腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Android ] RetroScope - Public release of the RetroScope Android memory forensics framework https://github.com/ProjectRetroScope/RetroScope
"RetroScope - Android 内存取证框架,GitHub Repo: https://t.co/US52BDo7G4 "
-
[ Attack ] Here's a detailed analysis of the alleged NSA exploits recently dumped by #ShadowBrokers https://www.riskbasedsecurity.com/2016/08/the-shadow-brokers-lifting-the-shadows-of-the-nsas-equation-group/
" 有黑客声称黑进了方程式组织,并且正在拍卖偷来的 Exploits。 来自 RiskBased 的报道:揭开 NSA 方程式组织的'遮羞布': https://t.co/58wNKcKKnT 还有一篇相关的: https://medium.com/@msuiche/shadow-brokers-nsa-exploits-of-the-week-3f7e17bdc216#.bbeo195ro GitHub Repo: https://github.com/theshadowbrokers/EQGRP-AUCTION 压缩包下载: https://mega.nz/#!zEAU1AQL!oWJ63n-D6lCuCQ4AY0Cv_405hX8kn7MEsa1iLH5UjKU 解压密码: theequationgroup "
-
[ Debug ] Bypassing Application Whitelisting by using WinDbg/CDB as a Shellcode Runner http://www.exploit-monday.com/2016/08/windbg-cdb-shellcode-runner.html
" 在 WinDbg/CDB 调试器里运行 Shellcode: https://t.co/6QN1BQTHvV "
-
[ Defend ] ELFbac (2016): ELF ABI metadata for run-time policy enforcement @ sergeybratus @ mlocasto https://www.blackhat.com/docs/us-16/materials/us-16-Bratus-Intra-Process-Memory-Protection-For-Applications-On-ARM-And-x86-wp.pdf https://t.co/jWyVXBos5p
" 从 ELF ABI 的角度加固 ARM/X86 的进程内存保护,来自 BlackHat 会议: https://www.blackhat.com/docs/us-16/materials/us-16-Bratus-Intra-Process-Memory-Protection-For-Applications-On-ARM-And-x86.pdf https://www.blackhat.com/docs/us-16/materials/us-16-Bratus-Intra-Process-Memory-Protection-For-Applications-On-ARM-And-x86-wp.pdf "
-
[ Fuzzing ] Just published the slides + code from @ NerdKernel & @ munmap @ defcon presentation on platform agnostic kernel fuzzing https://labs.mwrinfosecurity.com/publications/platform-agnostic-kernel-fuzzing
" KernelFuzzer - MWR Labs 开源了一个跨平台的内核 Fuzz 框架,支持 Windows、OS X、QNX 系统: https://t.co/KMK69a63qH "
-
[ Linux ] System Integrity Protection (SIP) for FreeBSD https://github.com/2trill2spill/SIP
"为 FreeBSD 系统提供 SIP(系统完整性保护)特性的内核模块实现: https://t.co/5x8neaT6jI "
-
[ Malware ] New post: New Locky Ransomware Spotted in the Brazilian Underground Market, Uses Windows Script Files http://bit.ly/2breXY4 @ TrendMicro
" 使用 Windows WSF 文件的勒索软件出现,来自趋势科技的分析: https://t.co/bmL39Okc2V "
-
[ Network ] CVE-2016-5696 and its effects on Tor https://blog.patternsinthevoid.net/cve-2016-5696-and-its-effects-on-tor.html
" Linux Off-Path TCP 流量劫持漏洞(CVE-2016-5696)对 Tor 网络的影响: https://t.co/Ijwo536kR6"
-
[ OpenSourceProject ] Vulnerability Spotlight: Multiple Remote Code Execution Vulnerabilities Within Lexmark Perceptive Document Filters. http://blog.talosintel.com/2016/08/vulnerability-spotlight-multiple-remote.html
" Talos 团队发现了 Lexmark 文档过滤器库的多个漏洞: https://t.co/p7cJadATzH"
-
[ Others ] Jailbreaking the Amazon Kindle E Ink Reader https://github.com/sgayou/kindle-5.6.5-jailbreak/blob/master/doc/README.md
"越狱亚马逊 Kindle 阅读器: https://t.co/0fkxtV1tlj"
-
[ Others ] Windows system call tables updated, refreshed and reworked. Now include Win10 1507/1511/1607, among other changes. http://j00ru.vexillium.org/?p=2920
"j00ru 更新了 Windows System Call Table,覆盖了 Windows 10 1507/1511 版本: https://t.co/RIasgLRPY6"
-
[ Others ] Very cool: https://lafintel.wordpress.com/2016/08/15/circumventing-fuzzing-roadblocks-with-compiler-transformations/
" 通过编译器的切换提高 AFL Fuzz 的代码覆盖率︰ https://t.co/pMI7gXVIDB"
-
[ Others ] “Fileless” UAC Bypass Using eventvwr.exe and Registry Hijacking https://enigma0x3.net/2016/08/15/fileless-uac-bypass-using-eventvwr-exe-and-registry-hijacking/
" 通过 eventvwr.exe 和注册表劫持的方法绕过 UAC: https://t.co/5ilpD99Yjq"
-
[ Others ] DDoSCoin, the cryptocurrency that pays the participation in DDoS attacks http://securityaffairs.co/wordpress/50287/hacking/ddoscoin-ddos-cryptocurrency.html
"DDoSCoin - 一种与 DDoS 攻击有关的加密货币,来自 SecurityAffairs 的报道: https://t.co/cMIPpSRnef"
-
[ Others ] A write-up, with code & open hw release of @ RoganDawes & @ singe's @ defcon 24 talk; Remote Physical Attacks via USB: https://www.sensepost.com/blog/2016/universal-serial-abuse/
" DefCon 会议一篇题为《Universal Serial aBUSe: Remote Physical Access Attacks》的演讲︰ https://t.co/Ywun3ByluH"
-
[ Others ] My old summaries of “The Art of Software Security Assessment”, with @ mdowd’s blessing :) http://www.surrendercontrol.com/2016/08/blast-from-past-taossa-summaries.html
" 系列文章《The Art of Software Security Assessment》: https://t.co/gAtfy0ijHs "
-
[ Popular Software ] JetBrains IDE Remote Code Execution and Local File Disclosure http://blog.saynotolinux.com/blog/2016/08/15/jetbrains-ide-remote-code-execution-and-local-file-disclosure-vulnerability-analysis/
" JetBrains IDE 远程代码执行漏洞及本地文件泄漏漏洞,同样 PyCharm、 Android Studio、 WebStorm、 IntelliJ IDEA 也受影响: https://t.co/Cr3Ugy9tQa"
-
[ Popular Software ] PoC #Python #IDE #0day Write following & save it as "tabnanny.py" import os os.system("calc.exe") right-click the .py => "Edit with IDLE".
" Haifei Li 发现了一个 Python IDE IDLE 的 0Day,PoC 见上面这段说明"
-
[ ReverseEngineering ] SkidSuite2 - A set of projects focusing on java reverse engineering using ASM. CC: @ timstrazz @ caleb_fenton https://github.com/LPK-Matt/SkidSuite2
"SkidSuite2 - 关于 Java 逆向的几个小项目,GitHub Repo: https://t.co/37S2DKOBGk"
-
[ ThreatIntelligence ] Great example of using PassiveTotal to capture domain shadowing in action! #infosec #shadowing #threatintel https://www.riskiq.com/blog/labs/shadowed-domains-lead-to-neutrino-exploit-kit/
" 用 PassiveTotal 发现 HillaryNixonClinton.com 跳转 Neutrino EK 的攻击事件: https://t.co/pIC98SibI6"
-
[ Tools ] Waiting PVS-Studio for Linux: Checking the Code of #Inkscape Graphics Editor http://www.viva64.com/en/b/0419/ #programming https://t.co/7tGOVqv2ru
"用 PVS-Studio 工具对图形编辑器 Inkscape 项目的分析: https://t.co/KyxbSWtXPg "
-
[ Web Security ] Stored Cross-Site Scripting vulnerability in Photo Gallery WordPress Plugin http://goo.gl/fb/ek85ci #FullDisclosure
" WordPress Photo Gallery 插件的存储型 XSS 漏洞,来自 FullDisclosure 公告: https://t.co/M7E8Z90SBn "