腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Android ] If you're curious about my keynote at #WOOT16, check out the slides here: https://www.usenix.org/conference/woot16/workshop-program/presentation/drake
" Joshua J. Drake 在 WOOT16 会议关于 Stagefright 漏洞利用的演讲︰ https://t.co/kEkcoXkUGR"
-
[ Attack ] Dota 2 forum breach leaks 2 million user accounts http://www.zdnet.com/article/dota-2-players-targeted-by-forum-hackers-in-new-breach/#ftag=RSSbaffb68
"Dota 2 论坛 200 万用户信息泄漏: https://t.co/BoEJhkHQ52"
-
[ Attack ] MONSOON - Analysis Of An APT Campaign https://shar.es/1ZIxgp via @ Forcepointsec
" 针对中国和南亚国家的 '季风' APT 攻击行动: https://t.co/TTGmn134GL "
-
[ Attack ] 摩诃草APT组织大揭秘 by 360 https://ti.360.com/upload/report/file/mkczzbg1.pdf
"摩诃草 APT 组织大揭秘,来自 360 天眼实验室: https://t.co/RKkhKKQ61b"
-
[ Browser ] Both reported to secure@ microsoft.com Edge XSS Filter bypass: http://www.cracking.com.ar/bugs/2016-07-14/ Address Bar spoof: http://www.cracking.com.ar/bugs/ms/spoofy.html
" Edge 浏览器的两个漏洞, XSS Filter Bypass︰ https://t.co/9QgBylu1tB 地址栏欺骗︰ https://t.co/25SJ1KuMGM"
-
[ Debug ] How does gdb work? http://jvns.ca/blog/2016/08/10/how-does-gdb-work/
" GDB 调试器是如何工作的: https://t.co/JFvzX84GaL GDB 的各种使用案例: http://www.brendangregg.com/blog/2016-08-09/gdb-example-ncurses.html "
-
[ Fuzzing ] Fuzz Windows Kernel via Javascript (the english version in github) https://github.com/tinysec/public/blob/master/FuzzWindowsKernelViaJavascript/en.md
"通过 Javascript Fuzz Windows 内核: https://github.com/tinysec/public/blob/master/FuzzWindowsKernelViaJavascript/zh.md 昨天作者 TinySec 还发了几张截图介绍 jsfuzzer: http://weibo.com/1997240523/E2W0ZmsOH "
-
[ Hardware ] #usenix2016 Flip Feng Shui: Breaking VM isolation w #Rowhammer + mem dedup [get eg RSA keys] https://www.vusec.net/projects/flip-feng-shui/ https://t.co/hpk5VW7zrD
" 利用 RowHammer Flip Feng Shui(位反转风水)突破虚拟机隔离: https://t.co/12jXtgOlYS "
-
[ Network ] Ths is huge (mostly Linux affectd): Off-Path TCP Exploits: Global Rate Limit Cons. Dangerous http://www.cs.ucr.edu/~zhiyunq/pub/sec16_TCP_pure_offpath.pdf https://t.co/4NmTHozgEs
" 基于 TCP 序列号预测的流量劫持攻击,Paper: https://t.co/hK90TH0unI "
-
[ Network ] Toxic Proxies @ defcon slides https://speakerdeck.com/noxrnet/toxic-proxies-bypassing-https-and-vpns-to-pwn-your-online-identity, demo video https://www.youtube.com/watch?v=z1XOCYV9jMQ and source code https://github.com/ctxis/pac-leak-demo released
" 利用恶意的 PAC 代理文件绕过 HTTPS 和 VPN,来自 Context 团队研究员在 DefCon 会议的演讲: https://t.co/R8y4XchDTh 演示视频: https://t.co/zk72l6pPIG 示例代码: https://t.co/uzK3QrKhdY "
-
[ NetworkDevice ] Juniper provides hotfixes for IPv6 DDoS flaw. https://threatpost.com/juniper-hotfixes-shut-down-ipv6-ddos-vulnerability/119812/
" Juniper 刚刚修复了一个 IPv6 DDoS 漏洞: https://t.co/kOQvN1uur9"
-
[ OpenSourceProject ] Analysis of PHP's CVE-2016-6289 and CVE-2016-6297 http://blog.fortinet.com/2016/08/10/analysis-of-php-s-cve-2016-6289-and-cve-2016-6297
"PHP 内核(CVE-2016-6289)和 PHP ZIP(CVE-2016-6297)的两个漏洞分析,来自 Fortinet Blog: https://t.co/xr7Zq0v2rO "
-
[ OpenSourceProject ] php 5.6.24 one liner fixed null pointer memory access https://marcograss.github.io/bug/2016/08/10/php-5-nptr.html
" PHP 5.6.24 的一个空指针引用 Bug,这个触发的 PoC 可以看看: https://t.co/P7eb6KIroB"
-
[ Operating System ] Writing a Simple Operating System from Scratch (PDF) https://www.cs.bham.ac.uk/~exr/lectures/opsys/10_11/lectures/os-dev.pdf
" 从零开始写一个简单的操作系统: https://t.co/H6ckwin4cJ"
-
[ Others ] BSODomizer HD: A mischievous FPGA and HDMI platform for the (m)asses (#defcon2016 w/ Zoz) materials are up: http://bsodomizer.com/hd/
" BSODomizer - 显示器与主机之间的中间人劫持设备,可以伪造一个蓝屏界面给用户看︰ https://t.co/W8YV4nUBb3"
-
[ Others ] Two of our papers presented tomorrow at Usenix: - Cache attacks on ARM https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/lipp - DRAM side channels https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/pessl
" ARMageddon - 跨 ARM CPU 核的的缓存边信道攻击,Paper: https://t.co/1ckGln5DDp 攻击 DRAM 的寻址过程,Paper: https://t.co/dbVwKMnsgP"
-
[ Others ] Super proud too :) Paper here: https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/melicher https://twitter.com/lujobauer/status/763401182798753793
" 利用神经网络为密码可猜测性建模,Paper︰ https://t.co/KJsExuOuIW "
-
[ Others ] .@ eric_conrad talks about the SSH timing bug and releases a tool to extract usernames. http://www.sans.org/u/k4X https://github.com/eric-conrad/enumer8
" 利用 OpenSSH 的 CVE-2016-6210 漏洞枚举用户名的脚本: https://t.co/oN1421MXKo"
-
[ Others ] Unmasking SSH behind hidden services (.onion) with OSINT and their clearnet fingerprint http://www.automatingosint.com/blog/2016/08/dark-web-osint-with-python-part-two-ssh-keys-and-shodan/ #Tor #onion #privacy #opsec
" 发现(洋葱网络)隐藏服务中的 SSH: https://t.co/SZlAcFoOnk "
-
[ Popular Software ] [CVE-2016-XXXX] Foxit PDF reader memory corruption - https://marcograss.github.io/security/bug/cve/2016/08/08/foxit-pdf-reader.html
" 科恩实验室 marcograss 发现的一个福昕 PDF 阅读器的内存破坏漏洞 PoC: https://t.co/w68PJP2PGJ"
-
[ Tools ] A a very cool-looking tool that creates vulnerable VMs for education. Vulns are configurable and randomized. https://github.com/cliffe/secgen #ASE16
" SecGen - 随机生成存在漏洞的虚拟机的工具,主要是教学使用: https://t.co/DnRdvoiFxN"
-
[ Windows ] Congrats to @ ea_foundation for his MS Edge PDF RCE bulletins MS16-096 and MS16-102 CVE-2016-3319 http://blog.talosintel.com/2016/08/ms-pdf-vulnerability.html?m=1 @ TalosSecurity
" Talos 团队发现的一个 Windows PDF Parsing API 相关的越界写漏洞(CVE-2016-3319): https://t.co/HQbHTgYbax 详细的漏洞技术细节: http://www.talosintelligence.com/reports/TALOS-2016-0170/ "
-
[ Windows ] Microsoft removing Journal component from Windows because it is “susceptible to many security exploits”. https://support.microsoft.com/en-us/kb/3161102
" 由于 Windows Journal(记事本应用)出现了很多漏洞,微软决定移除该组件: https://t.co/fp0eqKXza3"