腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Attack ] How the Iranian Government Hacks Dissidents https://www.schneier.com/blog/archives/2016/08/how_the_iranian.html
" Group5 - 伊朗对叙利亚反对派的黑客攻击行动,来自 CitizenLab 的分析报告: https://citizenlab.org/2016/08/group5-syria/"
-
[ Attack ] Russian APTs Prefer #Windows, Office, Internet Explorer Exploits http://buff.ly/2aZ3EIb #cyberespionage #microsoft https://t.co/4lc3j5bcIG
" 俄罗斯在近 4 年的 APT 攻击中一共使用了 33 个漏洞,俄罗斯 APT 攻击者的'武器库'调查: https://t.co/4lc3j5bcIG"
-
[ Browser ] IE local path disclosure vulnerability using sandbox iframes resolved in #MS16095 #CVE20163321 https://www.securify.nl/advisory/SFY20160301/internet_explorer_iframe_sandbox_local_file_name_disclosure_vulnerability.html
"IE HTML5 Sandbox iframe 本地文件可被探测漏洞(file://)(CVE-2016-3321,MS16-095): https://t.co/e8jUhIOyuX"
-
[ Browser ] ZDI-16-454: Microsoft Internet Explorer CAnchor Use-After-Free Remote Code Execution Vulnerability http://www.zerodayinitiative.com/advisories/ZDI-16-454/
"ZDI-16-454 IE 浏览器 CAnchor UAF RCE 漏洞,来自 ZDI 公告: https://t.co/XIo6sS0Kxq"
-
[ Crypto ] Now at #WOOT16: “Acceleration Attacks on PBKDF2: Or, What Is inside the Black-Box of oclHashcat?” https://www.usenix.org/conference/woot16/workshop-program/presentation/ruddick
" 针对 PBKDF2 加密算法的加速攻击: https://t.co/SIhJmlOMQT"
-
[ Debug ] Disable Single Step Debug in Windbg https://drive.google.com/file/d/0B1S_tnrAkUvsTnJuVVRDNmIzTDQ/view?pref=2&pli=1
" 通过 32/64 位模式切换的方法,禁用 Windbg 的单步调试: https://t.co/wicP3i0zZp "
-
[ Firmware ] Basic Input/Output: The Binwalk Firmware Analysis Tool http://www.basicinputoutput.com/2016/08/the-binwalk-firmware-analysis-tool.html#.V6n0LpMYFP4.twitter @ devttyS0
" Binwalk 固件分析工具使用方法介绍: https://t.co/YAZVEchycb "
-
[ macOS ] mahalo @ defcon for incredible time :) posted my slides: "I got 99 Problems, but Little Snitch ain’t one!" https://speakerdeck.com/patrickwardle/defcon-2016-i-got-99-problems-but-little-snitch-aint-one #defcon24
" OS X 系统个人防火墙 Little Snitch 的安全性分析: https://t.co/g8oopnRM1I 前两周推送过一篇相关的 Blog: https://sentinelone.com/blogs/shut-snitch-reverse-engineering-exploiting-critical-little-snitch-vulnerability-reverse-engineering-mac-os-x/ "
-
[ Malware ] Cracking Orcus RAT http://blog.deniable.org/blog/2016/08/09/cracking-orcus-rat/
" Orcus 远控木马分析: https://t.co/3UtZiwgPY7"
-
[ Malware ] Banload Trojan Targets Brazilians With Malware Downloads https://blogs.mcafee.com/mcafee-labs/banload-trojan-targets-brazilians-with-malware-downloads/
" McAfee blog 对 Banload 木马的分析: https://t.co/W7d0H8gSxG"
-
[ OpenSourceProject ] GNU Bash 4.3 Out of bounds http://www.openwall.com/lists/oss-security/2016/08/05/2 #infosec #linux #kernel #bash
"GNU Bash 4.3 在解析 Shell 时存在越界访问漏洞: https://t.co/vSwtJzrr1l "
-
[ Others ] Exodus announces new acquisition program for both Zero-Day and N-Day vulnerabilities https://blog.exodusintel.com/2016/08/09/exodus-announces-new-acquisition-program-for-both-zero-day-and-n-day-vulnerabilities/
" '军火商' Exodus 启动了一项新的 0-Day 和 N-Day 漏洞收购计划: https://t.co/jIQEc3CMUY "
-
[ Others ] An Introduction to Use After Free Vulnerabilities https://www.purehacking.com/blog/lloyd-simon/an-introduction-to-use-after-free-vulnerabilities
" 以 IE MS14-035 为实例介绍 UAF 漏洞: https://t.co/WGW3mAVJz9"
-
[ Pentest ] Here is the tool @ NotMedic and I released at @ DEFCON. Scans for accessibility tools backdoors on Windows. https://github.com/linuz/Sticky-Keys-Slayer
" 基于远程桌面(RDP)访问的方式,在 Windows 远程登录窗口以发送按键的方式建立后门: https://t.co/wXzM9WqX7B 作者在 DefCon 会议的演讲: http://www.slideshare.net/DennisMaldonado5/sticky-keys-to-the-kingdom "
-
[ Popular Software ] You get a break: No @ adobe #Flash Player security update for August. https://threatpost.com/a-month-without-adobe-flash-player-patches/119770/
" Adobe 也发布了补丁更新,不过本月没有 Flash Player 的补丁,只有 Experience Manager 的 4 个漏洞: https://t.co/7CIxfFZAu3 https://helpx.adobe.com/security/products/experience-manager/apsb16-27.html "
-
[ Tools ] The Witchcraft Compiler Collection source code as seen at @ defcon is on github (MIT License): https://github.com/endrazine/wcc #ReverseEngineering
" 逆向工程相关的 Witchcraft 编译器套件︰ https://t.co/zaGPonVN1d 这个套件一共 3 个工具,包括链接器、编译器和动态加载器"
-
[ Windows ] Microsoft GDI+ out-of-bounds reads in DIB palette handling in ValidateBitmapInfo https://code.google.com/p/google-security-research/issues/detail?id=829
" Microsoft GDI+ out-of-bounds reads in DIB palette handling in ValidateBitmapInfo,来自 Project Zero Issue 829: https://t.co/oBKebd8FnK "
-
[ Windows ] Microsoft Security Bulletin Summary for August 2016 https://technet.microsoft.com/library/security/ms16-aug
" 微软发布 8 月份补丁公告: https://t.co/7QEm3DSEpM 本次共有 9 个补丁,其中 5 个为严重级别。漏洞发现者信息: https://technet.microsoft.com/library/security/mt674627.aspx "
-
[ Windows ] New advisory and POC for MS16-099 at https://smsecurity.net/microsoft-office-word-out-of-bounds-read-remote-code-execution-cve-2016-3313/, https://cosig.gouv.qc.ca/en/cosig-2016-31-en/
" MS Office Word 越界读 RCE PoC(MS16-099,CVE-2016-3313): https://t.co/r0Xg4cCJ0t https://t.co/23kbp96Vjf"
-
[ Windows ] [local] - Microsoft Windows Group Policy - Privilege Escalation (MS16-072) https://www.exploit-db.com/exploits/40219/
" Windows 组策略提权 Exploit 思路(MS16-072): https://t.co/rHhjuUOVze 作者还分享过一个关于这个漏洞的 PPT: http://www.slideshare.net/NabeelAhmed7/from-zero-to-system-on-full-disk-encrypted-windows-system "
-
[ Windows ] Virtual machines based Windows 10 Enterprise Evaluation, Version 1607 for Windows developers https://developer.microsoft.com/en-us/windows/downloads/virtual-machines https://t.co/Fq7s1XexLq
" Windows 10 开发环境虚拟机下载: https://t.co/W80bGBy0nM "
-
[ Windows ] ZDI-16-449: Microsoft Windows win32k RGNOBJ Integer Overflow Privilege Escalation Vulnerability http://www.zerodayinitiative.com/advisories/ZDI-16-449/
"ZDI-16-449: Microsoft Windows win32k RGNOBJ 整数溢出提权漏洞,来自 ZDI 公告: https://t.co/KuSLIpTOkw"
-
[ Windows ] ZDI-16-451: Microsoft Office Word RTF JPEG Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability http://www.zerodayinitiative.com/advisories/ZDI-16-451/
"ZDI-16-451: Microsoft Office Word RTF JPEG 格式解析越界写漏洞,来自 ZDI 公告: https://t.co/QHvSbLmcyG"
-
[ Windows ] ZDI-16-453: Microsoft Windows xxxInsertMenuItem Out-Of-Bounds Access Privilege Escalation Vulnerability http://www.zerodayinitiative.com/advisories/ZDI-16-453/
"ZDI-16-453 Microsoft Windows xxxInsertMenuItem 越界访问提权漏洞,来自 ZDI 公告: https://t.co/Cf0Jy7hU6R"