cylance.html?m=1
" 这篇 Blog 谈作者对 Cylance 安全产品的测试过程,Cylance 产品提供基于机器学习和人工智能的检测技术: https://t.co/Eu5leDsKY5 "
-
[ ThreatIntelligence ] The Art of Searching for Open Source Intelligence http://resources.infosecinstitute.com/the-art-of-searching-for-open-source-intelligence/
"开源情报搜索的艺术, 来自 InfoSec Blog: https://t.co/XGGJo1vdi9 "
-
[ Tools ] X86 Shellcode Obfuscation (Part 1) - Guide with source code in Python https://breakdev.org/x86-shellcode-obfuscation-part-1/
"基于 Python 的 x86 Shellcode 混淆工具(Part 1): https://t.co/vqKDmFlEvP "
-
[ Tools ] Halcyon IDE for Nmap Script Development http://halcyon-ide.org/
" Halcyon IDE - 专门用于开发 Nmap 扫描器脚本的 IDE: https://t.co/nnGCx5QbaH"
-
[ Virtualization ] A closer look at shielded VMs in Windows Server 2016 - https://blogs.technet.microsoft.com/windowsserver/2016/05/10/a-closer-look-at-shielded-vms-in-windows-server-2016/ https://gallery.technet.microsoft.com/shielded-vms-and-guarded-98d2b045
" Windows Server 2016 新添加了一种虚拟机防护技术 - Shielded VMs: https://t.co/7PprFaLRYI https://t.co/8cMLEbs7qs"
-
[ Web Security ] Blind XSS Code http://brutelogic.com.br/blog/blind-xss-code/
" Blind XSS Code: https://t.co/2cL6XxzX3d"
-
[ Web Security ] CakePHP Framework <= 3.2.4 IP Spoofing Vulnerability http://goo.gl/fb/0eERKE #FullDisclosure
"CakePHP 框架 3.2.4 之前版本存在 IP 欺骗漏洞,来自 FullDisclosure 公告: https://t.co/6n8PuQXZrB "
-
[ Windows ] Cool RCE gadget for .NET deserialization https://blog.scrt.ch/2016/05/12/net-serialiception/ by @ agixid < time to put it on the top 10?
" .NET 反序列化漏洞及利用: https://t.co/nJjliweM4g "
-
[ Windows ] [remote] - Microsoft Windows Media Center .MCL File Processing Remote Code Execution (MS16-059) https://www.exploit-db.com/exploits/39805/
" Windows 媒体中心 .MCL 文件处理远程代码执行漏洞 PoC (MS16-059,CVE-2016-0185): https://t.co/c39hj04CDU"