
腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Android ] Android Hacking: Dumping and Analyzing Application’s Memory http://resources.infosecinstitute.com/android-hacking-dumping-and-analyzing-applications-memory/
" Android APP 内存 Dump 和分析,来自 InfoSec Blog: https://t.co/2MO0P3WAvQ"
-
[ Android ] Banking Trojan Outwits Google Verify Apps Scanner https://threatpost.com/banking-trojan-outwits-google-verify-apps-scanner/118142/
"一款名叫 'Black Jack Free' 的银行木马通过 Google Play Store 的审查并上架,有 5000 人下载了该木马应用。后来被 Lookout Security 团队发现: https://t.co/iGpbgZNlfs"
-
[ Attack ] New Angler Campaign Hacks 19 Websites, including UltraVNC http://www.cyphort.com/angler-hacks-vnc/
" Cyphort 最近监测到 Angler EK 攻击了 19 家网站,其中包括 UltraVNC: https://t.co/7arwOjdogn"
-
[ Attack ] Notorious Hacking Groups in mid 2016 http://marcoramilli.blogspot.com/2016/05/notorious-hacking-groups-in-mid-2016.html
" 臭名昭著的黑客组织(2016 年中版): https://t.co/8ure6lcwA1 "
-
[ Browser ] New Blog Post + Quick Tool: Chrome History Parser http://sketchymoose.blogspot.co.uk/2016/05/chrome-history-parser-chp.html #DFIR Sorry its been a while peeps!
" Chrome 浏览器历史文件解析工具 - 可以查询已下载文件列表、URL 访问历史、搜索关键词历史: https://t.co/y6J6jRHMN0 "
-
[ Browser ] Most ES6, including Modules, are supported by latest Edge preview. All ES7 proposals too https://blogs.windows.com/msedgedev/2016/05/17/es6-modules-and-beyond/
"Edge 浏览器目前支持大部分的 ES6 规范,包括对模块的支持。同时也支持所有的 ES7 提案, 来自 Edge 开发者 Blog: https://t.co/RH64K1mXzV"
-
[ Conference ] Slides from Andrew Hay's Bootstrapping a Security Research Project talk at Hackmiami Conference 2016 https://speakerdeck.com/andrewsmhay/hack-miami-2016-bootstrapping-a-security-research-project #hackmiami
" 如何启动一个安全研究项目,来自 Hackmiami 2016 会议: https://t.co/G31nhhepE1 "
-
[ Crypto ] Academics Make Theoretical Breakthrough in Random Number Generation #cryptography: https://threatpost.com/academics-make-theoretical-breakthrough-in-random-number-generation/118150/ via @ threatpost
" 随机数生成领域取得重大理论突破: https://t.co/2h3twtcRnJ"
-
[ Detect ] Finding Advanced Malware Using Volatility : https://eforensicsmag.com/finding-advanced-malware-using-volatility/ cc: @ JPoForens || @ monnappa22 #b2b
" 用 Volatility 内存分析框架检测高级恶意软件,来自电子取证杂志 2014 年的一篇 Blog ︰ https://t.co/IBwf1EzmuX "
-
[ Detect ] Control Flow Graph Based Multiclass Malware Detection Using Bi-normal Separation https://tuts4you.com/download.php?view.3668
"基于控制流图、使用 Bi-normal 分离算法实现多种类恶意软件检测: https://t.co/rE6eVXfnNT 解压密码: tuts4you "
-
[ Detect ] Function Call Graph Score for Malware Detection http://scholarworks.sjsu.edu/cgi/viewcontent.cgi?article=1438&context=etd_projects
"基于函数调用图评分机制的恶意代码检测: https://t.co/JeZ1nUVohu "
-
[ Forensics ] Radically improved Volatility Framework plugin for recovering BitLocker encryption keys (FVEK): https://github.com/elceef/bitlocker #DFIR
" Volatility 框架的一个 BitLocker 插件,用于还原 BitLocker 卷加密密钥: https://t.co/H2P8OFqGyT "
-
[ Linux ] Synchronization primitives in the Linux kernel (Part 5) - reader/writer semaphores: https://github.com/0xAX/linux-insides/blob/master/SyncPrim/sync-5.md //linux-insides cont'd cc @ 0xAX
"Linux-Insides 系列文章之内核同步原语 - 读写信号量 ︰ https://t.co/DnskB6F1B8 "
-
[ Linux ] rust.ko : A minimal Linux kernel module written in rust : https://github.com/tsgates/rust.ko
"rust.ko︰ 用 Rust 写的最小 Linux 内核模块, GitHub Repo︰ https://t.co/A3hRlVx07Z"
-
[ Linux ] Major Remote SSH Security Issue in CoreOS Linux Alpha, Subset of Users Affected : https://coreos.com/blog/alpha-security-incident-subset-of-users-affected.html
"CoreOS Linux Alpha 1045.0.0、1047.0.0 SSH 存在缺陷,允许在无密码或认证 Token 的情况下获得访问权限 ︰ https://t.co/BSgDmDzxPF"
-
[ Mac OS X ] Ostiarius now compat w/ OS X 10.11.5: https://objective-see.com/products/ostiarius.html FYI; by design must reinstall after OS update (uses private OS X kern structs)
"Ostiarius - OS X 系统用于拒绝未签名二进制程序执行的工具,现在支持 OS X 10.11.5 版本了: https://t.co/XfO2CVJVWW "
-
[ OpenSourceProject ] A brand new #Magento 0-day! http://netanelrub.in/2016/05/17/magento-unauthenticated-remote-code-execution/
" 开源电商系统 Magento 未授权远程代码执行漏洞(CVE-2016-4010): https://t.co/NSekDrIzLF"
-
[ Popular Software ] [ERPSCAN-16-009] SAP xMII - directory traversal vulnerability http://goo.gl/fb/koLQvK #FullDisclosure
"SAP MII 15.0 目录遍历漏洞,来自 FullDisclosure 公告: https://t.co/NXi7RBernE "
-
[ Popular Software ] [ERPSCAN-16-008] SAP NetWeaver AS JAVA - XSS vulnerability in ProxyServer… http://goo.gl/fb/DoyzzG #FullDisclosure
"SAP NetWeaver AS JAVA 7.4 版本 ProxyServer servlet XSS 漏洞,来自 FullDisclosure 公告: https://t.co/2i8i33oOrz "
-
[ Popular Software ] A little explanation of an old heap overflow bug in Foxit Reader https://scoding.de/analsysis-of-a-heap-overflow-in-foxit-reader
"福昕阅读器一个比较老的漏洞《Foxit Reader PNG Conversion Parsing tEXt chunk Arbitrary Code Execution》: https://t.co/PBBKmF8HBH 影响 7.0.8 - 7.1.5 版本 "
-
[ ReverseEngineering ] Introduction to x64 Assembly : https://software.intel.com/sites/default/files/m/d/4/1/d/8/Introduction_to_x64_Assembly.pdf (pdf)
"x64 汇编介绍,来自 Intel 的文档︰ https://t.co/FviaDVU1NV "
-
[ SecurityProduct ] Kernel memory corruption in Symantec/Norton antivirus, CVE-2016-2208 (more patches soon). https://bugs.chromium.org/p/project-zero/issues/detail?id=820 https://t.co/F22xDIelSU
" Symantec 反病毒引擎在解析 AsPack 加壳后的可执行程序时存在内核内存破坏漏洞,会导致 Windows 蓝屏(CVE-2016-2208): https://t.co/Sqhm0a48Fp https://t.co/F22xDIelSU"
-
[ Tools ] GPU-Disasm - A GPU-based x86 Disassembler https://tuts4you.com/download.php?view.3665
"GPU-Disasm - 基于 GPU 的 x86 反汇编工具, Paper: https://t.co/hPQZptPsbv"
-
[ Web Security ] The Sleepy User Agent http://blog.cloudflare.com/the-sleepy-user-agent/
"时不时就有客户投诉,自己的 HTTP GET 请求被 CloudFlare WAF 阻断掉了,请求乍看起来很正常,但奇怪的是 User Agent, 来自 CloudFlare Blog: https://t.co/clrGH3mocI"
-
[ Web Security ] A great list of some awesome bug bounty writeups: https://forum.bugcrowd.com/t/researcher-resources-bounty-bug-write-ups/1137
" Bug Bounty Writeups 收集︰ https://t.co/Cbs92yezj2"
-
[ Web Security ] Sleeping stored Google XSS Awakens a $5000 Bounty https://blog.it-securityguard.com/bugbounty-sleeping-stored-google-xss-awakens-a-5000-bounty/
" 一个沉睡的 Google XSS 唤醒了 5000 美元奖金: https://t.co/BLjVkZ9vXu"
-
[ Web Security ] XSS Auditor Bypasses 05.2016 https://html5sec.org/xssauditor/bypasses-052016 (someone asked for PoC and test-case, here you are)
" XSS Auditor Bypass 05.2016,来自 HTML5Sec 网站: https://t.co/c9UcjpDZZM"
-
[ Web Security ] How I bypassed Facebook CSRF Protection again ;) http://pouyadarabi.blogspot.com/2016/05/how-i-bypassed-facebook-csrf-in-2016.html https://t.co/qV7LDZJ6pR
"我是如何再次绕过 Facebook CSRF 保护的: https://t.co/Ozly6qYl5u https://t.co/qV7LDZJ6pR"
-
[ Windows ] [dos] - Microsoft Excel 2010 - Crash PoC: Microsoft Excel 2010 - Crash PoC http://bit.ly/1sjUOsY
"Microsoft Excel 2010 Crash PoC: https://t.co/6k2INqOVg1"
-
[ Windows ] A nice article about techniques behinds PolyHook, a Capstone-powered hooking engine to replace Microsoft Detours. http://www.codeproject.com/Articles/1100579/PolyHook-The-Cplusplus-x-x-Hooking-Library
"PolyHook - C++11 x86/x64 Hook 库背后的技术细节, PolyHook 被用来替代微软的 Detours: https://t.co/lzHoSdVZ32"
-
[ Windows ] Windows gdi32.dll heap-based buffer overflow in ExtEscape() triggerable via EMR_EXTESCAPE EMF record https://bugs.chromium.org/p/project-zero/issues/detail?id=731
" Windows gdi32.dll ExtEscape() 堆缓冲区溢出漏洞(CVE-2016-0170),可通过 EMR_EXTESCAPE EMF Record 触发: https://t.co/Wiz0BojaHq 关于 EMR_EXTESCAPE, 参考 MSDN: https://msdn.microsoft.com/en-us/library/cc230621.aspx "