腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Android ] Disclosure of CVE-2016-3842,Use-after-free vulnerability in Qualcomm MSM GPU driver http://retme.net/index.php/2016/08/11/cve-2016-3842.html
" 高通 MSM GPU 驱动的一个 UAF 漏洞(CVE-2016-3842): https://t.co/uVcyS1BLxk"
-
[ Attack ] NetTraveler side-loads using Symantec EXE, hijacks legit services for #persistence. http://researchcenter.paloaltonetworks.com/2016/01/nettraveler-spear-phishing-email-targets-diplomat-of-uzbekistan/ #DFIR https://t.co/suQ3y0VaaC
"NetTraveler 钓鱼邮件攻击乌兹别克斯坦外交官员: https://t.co/xDDbZG9oR2 "
-
[ Browser ] Microsoft Internet Explorer: Read AV in MSHTML!CMultiReadStreamLifetimeManager::ReleaseThreadStateInternal https://code.google.com/p/google-security-research/issues/detail?id=827
" IE 浏览器 MSHTML!CMultiReadStreamLifetimeManager::ReleaseThreadStateInternal 访问违例漏洞(CVE-2016-3288),来自 Project Zero Issue 827: https://t.co/9vaT1xw4NJ"
-
[ Browser ] Chrome social engineering - Fool users into opening downloaded executable PoC: http://pastebin.com/raw/jb8Pp3AL - #justmightwork
" 利用社会工程学方法诱导用户点击下载的可执行文件: http://pastebin.com/raw/jb8Pp3AL "
-
[ Conference ] CCS'16 accepted papers posted: https://www.sigsac.org/ccs/CCS2016/accepted-papers/ Interesting there are multiple order-revealing/order-preserving crypto papers
"ACM CCS 2016 会议已审核通过的议题列表︰ https://t.co/YUDcHiyI14 "
-
[ iOS ] MWR releases Needle, its new open source modular framework for conducting security assessments of iOS applications: http://mwr.to/zr9x
" Needle - NCC Group 开源的一个 iOS APP 安全性评估框架︰ https://t.co/rbKyNaas7U"
-
[ Linux ] Patch for CVE-2016-3857: https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=7de249964f5578e67b99699c5f0b405738d820a2
" Linux 内核本地提权漏洞(CVE-2016-3857)的补丁提交日志︰ https://t.co/YwmzxYVeNx"
-
[ Others ] "An In-Depth Analysis of Disassembly on Full-Scale x86/x64 Binaries" https://www.usenix.org/system/files/conference/usenixsecurity16/sec16_paper_andriesse.pdf /cc @ capstone_engine
" x86/x64 二进制文件汇编代码静态深度分析,Paper: https://t.co/l7FmQeBSvL "
-
[ Popular Software ] BlueStacks App Player Privilege Escalation - http://blog.talosintel.com/2016/08/bluestacks-app-player-vulnerability.html by @ _Icewall
"BlueStacks 播放器应用在创建注册表键时权限控制不正确,导致可以以 SYSTEM 执行任意代码(CVE-2016-4288): https://t.co/AO8x5cVolC"
-
[ Tools ] A great talk by @ sk3wl in the last #DEFCON on how to integrate Unicorn engine with IDA Pro for code emulation: https://media.defcon.org/DEF%20CON%2024/DEF%20CON%2024%20presentations/DEFCON-24-Eagle-Sk3Wldbg-Emulating-with-Ida.pdf
" sk3wldbg - 基于 Unicorn 引擎的 IDA Pro 模拟执行插件,作者在 DefCon 会议的演讲︰ https://t.co/G3EO6VBMas 代码: https://github.com/cseagle/sk3wldbg "
-
[ Web Security ] Found the paper on XS Search Timing Attack (BH 2016) http://u.cs.biu.ac.il/~herzbea/security/15-01-XSSearch.pdf / https://www.blackhat.com/docs/us-16/materials/us-16-Gelernter-Timing-Attacks-Have-Never-Been-So-Practical-Advanced-Cross-Site-Search-Attacks.pdf recommended by @ kiqueNissim
" 跨站搜索(Cross-Site Search)攻击,来自 BlackHat 会议的一篇演讲: https://t.co/wuXNebXTKk 作者在 2015 年曾经发表过一篇与此有关的 Paper: http://u.cs.biu.ac.il/~herzbea/security/15-01-XSSearch.pdf "
-
[ Windows ] Backdoor keys allow attackers to the bypass UEFI Secure Boot http://securityaffairs.co/wordpress/50182/hacking/backdoor-keys-uefi-secure-boot.html
"微软不小心泄漏了 Windows UEFI 安全启动的密钥,借此攻击者可以绕过 UEFI 的安全启动保护,来自 SecurityAffairs 的报道: https://t.co/BMeKpKrYg4"
-
[ Windows ] Abusing Kerberos to NTLM fallback to defeat BitLocker FDE - https://blog.ahmednabeel.com/abusing-kerberos-to-ntlm-fallback-to-defeat-windows-authentication/ by @ NabeelAhmedBE
"滥用 Kerberos NTLM fallback,绕过 BitLocker 全盘加密,这篇 Blog 介绍的是作者对 MS16-014 补丁的绕过方法: https://t.co/Ml64VJIMfB"