腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Android ] Undocumented Patched Vulnerability in Nexus 5X Allowed for Memory Dumping Via USB - https://securityintelligence.com/undocumented-patched-vulnerability-in-nexus-5x-allowed-for-memory-dumping-via-usb/ by @ roeehay
" Nexus 5X 最近修复了一个未公开的漏洞,利用该漏洞可以通过 USB Dump 内存: https://t.co/JJ53SprO2c"
-
[ Attack ] SWIFT Warns Banks Of More Cyberattacks https://threatpost.com/swift-warns-banks-of-more-cyberattacks/120293/
" SWIFT 组织提醒银行近期警惕可能发生的的网络攻击: https://t.co/IIkItbYiqk"
-
[ Browser ] Our (@ we1x @ slekies @ arturjanc) #CSP paper is out. 95% bypassable, whitelisting is doomed, #strictdynamic helps. https://research.google.com/pubs/pub45542.html
" CSP Is Dead, Long Live CSP,白名单的不安全性以及 CSP 的将来。来自 Google 的 Paper: https://t.co/4yGRmUiFiw"
-
[ Browser ] Patch now: Google releases security update for Chrome http://googlechromereleases.blogspot.ie/2016/08/stable-channel-update-for-desktop_31.html
" Chrome 浏览器发布 53 版本,修复多个漏洞: https://t.co/kJr1uQHU6T "
-
[ Defend ] AMD memory encryption: http://events.linuxfoundation.org/sites/events/files/slides/AMD%20x86%20Memory%20Encryption%20Technology%20LSS%20Slides.pdf
"AMD 的内存加密防护技术︰ https://t.co/87EW4Btfpr"
-
[ IoTDevice ] Security Analysis and Exploitation of Arduino devices in the Internet of Things http://www.seg.inf.uc3m.es/~guillermo-suarez-tangil/papers/2016mal-iot.pdf
" Arduino IoT 设备的安全性分析和漏洞利用,Paper: https://t.co/mv85zUyHfH "
-
[ Linux ] 360MeshFire Team:CVE-2016-5696 TCP旁路攻击分析与重现 http://bobao.360.cn/learning/detail/2990.html
" CVE-2016-5696 TCP 旁路攻击分析与重现,来自 360 MeshFire 团队: https://t.co/wS39k9Pu8i"
-
[ Malware ] Take it Easy, and Say Hi to This New Python Ransomware http://blog.fortinet.com/2016/09/01/take-it-easy-and-say-hi-to-this-new-python-ransomware
" Fsociety Locker - 基于 Python 的新款勒索软件: https://t.co/UwwtAtzOa2"
-
[ Others ] Exploiting PHP-7 unserialize: Teaching a New Dog Old Tricks http://blog.checkpoint.com/wp-content/uploads/2016/08/Exploiting-PHP-7-unserialize-Report-160829.pdf
" PHP 7 反序列化漏洞的利用: https://t.co/ynlY7tRDhC"
-
[ Others ] Talos Blog: Talos ShadowGate Take Down: Global Malvertising Campaign Thwarted http://bit.ly/2bLqUWL
" ShadowGate 与全球恶意广告行动的挫败,来自 Talos Blog: https://t.co/7rHSygsqub"
-
[ Others ] Bugs found in GCC with the help of PVS-Studio for Linux: http://www.viva64.com/en/b/0425/ (#gcc, #bugs, #opensource, #code) https://t.co/YQho7sANg4
" 利用 PVS Studio 静态分析工具在 GCC 项目中发现的几个 Bug: http://www.viva64.com/en/b/0425/ "
-
[ Others ] How to pwn the boot process of most computers [pdf] http://goo.gl/wlJpvG
" 如何攻破大多数计算机的启动过程? eMMC Flash 编程指南: https://t.co/cDLs0bQCZ1 "
-
[ Others ] One Bit Flips, One Cloud Flops: Cross-VM Row Hammer Attacks and Privilege Escalation - https://www.usenix.org/system/files/conference/usenixsecurity16/sec16_paper_xiao.pdf
" 跨虚拟机的 Row Hammer 攻击以及虚拟机逃逸,Paper: https://t.co/Zxflxtbind"
-
[ Pentest ] When expanding access, implants should abuse IPC mechanisms like named pipes to avoid outbound security. http://www.contextis.com/resources/blog/using-smb-named-pipes-c2-channel/ #infosec
" 用 SMB 命名管道作为 C&C 信道: https://t.co/v2HrTV9GY3"
-
[ Popular Software ] No Flash Player update this month, but Adobe did release an out-of-band patch for ColdFusion, patching CVE-2016-4264 https://helpx.adobe.com/security/products/coldfusion/apsb16-30.html
" Adobe 为 ColdFusion 发了一个计划外的补丁,修复了 CVE-2016-4264 漏洞: https://t.co/f9MbMj00m8"
-
[ Tools ] #kekeo supports smartcard (/subject:bob |/dh]) & pre-signed RSA/DH req (/asreq:file) to auth https://github.com/gentilkiwi/kekeo/releases https://t.co/k4b2qxilV1
" kekeo - C 语言写的一个与微软 Kerberos 认证交互的工具: https://github.com/gentilkiwi/kekeo "
-
[ Web Security ] Releasing long-awaited "Breaking Great Wall of Web - New XSS Evasion Cheatsheet" < RT Pls http://www.rafayhackingarticles.net/2016/09/breaking-great-wall-of-web-xss-waf.html #XSS #WAF
" WAF 的 XSS 防护逃逸手册: https://t.co/0uEwocChMs http://sh3ifu.com/Breaking-The-Great-Wall-Of-Web-Rafay-Baloch.pdf "
-
[ Web Security ] OLX disclosed a bug submitted by exception: https://hackerone.com/reports/158872 #hackerone #bugbounty https://t.co/JBpf3sYm0M
" 最大的信息分类网站 OLX 被发现了一个任意账户删除漏洞 : https://t.co/2NdPzdyXto "
-
[ Web Security ] Using Chrome's web-custom-data UTI to inject a stored XSS in Slack https://labs.detectify.com/2016/09/01/using-chromes-web-custom-data-uti-to-inject-a-stored-xss-in-slack/
" 利用 Chrome web-custom-data UTI 向 Slack 中注入存储型 XSS: https://t.co/fn51FuomFW "
-
[ Windows ] RCE via Outlook Web Access/Exchange MAPI with tool https://sensepost.com/blog/2016/mapi-over-http-and-mailrule-pwnage/ by @ _staaldraad Bonus is a MAPI protocol implementation in Go.
" 作者写了一个工具,可以通过 Outlook Rules 远程攻破工作站: https://t.co/RCuEGZNc9I "
-
[ Windows ] Powershell Without Powershell - How To Bypass Application Whitelisting, Environment Restriction… http://www.blackhillsinfosec.com/?p=5257 via @ BHInfoSecurity
" 不依赖 Powershell.exe 执行 Powershell 代码,以此绕过大多数的杀软: https://t.co/Xd6bLGoAoC"