
腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Android ] Mobile malware variants have new capabilities to evade #Android security. https://threatpost.com/aggressive-triada-horde-variants-up-mobile-malware-threat/118767/ via @ threatpost
"手机恶意软件 Triada 和 Horde 的新变种可以逃逸 Android 安全策略,来自 ThreatPost 的报道: https://t.co/eLlfoPoOOR"
-
[ Android ] Anti-debugging Skills in APK - http://drops.wooyun.org/mobile/16969 (Chinese)
" APK 中的反调试技巧,来自乌云 Drops: https://t.co/aZBYyIf7qn "
-
[ Android ] Fingerprint Unlock Security: iOS vs. Google Android (Part II) http://blog.elcomsoft.com/2016/06/fingerprint-unlock-security-ios-vs-google-android-part-ii/
" iOS 和 Android 在指纹解锁安全性方面的对比(Part 2): https://t.co/yDLedeG6h0"
-
[ Attack ] Revealed earlier this month and a Must Read: the architecture of the UK targeted interception system PRESTON: https://theintercept.com/document/2016/06/07/preston-architecture/
" 英国的定向目标拦截系统 Preston 的技术架构 ︰ https://t.co/vYexVmgylK"
-
[ Attack ] Reverse-engineering DUBNIUM’s Flash-targeting exploit https://blogs.technet.microsoft.com/mmpc/2016/06/20/reverse-engineering-dubniums-flash-targeting-exploit/
" DUBNIUM APT 攻击中的 Flash Exploit 逆向分析,来自微软 Blog: https://t.co/emWKGkBO3u"
-
[ Attack ] Misconfigured email servers open the door to spoofed emails from top domains https://blog.detectify.com/2016/06/20/misconfigured-email-servers-open-the-door-to-spoofed-emails-from-top-domains/
" 邮件服务器配置不当,为来自顶级域名的欺诈邮件敞开了大门: https://t.co/SUh5tI2PDr"
-
[ Attack ] Acer to notify customers of online store data breach https://www.grahamcluley.com/2016/06/acer-customer-data-breach/
"宏碁在线购物网站通知用户数据可能发生泄漏: https://t.co/YzwsrmNC1X"
-
[ Attack ] New post: Banking Trojans as a Service—Theft Made Easy in Brazil http://bit.ly/28Jhj4a @ TrendMicro
" 巴西的 '银行木马即服务' 产业链条,来自 TrendMicro Blog: https://t.co/Y8URVTiDLL "
-
[ Browser ] If you want hour(s) more battery life on Windows, use MS Edge https://blogs.windows.com/windowsexperience/2016/06/20/more-battery-with-edge/ (even more than Opera with battery saver enabled)
" 微软对主流浏览器的电量消耗情况作了一个对比,最后得出结论:要想电池寿命长,请用 Edge 浏览器: https://t.co/x3VwY4FaOg "
-
[ Browser ] Small print for TorBrowser high entrp ASLR Selfrando - disable jemalloc & low lvl crypto - https://www.ics.uci.edu/~perl/pets16_selfrando.pdf / http://news.softpedia.com/news/tor-browser-integrates-tool-to-fend-off-deanonymization-exploits-505418.shtml
" Tor 浏览器在保护匿名性方面的防御措施: https://t.co/BtuSaCVRAc https://t.co/2TcqauCPYK"
-
[ Crypto ] Authentication with Hash Chains in C : http://brennan.io/2016/06/19/hashchains-in-c/
" 哈希链式认证过程, IRC 中如何验证自己的身份: https://t.co/dxmAEaBgCN"
-
[ Crypto ] Introduction to GPU Password Cracking : Owning the LinkedIn Password Dump : https://www.trustedsec.com/june-2016/introduction-gpu-password-cracking-owning-linkedin-password-dump/
"利用 GPU 爆破 LinkedIn 的密码哈希︰ https://t.co/8qgE3yyENt"
-
[ Fuzzing ] Fuzzing Rust code with american-fuzzy-lop https://github.com/frewsxcv/afl.rs
" 利用 AFL Fuzz Rust: https://t.co/71GyFwbG2a "
-
[ IoTDevice ] Available for download our presentation slides from @ iottechexpo http://www.slideshare.net/opposingforce/smart-cities-in-the-iot-era #SmartCity #IoT #IoTSecurity #IoTTechExpo
" IoT 时代的智慧城市: https://t.co/SaWd4t2nA1 "
-
[ Linux ] Exploiting Recursion in the Linux Kernel http://googleprojectzero.blogspot.ch/2016/06/exploiting-recursion-in-linux-kernel_20.html #linux #kernel #exploitdev #hacking #infosec https://t.co/ZEtpPxYGZz
" Linux 内核栈溢出递归漏洞的利用(CVE-2016-1583),来自 Project Zero Blog: https://t.co/ttY4LdNkh0 "
-
[ MachineLearning ] MIT Deep Learning Book in PDF format (very good resource) https://github.com/HFTrader/DeepLearningBook
" MIT 关于深度学习的书籍: https://t.co/XoULexSWms"
-
[ Malware ] Public malware techniques used in the wild https://github.com/LordNoteworthy/al-khaser/blob/master/README.md
" al-khaser - 野外恶意软件中常用的一些技术总结(Windows): https://t.co/68ZSlLETRN "
-
[ Malware ] Malware uses Google Talk used to make malicious phone calls https://blog.malwarebytes.com/cybercrime/mobile/2016/06/google-talk-used-to-make-malicious-phone-calls-android-trojan-pawost/
"恶意软件使用 Google Talk 拨打电话: https://t.co/UwMxQQbfWl"
-
[ Obfuscation ] FOPO-PHP-Deobfuscator : A simple script to deobfuscate PHP file obfuscated with FOPO Obfuscator : https://github.com/Antelox/FOPO-PHP-Deobfuscator cc @ Antelox
"FOPO-PHP-Deobfuscator - 用于还原 FOPO 混淆后的 PHP 文件的工具, GitHub Repo︰ https://t.co/rEThF1PjhX "
-
[ OpenSourceProject ] New OpenSSL Bug, CVE-2016-2177 https://bugzilla.redhat.com/show_bug.cgi?id=1341705
" OpenSSL 的一个整数溢出漏洞(CVE-2016-2177),Bugzilla: https://t.co/ESGuoLaO6R"
-
[ Others ] Some details on the new #1 Top500 supercomputer, with China-developed ShenWei RISC CPUs http://www.netlib.org/utk/people/JackDongarra/PAPERS/sunway-report-2016.pdf
" 关于中国申威超级计算机的一份技术报告: https://t.co/E8EGgtmWgY "
-
[ Others ] OWASP Python Security Project http://www.pythonsecurity.org/
" OWASP Python Security Project: https://t.co/eNmAmMezh0 该项目的目的是定制一款安全加固版本的 Python 供安全专家和开发者使用"
-
[ Others ] Beyond #BIOS: #SMM #ResourceMonitoring via #EFI Dev-Kit | @ Intel #WhitePaper https://firmware.intel.com/sites/default/files/resources/A_Tour_Beyond_BIOS_Supporting_SMM_Resource_Monitor_using_the_EFI_Developer_Kit_II.pdf | #DevOps #HPC #UEFI #GameDev #Ai #IoT
" 通过 Intel 的 EFI 开发套件写一个 SMM 资源监控器: https://t.co/S85rSkU6N4 "
-
[ Others ] #KLEE: Symbolic #VM on #LLVM #compiler proto-#Phoenician? @ GitHub https://klee.github.io/ #DevOps #HPC #JVM #Cloud https://t.co/mtFRySGLWY
" KLEE 符号执行虚拟机在 GitHub 上搭建了一个 Blog: https://t.co/Kj5t3FnjcH https://t.co/mtFRySGLWY"
-
[ Others ] I submitted a bunch of tactics to: https://attack.mitre.org/wiki/Main_Page This s a great reference. #DFIR
" 来自 MITRE 的攻击技巧汇总 Wiki 页 ︰ https://t.co/30BdqX2kW4 "
-
[ Popular Software ] Alfresco Activiti RCE http://remoteawesomethoughts.blogspot.gr/2016/06/alfresco-activiti.html
" 企业流程管理软件 Alfresco Activiti 5.20 版本 RCE 漏洞: https://t.co/mkZ5MF92RI"
-
[ Virtualization ] Docker for Mac/Windows is now out! http://docker.com/getdocker #DockerCon
" Docker for Mac/Windows 可以下载了: https://t.co/vXMfjX2Iy5"
-
[ Web Security ] Content Security Policy source expression 'unsafe-dynamic' has been renamed 'strict-dynamic' in the latest draft (https://w3c.github.io/webappsec-csp/#strict-dynamic-usage).
" CSP 安全策略中的 'unsafe-dynamic' 特性更名为 'strict-dynamic': https://t.co/qd7tKrB4if "
-
[ Windows ] Windows Kernel ATMFD.DLL NamedEscape 0x250C pool corruption https://bugs.chromium.org/p/project-zero/issues/detail?id=785#c_ts1466427097
"Windows 内核 ATMFD.DLL NamedEscape 0x250C 内存池破坏漏洞(CVE-2016-3220),来自 Project Zero Issue 785: https://t.co/1XMEBxGdHa"
-
[ Windows ] Windows gdi32.dll heap-based out-of-bounds reads / memory disclosure in multiple DIB-related EMF record handlers https://bugs.chromium.org/p/project-zero/issues/detail?id=757#c_ts1466427071
"Windows gdi32.dll 堆内存越界读信息泄漏漏洞(CVE-2016-3216),漏洞发生在 DIB 相关的 EMF Record Handler,来自 Project Zero Issue 757: https://t.co/JlQZRjNkxo"
-
[ Windows ] In context of recent talks about long path support in Windows. My research from 2010 http://www.icewall.pl/?p=467&lang=en showing evil influence on AVs.
" Windows 的长路径支持情况(2010 年的一篇 Blog),很多人都认为路径最大长度为 260 字符,然而事实并非如此: https://t.co/K5gkfmH9Dd "
-
[ Windows ] If you saw my @ WEareTROOPERS presentation you might have seen this bug, but this shows how to exploit in a sandbox. https://bugs.chromium.org/p/project-zero/issues/detail?id=779
" Windows 自定义字体禁用策略绕过漏洞(CVE-2016-3219),来自 Project Zero Issue 779: https://t.co/j2VzHuly4E"