腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Android ] The exploit for CVE-2016-2434 https://github.com/jianqiangzhao/CVE-2016-2434 Google has released the patch.
" Nexus9 NVIDIA 视频驱动的提权漏洞 PoC(CVE-2016-2434): https://t.co/xqRyZnD099 "
-
[ Attack ] New #EMEA Report: How orgs in EMEA discover breaches & how they respond http://bddy.me/29tzq07 #infosec https://t.co/PbiP17I8kA
" 从 2015 年多起数据泄漏事件中学到的经验教训,来自 FireEye 的报告: https://t.co/4mH01SLQXU https://t.co/PbiP17I8kA"
-
[ Browser ] Mozilla publishes their next-generation HTML rendering engine, built in their own secure programming language http://www.theregister.co.uk/2016/07/04/mozilla_servo_nightly_builds/
"Mozilla 发布了它的下一代 HTML 渲染引擎 Servo,来自 The Register 的报道: https://t.co/im9ss1VFWC"
-
[ Browser ] Apple Safari for Mac OS X SVG local XXE https://www.wearesegment.com/research/Apple-Safari-for-Mac-OS-X-SVG-local-XXE
" Safari SVG 本地 XXE 漏洞: https://t.co/vXlHTNtJRR "
-
[ Fuzzing ] Peach Fuzz - Vulnerability Scanning Framework -- http://www.kitploit.com/2016/07/peach-fuzz-vulnerability-scanning.html
" Peach Fuzz 框架: https://t.co/nj7MjIptfk"
-
[ Hardware ] House intercoms: When frontdoors become backdoors http://www.synacktiv.ninja/ressources/NDH-Intercoms_presentation_Dudek.pdf
" 家用对讲机 - 当前门变成后门: https://t.co/WP95ciICj9"
-
[ IoTDevice ] ZigBee security review of a famous French set-top box https://speakerdeck.com/rlifchitz/zigbee-security-review-of-a-famous-french-set-top-box
" 针对一款法国著名机顶盒的 ZigBee 协议安全性分析: https://t.co/8ay5r0BxYu "
-
[ Linux ] Bugtraq: [CVE-2016-6136] Double-Fetch Vulnerability in Linux-4.6/kernel/auditsc.c http://www.securityfocus.com/archive/1/538835
" Linux-4.6/kernel/auditsc.c 中的一个 Double Fetch 漏洞(CVE-2016-6136): https://t.co/FKYBKe2JAg"
-
[ macOS ] New Mac OS Backdoor, Eleanor: https://labs.bitdefender.com/wp-content/uploads/2016/07/Backdoor-MAC-Eleanor_final.pdf remote access, webcam images, files... You know the drill. https://t.co/qwnWRn2HcL
" Mac OS X 系统的一款新后门恶意软件 Eleanor,会让攻击者完全控制系统 ︰ https://t.co/7ROaxeQ9I7 研究员 Claud Xiao 表示,该后门软件是通过 hxxp://MacUpdate.com 传播的 "
-
[ Mitigation ] A Control-Flow Integrity: Precision, Security, and Performance http://arxiv.org/pdf/1602.04056.pdf
" CFI(控制流完整性)的精确度、安全性和性能研究 Paper: https://t.co/yTElenbARQ"
-
[ Network ] Sweet maps show how connected chunks of the dark web really are, sharing SSH keys etc https://motherboard.vice.com/read/these-maps-show-what-the-dark-web-looks-like https://t.co/02uw19cT9F
" 一张图告诉你 Dark Web 长什么样: https://t.co/RT85h0TO5C https://t.co/02uw19cT9F"
-
[ NetworkDevice ] TP-LINK lost control of two domains used to configure its devices https://www.helpnetsecurity.com/2016/07/05/tp-link-config-domains/ via @ hardillb https://t.co/TfkxLsUq6n
" tplinklogin.net 域名不再被 TP-LINK 拥有,通过这个域名是可以配置 TP-LINK 路由器的: https://t.co/nNzM8UhbuU 除了这个域名,还有 tplinkextender.net 也不再属于 TP-LINK 公司"
-
[ Obfuscation ] 13 Awesome Deobfuscation Tools For Reverse Engineers : https://hackerlists.com/deobfuscation-tools/
" 13 个不错的代码反混淆工具︰ https://t.co/fN1yMmLDnA"
-
[ Obfuscation ] Exploiting Dynamic Scheduling for VM-Based Code Obfuscation : http://www.lancaster.ac.uk/staff/wangz3/publications/trustcom.pdf (pdf) https://t.co/iYi5WQ7lpg
" 基于虚拟机的代码混淆技术,可以对抗攻击者对虚拟机动态调度机制的攻击︰ https://t.co/U20T5AKPlT https://t.co/iYi5WQ7lpg"
-
[ Others ] Uploaded my slidedeck from #HIP16, thank you all and c u next year! http://www.slideshare.net/moshez/abusing-the-train-communication-network-or-what-could-have-derailed-the-northeast-regional-188 @ bsidestlv @ hackinparis @ Garin_Pace @ ArtByAlida
" 滥用列车的通信网络: https://t.co/j4E1m8kiSH "
-
[ Others ] Building a BitTorrent client from scratch in C# : https://cheatdeath.github.io/research-bittorrent-doc/
" 用 C# 从头写一个 BT 下载客户端︰ https://t.co/yjHA6DR5j5"
-
[ Others ] if you happen to need examples of compilers crashing to support a research project, this repo is for you: https://github.com/regehr/compiler-crashes
" 可以让 gcc 和 clang 编译器 Crash 的 60 个 PoC︰ https://t.co/bwoglYe7RG"
-
[ Others ] BINSEC - A Dynamic Symbolic Execution Toolkit for Binary-Level.Based on PIN. http://binsec.gforge.inria.fr/
"BINSEC - 基于 PIN 的一个二进制符号执行框架: https://t.co/gZz1UNsUyg"
-
[ Pentest ] Final part of the blog series: Execution and the People Factor. Using human flaws in network red teaming. http://www.sixdub.net/?p=714 #blogspam
" 渗透测试中的人为因素: https://t.co/Sez7xObqph"
-
[ Tools ] I wrote a tool to enable 2-factor confirmation of USB devices. It uses DUO auth API and you can customize actions: https://github.com/uber/usb2fac
" usb2fac - 为新插入的 USB 设备提供两步验证的工具︰ https://t.co/jMTpjib1F0"
-
[ Web Security ] Slides of my conference on Single Sign On, including lyrics of "Imagine SSOng" http://fr.slideshare.net/coudot/the-wonderful-story-of-web-authentication-and-singlesign-on #rmllsec16 https://t.co/P6M7wKzJA3
" Web 认证与单点登录的精彩故事: https://t.co/ADQsY4C3G4 https://t.co/P6M7wKzJA3 "
-
[ Web Security ] CSRF Worms https://c0nradsc0rner.wordpress.com/2016/07/04/csrf-worm/
" Twitter CSRF 蠕虫攻击: https://t.co/SnhcA6Pwjn"
-
[ Windows ] Windows 10 x86/wow64 Userland heap https://www.corelan.be/index.php/2016/07/05/windows-10-x86wow64-userland-heap/
" Windows 10 x86/wow64 Userland heap,来自 Corelan Team: https://t.co/DJGy0tj208"
-
[ Windows ] pushed my thesis documentation about understanding the ndis 6 stack to my github: https://github.com/d3sre/Understanding_the_NDIS_6_stack
" 逆向 Windows 内核网络协议栈 NDIS 6 的实现︰ https://t.co/YjdagzruKg"