腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Attack ] .@ TaoSecurity follows up observations on China's #cyber strategies in this latest blog post http://bddy.me/2bJp1Mj https://t.co/RSvyavEL4m
" FireEye 的一篇报告:《Redline - 中国的网络间谍策略观察报告》: https://t.co/WXcS2ksK49 https://t.co/RSvyavEL4m"
-
[ Challenges ] Bypassing PHP Null Byte Injection protections - Part II https://www.securusglobal.com/community/2016/08/19/abusing-php-wrappers/
"绕过 CTF 比赛中的一道 PHP Null 字节注入保护题: https://t.co/bthCMUvvCD"
-
[ Conference ] If you want to identify vulns in SWF files in your next pentest or bug bounty, read this! http://www.bsidesmcr.org.uk/#!slides/sajdc https://t.co/eq1Ulq2hHz
" BSides 曼彻斯特会议 PPT 下载: http://www.bsidesmcr.org.uk/#!slides/sajdc 其中还有个 Exploit P2P 协议的议题"
-
[ MachineLearning ] JIT native code generation for TensorFlow computation graphs using Python and LLVM http://blog.christianperone.com/2016/08/jit-native-code-generation-for-tensorflow-computation-graphs-using-python-and-llvm/ (by @ tarantulae)
"用 Python 和 LLVM 为 TensorFlow 计算流图生成 JIT Native 代码: https://t.co/oCyrZd43Ia "
-
[ Malware ] NCC Group Blog: Neutrino Exploit kit - An adventure in PoEKmon NeutriGo land https://www.nccgroup.trust/uk/about-us/newsroom-and-events/blogs/2016/august/an-adventure-in-poekmon-neutrigo-land/ by @ saidelike https://t.co/xxS9qXlTya
"NCC Group 对 Neutrino Exploit kit Landing Page 的分析: https://t.co/xxS9qXlTya "
-
[ Malware ] Phoenix Exploit Kit Remote Code Execution https://packetstormsecurity.com/files/138469/phoenix_exec.rb.txt
" Phoenix Exploit Kit 自身的 Web 管理界面存在一个远程代码执行漏洞: https://t.co/63hTce9YKp"
-
[ Malware ] #Unit42 shares details behind uptick in the delivery of the #Hancitor malware family http://bit.ly/2bafPhi https://t.co/5iIAj3Nytl
" Palo Alto 监测到最近 Hancitor 恶意软件家族样本的数量呈上升趋势: https://t.co/xnn4XC2x57 "
-
[ Malware ] My new paper with @ nolaforensix is now online "Detecting Objective-C Malware Through Memory Forensics” http://dfrws.org/sites/default/files/session-files/1-s2.0-s1742287616300524-main.pdf #DFIR
" 通过内存取证的方法检测 Objective-C 恶意软件: https://t.co/hrQamWbriL "
-
[ Network ] The most powerful #IPv6 packet crafting toolkit: @ AntoniosAtlasis' Chiron code: http://www.secfu.net/tools-scripts/ guide: https://www.ernw.de/download/Chiron_Tutorial.pdf [PDF]
" IPv6 数据包构造与安全测试框架 - Chiron︰ https://t.co/vdZo7MgqLo Paper: https://t.co/OichK9UTmv "
-
[ Network ] New blog post by @ kafetzj: Follow-Up on CVE-2016-1409 – IPv6 NDP DoS Vulnerability https://www.insinuator.net/2016/08/follow-up-on-cve-2016-1409-ipv6-ndp-dos-vulnerability/
" Juniper Junos OS IPv6 邻居发现协议(NDP)拒绝服务漏洞(CVE-2016-1409): https://t.co/UGTv6cV7jP 漏洞的详细介绍: https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10749&actp=search "
-
[ OpenSourceProject ] Implementing DNS client and server in @ rustlang http://bluejekyll.github.io/blog/rust/dns/2016/08/21/a-year-of-rust-and-dns.html
" 用 Rust 语言自己写一个 DNS 客户端和服务器: https://t.co/Zec2UcVuax"
-
[ Others ] Capturing 0day Exploits with PERFectly Placed Hardware Traps https://www.endgame.com/blog/capturing-0day-exploits-perfectly-placed-hardware-traps
" 通过预置的完美硬件断点捕获 0Day,之前推送过作者在 BlackHat 会议演讲的 PPT,这次作者写了一篇 Blog: https://t.co/6sKCadiiq5"
-
[ Others ] Slides from PHP's Not Dead - PHP7 In Practice https://speakerdeck.com/szymanskilukasz/phps-not-dead-php7-in-practice #phpersummit #php #phpers
" PHP 没死,PHP 7 实战: https://t.co/BD7yrcRDik "
-
[ Others ] NCC Group Blog: Multiple Vulnerabilities in Lenovo Kernel Driver - https://www.nccgroup.trust/uk/about-us/newsroom-and-events/blogs/2016/august/multiple-vulnerabilities-in-lenovo-kernel-driver/ by Branden Hollembaek and Adam Pond
"NCC Group 研究员发现了两个联想内核驱动的漏洞(Windows): https://t.co/65RCZxqkhd "
-
[ Others ] ”Spoofing 2D Face Detection: Machines See People Who Aren't There" http://arxiv.org/abs/1608.02128
" 欺骗二维人脸识别检测︰机器看到的人并不在那: https://t.co/TzLD2wEr9G"
-
[ Popular Software ] Samsung Security Manager Multiple Remote Code Execution Vulnerabilities https://medium.com/@ steventseeley/samsung-security-manager-multiple-remote-code-execution-vulnerabilities-5aac5e59f1ed#.8jc4l9rxm
"三星 Security Manager 桌面应用被发现多个漏洞: https://t.co/2MALZxy7o0"
-
[ Tools ] Developing Malware Behavior Analyzer, MBA taint, forensics, VM-based hook, etc. supported. @ AndyZSShen @ bletchley13 https://github.com/GlacierW/MBA
" MBA - 基于 QEMU 的一个恶意软件行为分析工具: https://t.co/PPxJhVi28i"
-
[ Tools ] Debug iOS Safari on Windows or a Mac with VS @ code https://blogs.msdn.microsoft.com/webdiagnostics/2016/08/22/introducing-ios-web-debugging-for-vs-code-on-windows-and-mac/ /HT @ auchenberg
" Visual Studio Code 编辑器新增 iOS Web Debugger,支持在 VS Code 中调试 iOS Web 界面: https://t.co/voL5C8Q9FX "
-
[ Tools ] Added a Debugger with memoryBP and a VEH-based LocalDebugger to PythonForWindows. (samples:http://hakril.github.io/PythonForWindows/build/html/sample.html#debugging) https://github.com/hakril/PythonForWindows/
" PythonForWindows - 一个 Python 库,提供了很多 Python 与 Windows 交互的 API,支持重要数据结构的抽象、IAT Hook、WinProxy、Native 代码执行、WMI 等, GitHub Repo: https://github.com/hakril/PythonForWindows/ 使用实例: http://hakril.github.io/PythonForWindows/build/html/sample.html "
-
[ Tools ] IGHASHGPU – GPU Based Hash Cracking – SHA1, MD5 & MD4 http://www.darknet.org.uk/2016/08/ighashgpu-gpu-based-hash-cracking-sha1-md5-md4/
"IGHASHGPU — 基于 GPU 的 Hash 破解工具(SHA1、MD5、MD4): https://t.co/gYDnVVQfUn"
-
[ Windows ] I just published “How bad design decisions created the least secure driver on Windows” https://medium.com/p/how-bad-design-decisions-created-the-least-secure-driver-on-windows-33e662a502fe
" Windows win32k 驱动设计上的几个问题: https://t.co/rYaObaanSi"