腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Android ] Hardening Measures in Android N Cripple System Utility and Security Applications https://code.google.com/p/android/issues/detail?id=205565
" Android N SELinux 策略将限制对 /、/proc、/sys 路径的访问: https://t.co/Hdf7lSqLpQ "
-
[ Attack ] Opera server breach incident - Opera Security http://www.opera.com/blogs/security/2016/08/opera-server-breach-incident/
"Opera 的同步服务器被黑,部分用户信息遭窃取: https://t.co/1XxkqB2MdI"
-
[ Browser ] #HITBGSEC D2 - Moritz Jodeit -Look Mom I Don't Use Shellcode - http://gsec.hitb.org/materials/sg2016/D2%20-%20Moritz%20Jodeit%20-Look%20Mom%20I%20Don't%20Use%20Shellcode.pdf
" 妈妈你看,我都不需要用 Shellcode,来自 HITB Gsec 会议,介绍的是 IE11 的漏洞利用: https://t.co/5himMhDBzv"
-
[ Crypto ] Congratulations to the OpenSSL team on releasing 1.1.0, a huge milestone. https://www.openssl.org/news/openssl-1.1.0-notes.html
" OpenSSL 发布 1.1.0 版本: https://t.co/Vj9Ab0UHkm"
-
[ Detect ] An Analysis on the Impact and Detection of Kernel Stack Infoleaks https://www.researchgate.net/profile/Salva_Peiro/publication/298313650_An_Analysis_on_the_Impact_and_Detection_of_Kernel_Stack_Infoleaks/links/56e7e5d208aea51e7f3aece7.pdf
" 内核栈信息泄漏漏洞的影响和检测: https://t.co/RWfLV1MQ7A"
-
[ Detect ] COFI Break - breaking exploits with practical control flow integrity - http://gsec.hitb.org/materials/sg2016/D2%20-%20Shlomi%20Oberman%20and%20Ron%20Shina%20-%20Breaking%20Exploits%20with%20Practical%20Control%20Flow%20Integrity.pdf wp http://gsec.hitb.org/materials/sg2016/whitepapers/Breaking%20Exploits%20with%20Practical%20Control%20Flow%20Integrity%20-%20Shlomi%20Oberman%20and%20Ron%20Shina.pdf
" 通过有效的 CFI 特性检测 Exploit,PPT: https://t.co/xhK3aoZSi2 Paper: https://t.co/Up7HCwqZTQ"
-
[ Hardware ] Demonstrations of Attacks Against Implanted Cardiac Devices http://d.muddywatersresearch.com/wp-content/uploads/2016/08/MW_STJ_08252016.pdf
" 心脏植入设备的攻击面分析: https://t.co/RuuBST8Hs2 如果这个链接访问不了,还有一个: http://www.valuewalk.com/wp-content/uploads/2016/08/MW_STJ_08252016.pdf "
-
[ iOS ] Slides from my @ HITBGSEC talk are online: "iOS 10 Kernel Heap Revisted" http://gsec.hitb.org/materials/sg2016/D2%20-%20Stefan%20Esser%20-%20iOS%2010%20Kernel%20Heap%20Revisited.pdf
" 重温 iOS 10 内核堆,来自 HITB GSec 会议: https://t.co/AvtXbxvWGp"
-
[ iOS ] SandBlaster: reverse/decompile Apple sandbox profiles to original human readable SandBox Profile Language format. https://arxiv.org/pdf/1608.04303v1.pdf
" SandBlaster - 逆向 iOS 的沙箱配置文件: https://t.co/uOvAynOEWt"
-
[ iOS ] Pegasus - analysis of APT attack iOS devices https://translate.google.com/translate?hl=en&sl=zh-CN&tl=en&u=http%3A%2F%2Fblog.pangu.io%2Fpegasus-apt%2F
" Pegasus – 针对 iOS 设备的 APT 攻击分析,来自盘古 Blog: http://blog.pangu.io/pegasus-apt/ "
-
[ Linux ] Linux kernel mbcache lock contention denial of service. http://www.openwall.com/lists/oss-security/2016/08/25/4 #infosec #vulnerability #linux #kernel
"Linux 内核 mbcache 锁争用导致的拒绝服务漏洞(CVE-2015-8952): https://t.co/wqtaHOUGzI "
-
[ Linux ] Privilege Escalation on Linux with Live examples. http://resources.infosecinstitute.com/privilege-escalation-linux-live-examples/ #infosec via @ InfosecEdu
" 以几个实际的例子介绍 Linux 内核提权,来自 InfoSec: https://t.co/pfw3CArc7h "
-
[ Malware ] Malware Hides in Installer to Avoid Detection https://blogs.mcafee.com/mcafee-labs/malware-hides-in-installer-to-avoid-detection/
" 恶意软件以隐藏在安装包中的方式躲避检测,来自 McAfee Blog: https://t.co/K0jjgLNlGX"
-
[ MalwareAnalysis ] Aleph - OpenSource Malware Analysis System https://n0where.net/aleph-opensource-malware-analysis-system/ #InfoSec #CyberSecurity
" 开源恶意软件分析系统 Aleph: https://t.co/5H4nHfIPE6 "
-
[ Others ] Attacking NVIDIA's Tegra Platform http://gsec.hitb.org/materials/sg2016/D1%20-%20Peter%20Pi%20-%20Attacking%20NVIDIA's%20Tegra%20Platform.pdf
"攻击 NVIDIA Tegra 平台: https://t.co/UOkgwY4tgH"
-
[ Others ] Intel Processor Trace for UEFI Debug - http://blog.asset-intertech.com/test_data_out/2016/06/intel-processor-trace-for-uefi-debug.html
" Intel 处理器的新特性(Intel Processor Trace) 可以被用来调试 UEFI: https://t.co/YoW2AG0yQ2 "
-
[ Others ] Bypassing User-Mode hooks the sneaky way. https://scorchsecurity.wordpress.com/2016/08/26/bypassing-user-mode-the-sneaky-way/
" 以偷偷摸摸的方式绕过用户态 Hook: https://t.co/0gssXYJZBO"
-
[ Pentest ] Burp Repeater https://blog.secureideas.com/2016/08/burp-repeater.html
" 渗透测试工具 Burp Repeater: https://t.co/o4HDW4IZWq"
-
[ Popular Software ] Nginx resolver vulnerabilities allow cache poisoning attack http://blog.zorinaq.com/nginx-resolver-vulns/
"Nginx DNS resolver 配置错误可致缓存污染攻击: https://t.co/yLf1qTvGWj"
-
[ SecurityProduct ] Authenticated Remote Code Execution in F-Secure Policy Manager https://remoteawesomethoughts.blogspot.fr/2016/08/f-secure-policy-manager-120067239.html
" F-Secure 策略管理器远程代码执行漏洞: https://t.co/c9c7F7ONhZ"
-
[ Virtualization ] Another great presentation at #xen summit http://www.slideshare.net/xen_com_mgr/xpds16-hypervisor-enforced-data-loss-prevention-neil-sikka-a1logic #cybersecurity stop #DataBreach
" XEN 峰会上的一篇演讲《Hypervisor Enforced Data Loss Prevention》: https://t.co/HeGUC4Xky9 "
-
[ Web Security ] New blog post: Floating Domains – Taking Over 20K DigitalOcean Domains via a Lax Domain Import System https://thehackerblog.com/floating-domains-taking-over-20k-digitalocean-domains-via-a-lax-domain-import-system/index.html
" 通过宽松的域名导入系统,搞定 20000 DigitalOcean 的域名: https://t.co/vmCXdhotNr"
-
[ Windows ] FUZZING THE WINDOWS KERNEL - http://gsec.hitb.org/materials/sg2016/D2%20-%20Koh%20Yong%20Chuan%20-%20Fuzzing%20the%20Windows%20Kernel.pdf nice slides from @ yongchuank
" Fuzz Windows 内核,来自 HITB GSec 会议: https://t.co/yaxZdvnmP4 "