
腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Attack ] The OurMine group also hacked the Google CEO Sundar Pichai’s Quora account http://securityaffairs.co/wordpress/48784/hacking/ourmine-group-hacked-google-ceo.html
"OurMine 组织在黑完扎克伯格之后,又黑掉了 Google CEO Sundar Pichai 的 Quora 帐户: https://t.co/vY5JkLfLZS"
-
[ Attack ] Brazilian Telecom Giant “Oi” Websites Hacked https://www.hackread.com/brazilian-telecom-giant-oi-websites-hacked/
"巴西电信巨头 Oi 网站被黑: https://t.co/dwjClEs6bz"
-
[ Browser ] I wrote up everything I know (and was able to learn) about the script tag -> https://eager.io/blog/everything-I-know-about-the-script-tag/
" 关于 HTML Script 标签,我所了解的: https://t.co/uxo5ZPTPCu"
-
[ Debug ] Some interesting papers I didn't know on Heap viz work for debugging: http://research.microsoft.com/en-us/um/people/marron/selectpubs/HeapDebug.pdf / http://www.cs.tufts.edu/research/redline/papers/heapviz-softvis-2010.pdf
" 关于堆调试和可视化的两篇 Paper︰ https://t.co/MeOgPXONZe https://t.co/RT7rZawdTa"
-
[ Detect ] malspider : A web spidering framework that detects characteristics of web compromises : https://github.com/ciscocsirt/malspider
"malspider - 一个用于检测网站是否被黑的 Web 爬虫框架︰ https://t.co/Fl7zi0pZYD"
-
[ Fuzzing ] Run AFL on Everything! AFL + QEMU + Linux = CVEs https://www.nccgroup.trust/us/about-us/newsroom-and-events/blog/2016/june/project-triforce-run-afl-on-everything/
" TriforceAFL - Run AFL on Everything,基于 Qemu、支持全系统模拟的 Fuzz,来自 NCC Group: https://t.co/ICcRStS7oi"
-
[ Fuzzing ] Escaping the Fuzz: Evaluating Fuzzing Techniques and How to Fool them with Anti-Fuzzing https://upload.edholmarna.se/master_thesis-first-draft.pdf
" Escaping the Fuzz - Fuzz 技术评估与对抗(Anti-Fuzzing),Paper: https://t.co/uIoDYQFGeC 关于 Anti-Fuzzing,还有一篇 NCC Group 2014 年的文章: https://www.nccgroup.trust/uk/about-us/newsroom-and-events/blogs/2014/january/introduction-to-anti-fuzzing-a-defence-in-depth-aid/ "
-
[ macOS ] A ZFS developer’s analysis of the good and bad in Apple’s new APFS file system http://arstechnica.com/apple/2016/06/a-zfs-developers-analysis-of-the-good-and-bad-in-apples-new-apfs-file-system/
" ZFS 开发者对 Apple 新文件系统 - APFS 的分析,来自 ArsTechnica 的报道: https://t.co/dpmyJxFU2W"
-
[ Malware ] Locky Returned With A New Anti-VM Trick: After the recent outage of the Necurs botnet, the Locky developers have… http://j.mp/293fvoN
" Locky 勒索软件最新的反虚拟机的技巧,来自 ForcePoint Blog: https://t.co/A2XdD6YBL8"
-
[ Network ] ZigBee packet capture http://goo.gl/P8xST2
"ZBAnalyzer - ZigBee 数据包分析工具: https://t.co/xwMVmcAflS"
-
[ Network ] Using Shannon's Entropy, Machine Learning, & Bayesian Networks to discover, describe, & visualize IPv6 addresses http://entropy-ip.com/
" Entropy/IP - 利用香农熵、机器学习与贝叶斯网络发现、描述和可视化 IPv6 地址结构: https://t.co/aBeRN7LX2y"
-
[ OpenSourceProject ] Undefined Pointer Arithmetic - OpenSSL Blog https://www.openssl.org/blog/blog/2016/06/27/undefined-pointer-arithmetic/
" OpenSSL 的指针运算编码风格: https://t.co/FdDAfQyUPl 前两周就有个漏洞属于这种风格(CVE-2016-2177)"
-
[ Others ] @ jgrusko PIN 3.0 & VS 2015 : http://holycall.tistory.com/311
" 在 VS 2015 中编译 Intel PIN 3.0 ︰ https://t.co/43fRJcni4t"
-
[ Others ] New NCC Group blog post: It only takes one typo in the software supply chain to compromise security https://www.nccgroup.trust/uk/about-us/newsroom-and-events/blogs/2016/june/it-only-takes-one-typo-in-the-software-supply-chain-to-compromise-security/
" 安全是一个链条,攻破安全防护有时只需要一个错别字,来自 NCC Group: https://t.co/7guRE7CIiM"
-
[ Others ] Reflections on Vulnerability Disclosure (2015): https://www.ernw.de/download/ERNW_Newsletter_50_Vulnerability_Disclosure_Reflections_CaseStudy.pdf [PDF]
" 关于漏洞披露的思考︰ https://t.co/MFRtEXkgid "
-
[ Pentest ] PowerShell Empire Docker Build : http://www.attactics.org/2016/06/powershell-empire-docker-build.html cc @ harmj0y
" PowerShell Empire 攻击套件的 Docker 镜像︰ https://t.co/IvpP2DtQMD "
-
[ Pentest ] Next post in the #EmPyre series: Engaging Active Directory. http://www.rvrsh3ll.net/blog/empyre/empyre-engaging-active-directory/
" 利用 EmPyre 攻击框架枚举 Active Directory 服务: https://t.co/1dT6HabmvA"
-
[ Programming ] Learn C# online, launched as part of the new .NET Core 1.0 release: https://www.microsoft.com/net/tutorials/csharp/getting-started
" 在线学习 C# 编程语言︰ https://t.co/6ZxmvztrLa"
-
[ SecurityProduct ] Aramadito remote arbitrary file write in case of MiTM http://goo.gl/fb/gdEOCs #FullDisclosure
" 开源反病毒软件 Aramadito 在中间人劫持情况下可以实现任意文件写,来自 FullDisclosure 的公告: https://t.co/oDZ6rflMRu "
-
[ SecurityProduct ] Panda Security Privilege Escalation http://seclists.org/fulldisclosure/2016/Jun/67
" Panda 杀毒软件自身的 SYSTEM 特权提升漏洞: https://t.co/5SSxtnjQqH"
-
[ Tools ] DumpFunctionBytes.py - IDA Python script that dumps the current function as a shellcode. https://github.com/agustingianni/Utilities#dumpfunctionbytespy
"DumpFunctionBytes.py - 将 IDA 窗口当前函数 Dump 成 Shellcode: https://t.co/4jm08UnHFH"
-
[ Tools ] armemu.py - ARM Assembly, Emulation, Disassembly using Keystone, Unicorn, and Capstone https://gist.github.com/mattypiper/d4d90bc5b8fb9a56fa2d4f2383a2eda7
"armemu.py - 基于 Keystone、Unicorn、Capstone 三大引擎,为 ARM 平台提供汇编、反汇编、模拟执行功能的示例代码: https://t.co/07TN4IdYE0"
-
[ Tools ] So, today I released my old tool to recover deleted information from sqlite databases: https://github.com/aramosf/recoversqlite/ #DFIR
" recoversqlite - 数据恢复工具,从 Sqlite 数据库文件还原已删除的信息︰ https://t.co/ZLr3SiTTHf "
-
[ Windows ] Windows 10 UAC bypass with custom Meterpreter payloads https://astr0baby.wordpress.com/2016/06/26/windows-10-uac-bypass-with-custom-meterpreter-payloads/
" 定制 Meterpreter Payloads,绕过 Windows 10 UAC 的保护: https://t.co/Abyoz3w4ar"
-
[ Windows ] Project Zero: A year of Windows kernel font fuzzing #1: the results http://googleprojectzero.blogspot.com/2016/06/a-year-of-windows-kernel-font-fuzzing-1_27.html
" Windows 内核字体 Fuzz 这一年的成果,来自 Project Zero Blog: https://t.co/0P0Ip9nyKr"