
腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Android ] Mobile malware uses API and legitimate, open source projects to bypass Android security http://symc.ly/24gu48R https://t.co/SEEy8P1H2t
" Android 木马利用从 GitHub 开源项目学到的技巧,绕过 Android 安全策略: https://t.co/KpxDSGXlf6 https://t.co/SEEy8P1H2t"
-
[ Attack ] Tumblr 's Database leak https://mega.nz/#!V9ZmSCCS!lRgT4irycFEefJvWVm0-xZOuhNRZP7Hg41rJJuydSQY
"Tumblr 泄漏的数据库下载: https://t.co/P9uxPHovAn"
-
[ Backdoor ] Backdooring a DLL http://www.gironsec.com/blog/2016/06/backdooring-a-dll/
" 如何修改 DLL,植入后门: https://t.co/ZOcXyYiZl4 "
-
[ Detect ] Our blog post on signature-free #malware C2 detection has been updated with a #Kovter signature by @ networktotal ;) http://netres.ec/?b=165BF7D
" 数据包处理工具 CapLoader 1.4 版本加入对 C&C 流量的识别,而且不依赖黑名单和特征: https://t.co/GsIW2EC84w "
-
[ Hardware ] Physical Key Extraction Attacks on PCs: http://m.cacm.acm.org/magazines/2016/6/202646-physical-key-extraction-attacks-on-pcs/fulltext
" 通过物理攻击的方法从 PC 中提取密钥︰ https://t.co/3i62nSKCWo"
-
[ Malware ] Exploiting malware C2 servers : http://samvartaka.github.io/exploitation/2016/06/03/dead-rats-exploiting-malware https://t.co/XSwx45TQMK
" Exploit Poison Ivy 远控 C&C 服务器的一个栈缓冲区溢出漏洞︰ https://t.co/0MHIpD1q07 https://t.co/XSwx45TQMK"
-
[ Malware ] CylancePROTECT® vs. CryptXXX https://blog.cylance.com/cylanceprotect-vs-cryptxxx
"CylancePROTECT 安全软件与 CryptXXX 勒索软件的对抗: https://t.co/YaTkFvbAQy"
-
[ Network ] Some discussion of #IPv6 ACLs for Cisco devices: https://www.insinuator.net/2015/12/developing-an-enterprise-ipv6-security-strategy-part-3-traffic-filtering-in-ipv6-networks-i/ https://www.insinuator.net/2015/12/developing-an-enterprise-ipv6-security-strategy-part-4-traffic-filtering-in-ipv6-networks-ii/ https://www.insinuator.net/2016/05/cve-2016-1409-ipv6-ndp-dos-vulnerability-in-cisco-software/
" 关于 Cisco 网络设备 IPv6 ACL 策略配置的几篇文章, Part 3: https://t.co/vR70j3qpSl Part 2: https://t.co/r5mjVeTD52 Part 1: https://t.co/MfSgtq9PRm"
-
[ OpenSourceProject ] A Little on V8 and WebAssembly : https://ia601503.us.archive.org/32/items/vmss16/titzer.pdf (pdf)
" 关于 V8 和 WebAssembly 的一篇 Slides,为何 JavaScript 如此独特, V8 到底哪里好, WebAssembly 究竟是什么: https://t.co/VGsSg2N7yc "
-
[ Others ] Seems CVE-2016-3117 found by Checkpoint gives AT command access. This means stealing mobile auth as described here! http://conference.hitb.org/hitbsecconf2015ams/wp-content/uploads/2014/12/D1T1-Markus-Vervier-Mobile-Authentication-Subspace-Travel.pdf
" HITB 2015 会议一篇关于手机网络认证的演讲: https://t.co/wbsGToPQS9"
-
[ Others ] Identifying People from their Driving Patterns https://www.schneier.com/blog/archives/2016/05/identifying_peo_7.html
" 华盛顿大学和加利福尼亚大学的研究员正在研究如何通过驾驶习惯识别人: https://t.co/xaxRHyVmlc"
-
[ Popular Software ] DeadUpdate; Or, How I learned to stop worrying and execute arbitrary executables from HTTP - http://teletext.zaibatsutel.net/post/145370716258/deadupdate-or-how-i-learned-to-stop-worrying-and from HTTP to SYSTEM
" ASUS 的软件更新组件(预装)在下载更新和执行的流程中缺乏验证,可以被用来实现 SYSTEM 提权: https://t.co/tXkIvZqwL2 "
-
[ Protocol ] More LTE protocol implementation and new (unpatched) baseband vulnerabilities by Benoit Michau and C. Devine - https://www.sstic.org/media/SSTIC2016/SSTIC-actes/how_to_not_break_lte_crypto/SSTIC2016-Article-how_to_not_break_lte_crypto-michau_devine.pdf
" LTE 加密在不同实现版本中的一些问题: https://t.co/8peukEcaCY"
-
[ Tools ] Finished a JS wrapper for Keystone 0.9 with Emscripten to make a realtime assembler in browser: http://alexaltea.github.io/keystone.js/ cc. @ keystone_engine
" Keystone 的 JS 封装版 - 运行在浏览器里的汇编引擎︰ https://t.co/eMeFyIVOqQ "
-
[ Tools ] How to instantly write 2000 exploits w/ Binary Ninja: https://blog.trailofbits.com/2016/06/03/2000-cuts-with-binary-ninja/ ,Binary Ninja: http://binary.ninja/ https://t.co/zje8PqQ8F5
" 如何利用 Binary Ninja 工具快速编写 Exploit ︰ https://t.co/tdLyRRvh1l Binary Ninja 工具官网︰ https://t.co/wVzzEI8oOy https://t.co/zje8PqQ8F5"
-
[ Web Security ] Bait and Switch: The Failure of Facebook Advertising – An OSINT Investigation via @ bellingcat https://www.bellingcat.com/resources/2016/06/02/bait-and-switch-the-failure-of-facebook-advertising-an-osint-investigation/
" 页面偷换 - Facebook 广告失误案例的一次调查: https://t.co/53nda3dk95 "
-
[ Web Security ] The Shortest Reflected XSS Attack Possible http://brutelogic.com.br/blog/shortest-reflected-xss-possible/
" 这可能是长度最短的 XSS Payload: https://t.co/HvvwUpDGnA"