腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Android ] Dumb question...how is the ashmem bug supposed to lead to privilege escalation? Does the mapped mem contain objects? https://www.codeaurora.org/invalid-path-check-ashmem-memory-file-cve-2016-5340
" 匿名共享内存(ashmem)中的路径检查不正确导致的提权漏洞(CVE-2016-5340),影响 Android MSM、FirefoxOS MSM 版本: https://t.co/VQUaNtINQz"
-
[ Android ] Smartphone Antivirus and Security Applications Under Fire - https://media.defcon.org/DEF%20CON%2024/DEF%20CON%2024%20presentations/DEFCON-24-Huber-Rasthofer-Smartphone-Antivirus-And-Security-Applications-Under-Fire.pdf via @ trufae
" 《How to do it Wrong: Smartphone Antivirus and Security Applications Under Fire》,智能手机反病毒软件自身的安全问题,来自 DefCon 会议: https://t.co/2g7rBx2mWG"
-
[ Android ] Fuzzing Android Devices - https://media.defcon.org/DEF%20CON%2024/DEF%20CON%2024%20presentations/DEFCON-24-Anto-Joseph-Fuzzing-Android-Devices.pdf via @ trufae
" Fuzzing Android Devices,来自 DefCon 会议: https://t.co/KtTBSWohZ6"
-
[ Attack ] Snakes in the Satellites: On-going Turla Infrastructure shows continued operations. http://blog.passivetotal.org/snakes-in-the-satellites-on-going-turla-infrastructure/ #infosec #APT #ThreatHunting
" PassiveTotal 发现 Turla APT 组织所用的多个 IP 属于多个卫星提供商: https://t.co/Mna7h45ZAh "
-
[ Attack ] Operation Ghoul: targeted attacks on industrial and engineering organizations https://securelist.com/blog/research/75718/operation-ghoul-targeted-attacks-on-industrial-and-engineering-organizations/
" 盗墓者(Ghoul)定向攻击行动 - 专门攻击工控、工程、制造领域的企业和组织,来自卡巴斯基的分析: https://t.co/rSQbFuXZfV "
-
[ Exploit ] Post containing summary of implants and exploits included in the #EquationGroup #Shadowbrokers dump https://musalbas.com/2016/08/16/equation-group-firewall-operations-catalogue.html
" Shadowbrokers 泄漏的方程式攻击套件的压缩包目录介绍: https://t.co/BPqJr30MLO "
-
[ Fuzzing ] Coverage-based Greybox Fuzzing as Markov Chain https://www.comp.nus.edu.sg/~mboehme/paper/CCS16.pdf && code https://github.com/mboehme/aflfast
"基于代码覆盖率的灰盒 Fuzz,Paper: https://t.co/Db4sB0WMpi 作者在 AFL 的基础上实现了一个 AFLFast: https://t.co/As5kQYY7rq"
-
[ macOS ] How a malware could infects digitally signed files without altering hashes on macOS https://medium.com/@ sabrihaddouche/how-a-malware-can-infects-digitally-signed-files-without-altering-hashes-on-macos-c7dc9e391a8e#.3vw053iey
" macOS 系统中,恶意软件是如何感染数字签名后的文件但不改动 Hash 值的: https://t.co/Y5gQm9G85w "
-
[ Malware ] Nice analisys of fastly evolving Rex malware by @ benkow_ #golang #p2p https://thisissecurity.net/2016/08/17/from-website-locker-to-ddos-rex/
" 从中招 Web 勒索软件到被利用发起 DDoS 攻击(Drupal CMS): https://t.co/aqBVd6zjJb "
-
[ Malware ] Nemucod Ransomware Analysis https://www.webroot.com/blog/2016/08/16/nemucod-ransomware-analysis/
"Nemucod 勒索软件分析: https://t.co/Rifb8H9ZUN"
-
[ Malware ] #Unit42 researchers find #Aveo #malware family targeting Japanese speaking users http://bit.ly/2b3hhUs
" 专门攻击日语用户的 Aveo 恶意软件: https://t.co/ENdb2yPOZT "
-
[ Malware ] Shakti Trojan: Technical Analysis https://blog.malwarebytes.com/threat-analysis/2016/08/shakti-trojan-technical-analysis/
" Shakti 木马技术分析,来自 MalwareBytes: https://t.co/WEuKTX2aEU"
-
[ Malware ] Locky Ransomware Distributed Via DOCM Attachments in Latest Email Campaigns http://www.fireeye.com/blog/threat-research/2016/08/locky_ransomwaredis.html
" Locky 勒索软件依靠 DOCM 附件传播,来自 FireEye 的分析: https://t.co/Zhz7HYM9MR"
-
[ Malware ] CryptXXX Technical Deep Dive - https://blogs.cisco.com/security/cryptxxx-technical-deep-dive by @ JershMagersh
" CryptXXX 勒索软件深度分析: https://t.co/z44gcqeqwT"
-
[ NetworkDevice ] Cisco ASA (Adaptive Security Appliance) SNMP Remote Code Execution Vulnerability - CVE-2016-6366 https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160817-asa-snmp
"思科修复了方程式压缩包中泄漏的 ASA 软件 SNMP 的远程代码执行漏洞(CVE-2016-6366): https://t.co/NXJ6ieaKOW ; 对 Exploit 的分析: https://xorcatt.wordpress.com/2016/08/16/equationgroup-tool-leak-extrabacon-demo/ 还有一篇《Equation Group(NSA合作黑客组织)的攻击工具分析》: http://wufeifei.com/eqgrp/ "
-
[ Pentest ] i published on Github a curated list of public penetration testing reports released by several consulting firms: https://github.com/juliocesarfort/public-pentesting-reports
" GitHub 上有人收集的一份各厂商/团队的渗透测试报告︰ https://t.co/WpV1HZiLdf"
-
[ Tools ] Azurite - a tool for recon and enumeration of Azure clouds https://github.com/mwrlabs/Azurite
" Azurite - MWR Labs 开源的一个渗透测试中微软 Azure 云信息搜集工具: https://t.co/QBlDOz45yE "
-
[ Windows ] Small #PowerShell Module for the Antimalware Scan Interface | https://github.com/adamdriscoll/AMSI/
" Windows 反病毒扫描接口(AMSI) PowerShell 实现: https://t.co/crSHQmgmIC"
-
[ Windows ] Bypassing User Account Control (UAC) using TpmInit.exe The story continues.... http://uacmeltdown.blogspot.nl https://t.co/7xp5S0neR8
" 利用 TpmInit.exe Bypass UAC: http://uacmeltdown.blogspot.nl/2016/08/bypassing-user-account-control-uac.html "
-
[ Windows ] Windows Kernel win32k.sys FON font processing: divide-by-zero exception in win32k!MAPPER::bFoundExactMatch https://bugs.chromium.org/p/project-zero/issues/detail?id=855#c_ts1471445053
"Windows 内核 win32k.sys FON 字体处理除零异常漏洞,异常位置为 win32k !MAPPER::bFoundExactMatch: https://t.co/TaZqyHvaEx"
-
[ Windows ] The reports of my EMF processing GDI+ RCE bugs fixed in latest MS16-097 are now public, see https://bugs.chromium.org/p/project-zero/issues/detail?id=824, #826, #828.
" Windows GDI 组件在处理 EMF 格式时的 3 个 RCE 漏洞: https://bugs.chromium.org/p/project-zero/issues/detail?id=824 https://bugs.chromium.org/p/project-zero/issues/detail?id=826 https://bugs.chromium.org/p/project-zero/issues/detail?id=828 "