腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
- 
[ Android ] Frog lets you access the official Android documentation from the command line. Neat ?https://github.com/anupcowkur/frog https://t.co/xGSYAdud7f
" Frog - 命令行格式的 Android 文档查看工具 https://t.co/M1NRcHKufl https://t.co/xGSYAdud7f"
 - 
[ Android ] Android WebView exploit vulnerabilities, limitations and End http://drops.wooyun.org/papers/17610 (Chinese)
" Android WebView 漏洞的利用、局限与终结,来自乌云 Drops: https://t.co/mV50tbSF21"
 - 
[ Fuzzing ] Awesome Fuzzing: A list of fuzzing resources - books, courses, videos, tools, tutorials. https://github.com/secfigo/Awesome-Fuzzing https://t.co/Z1wAe2Oo0n
"Awesome Fuzzing - Fuzz 相关的资料收集整理: https://t.co/uwzs2fmlDv https://t.co/Z1wAe2Oo0n"
 - 
[ Linux ] Linux Security for Beginners : http://www.linuxtopia.org/LinuxSecurity/index.html
" Linux 安全入门︰ https://t.co/pSGWUnC7Dt"
 - 
[ macOS ] OS X 10.11.3 sources released: http://opensource.apple.com/release/os-x-10113/
"OS X 10.11.3 的源码发布︰ https://t.co/cDvOYViH9X"
 - 
[ Malware ] IBM's Lior Keshet dug under the hood of the Goznym banking malware https://securityintelligence.com/two-heads-are-better-than-one-going-under-the-hood-to-analyze-goznym/ https://t.co/E6luZryG4C
"IBM 安全团队对 GozNym 银行木马的分析: https://t.co/jHBFLHYlNE https://t.co/E6luZryG4C "
 - 
[ Malware ] SentinelOne analyses malware dropper written to target European energy company https://sentinelone.com/blogs/sfg-furtims-parent/ https://t.co/JBM6WMxobM
"SentinelOne 对攻击欧洲能源公司的恶意样本的分析,其中用到了两个内核漏洞(CVE-2014-4113、CVE-2015-1701)和一个 UAC Bypass: https://t.co/WDcSLDXZBJ https://t.co/JBM6WMxobM"
 - 
[ Network ] MIT builds an anonymity network https://threatpost.com/mit-anonymity-network-riffle-promises-efficiency-security/119254/ via @ threatpost
" Riffle - MIT(麻省理工学院)构建了一个高效的匿名通信网络: https://t.co/U4Q48YH3FT "
 - 
[ Others ] Toward understanding compiler bugs in GCC and LLVM http://vuminhle.com/pdf/issta16.pdf
"了解 GCC 和 LLVM 编译器的 Bug,Paper: https://t.co/xFUSANa22E "
 - 
[ Pentest ] Creeping on Users with WMI Events: Introducing PowerLurk https://pentestarmoury.com/2016/07/13/151/
" PowerLurk - WMI 事件处理方面的一个 PowerShell 扩展库: https://t.co/FLfLc8btGE"
 - 
[ Popular Software ] ZDI-16-420: Adobe Reader DC FlateDecode Use-After-Free Remote Code Execution Vulnerability http://www.zerodayinitiative.com/advisories/ZDI-16-420/
"ZDI-16-420: Adobe Reader DC FlateDecode UAF 漏洞,来自 ZDI 的公告: https://t.co/fkDmMzlMMc"
 - 
[ Popular Software ] ZDI-16-422: Adobe Reader DC XSLT value-of Out-Of-Bounds Write Remote Code Execution Vulnerability http://www.zerodayinitiative.com/advisories/ZDI-16-422/
" ZDI-16-422: Adobe Reader DC XSLT value-of 越界写漏洞,来自 ZDI 的公告: https://t.co/ngWbaS1FCW "
 - 
[ Popular Software ] ZDI-16-425: Adobe Flash PrintJob printAsBitmap Use-After-Free Remote Code Execution Vulnerability http://www.zerodayinitiative.com/advisories/ZDI-16-425/
"ZDI-16-425: Adobe Flash PrintJob printAsBitmap UAF 漏洞,来自 ZDI 的公告: https://t.co/uSqLpdhtWU"
 - 
[ Popular Software ] ZDI-16-427: Adobe Flash AdBreakPlacement Type Confusion Remote Code Execution Vulnerability http://www.zerodayinitiative.com/advisories/ZDI-16-427/
"ZDI-16-427: Adobe Flash AdBreakPlacement 类型混淆 RCE,来自 ZDI 的公告: https://t.co/D7P6lmwxPh"
 - 
[ Popular Software ] ZDI-16-428: Adobe Flash DeleteRangeTimelineOperation Type Confusion Remote Code Execution Vulnerability http://www.zerodayinitiative.com/advisories/ZDI-16-428/
"ZDI-16-428: Adobe Flash DeleteRangeTimelineOperation 类型混淆 RCE,来自 ZDI 的公告: https://t.co/O3APxJFYfB"
 - 
[ Popular Software ] Microsoft Finally Releases New Skype App For Linux : https://community.skype.com/t5/Linux/Skype-for-Linux-Alpha-and-calling-on-Chrome-amp-Chromebooks/td-p/4434299 (Am I still day dreaming ? Somebody pinch me)
" 微软发布了 Skype Linux 版本的客户端: https://t.co/g9hAsiawlM "
 - 
[ Tools ] 1st release of MyHTML, a fast HTML parser in pure C99, optional threads, no dependencies https://github.com/lexborisov/myhtml/releases/tag/v1.0.1 ru: http://www.opennet.ru/opennews/art.shtml?num=44782
" MyHTML - 一个纯 C 写的 HTML Parser,没有任何外部库依赖: https://t.co/fEbbH0VnZL https://t.co/nAMDo5leBx"
 - 
[ Tools ] Let's Play a Game – find bugs in popular open-source projects : https://software.intel.com/en-us/blogs/2015/04/24/lets-play-a-game-find-bugs-in-popular-open-source-projects
" 在开源项目中找漏洞(通过 PVS-Studio 静态分析工具)︰ https://t.co/hGHviokc9q"
 - 
[ Tools ] We recently released quite a few updates for the Firing Range [https://github.com/google/firing-range/] courtesy of @ quanyang. URL based DOM XSS, mostly.
" Google 开源了一个称为 Firing Range 的工具,可以用来测试 Web 应用安全扫描器: https://t.co/hVsNWVA5Vx "
 - 
[ Virtualization ] RT @ justinvincent: Kum – a lightweight hypervisor for Windows (eptp vmfunc+idt shadow) http://bit.ly/29YFvlz
" Kum - 一个非常轻量级的 Windows x64 Hypervisor,C 语言编写: https://t.co/6OrUrRndTu"
 - 
[ Web Security ] PrincesOfPaypal A security write-up about the Paypal API & data leakage https://github.com/d3f4ultt/PrincesOfPaypal
"PrincesOfPaypal - 从安全的角度看 Paypal API: https://t.co/ZQUk8JuOuB"
 - 
[ Web Security ] Drupal contrib - Highly Critical - Remote code execution PSA-2016-001 https://www.drupal.org/psa-2016-001
"Drupal contrib 远程代码执行漏洞(高危): https://t.co/igCv83q6pJ 还有一个 REST 服务的高危漏洞: https://threatpost.com/drupal-patches-remote-code-execution-vulnerabilities-in-three-modules/119270/ "
 - 
[ Windows ] https://blogs.msdn.microsoft.com/cenet/2008/01/08/the-history-of-the-dcom-remoting-addon-pack/ I wonder what would be the reaction if Windows Mobile devices was crashing due to Blaster.
" Windows DCOM Remoting Addon Pack 的历史: https://t.co/P8kIu1m3N6 "