
腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Android ] Android PoCs for October bulletin: cve-2016-3901 cve-2016-3935 cve-2016-3940 cve-2016-6672 cve-2016-6690 https://github.com/jiayy/android_vuln_poc-exp
"Android 10 月公布的漏洞 PoC: CVE-2016-3901、CVE-2016-3935、CVE-2016-3940、CVE-2016-6672、cve-2016-6690: https://github.com/jiayy/android_vuln_poc-exp "
-
[ Android ] Our slides for CVE-2015-1805 exploit & Samsung Knox(S6 ver.) bypassing at MOSEC2016, is now available. https://speakerdeck.com/retme7/talk-is-cheap-show-me-the-code @ keen_lab
" CVE-2015-1805 exploit & Samsung Knox Bypass,来自科恩实验室申迪在 MoSec2016 会议的演讲: https://t.co/IdkI60Cx49 "
-
[ Attack ] Second hacker group targets SWIFT users, Symantec warns http://reut.rs/2e3rOyS
"赛门铁克警告称hacker团伙将目标转向了 SWIFT 用户: http://www.reuters.com/article/us-cyber-heist-malware-idUSKCN12B1L3 "
-
[ Browser ] :_( JavaScript eval() type confusion in Microsoft Edge http://zerodayinitiative.com/advisories/ZDI-16-532/
"微软 Edge 浏览器 JS eval 函数类型混淆漏洞,导致远程代码执行: http://zerodayinitiative.com/advisories/ZDI-16-532/ "
-
[ Browser ] Browser Treatment of Bad SSL : https://docs.google.com/document/d/1b7lenmn5XO06QohaJzVffnJxjXjY1rD70wg34gfuxRo/edit
" 六种常用浏览器对 Bad SSL 的不同处理方式对比︰ https://t.co/PIoaYn0cgB"
-
[ Conference ] Another Microsoft bug found - this time on BlueHat schedule https://blogs.technet.microsoft.com/bluehat/2016/09/01/bluehat-v16-schedule-announced (talks conflicted in same track… https://twitter.com/i/web/status/786262972951691264
" 2016 微软 BlueHat 会议的日程安排: https://blogs.technet.microsoft.com/bluehat/2016/09/01/bluehat-v16-schedule-announced/ "
-
[ Crypto ] TLS nonce-nse : https://blog.cloudflare.com/tls-nonce-nse/ cc @ FiloSottile
"TLS nonce-nse,来自 CloudFlare: https://blog.cloudflare.com/tls-nonce-nse/ "
-
[ Detect ] New blog from @ HackingDave: Reliability Detecting PtH through Event Log Analysis. https://www.binarydefense.com/bds/reliably-detecting-pass-the-hash-through-event-log-analysis/ #BinaryDefense
"通过事件日志分析来可靠的进行 PtH 检测 : https://t.co/9aLjljloIR "
-
[ iOS ] New NCC Group blog post: iOS instrumentation without jailbreak https://www.nccgroup.trust/uk/about-us/newsroom-and-events/blogs/2016/october/ios-instrumentation-without-jailbreak/
" 在非越狱的情况下实现 iOS 插桩: https://t.co/IxjpSCWkU8 "
-
[ IoTDevice ] Multiple vulnerabilities found in every AVTECH IP camera, NVR and DVR devices (RCE, auth bypass, etc.) http://www.search-lab.hu/advisories/126-avtech-devices-multiple-vulnerabilities #IoT #AVTECH
"智能设备 AVTECH IP 摄像头、NVR、DVR 中发现多个漏洞: http://www.search-lab.hu/advisories/126-avtech-devices-multiple-vulnerabilities "
-
[ macOS ] 《Form CVE-2016-1764 To CVE-2016-1843》 http://paper.seebug.org/65/
" 从老漏洞到新漏洞 - iMessage 0day(CVE-2016-1843) 挖掘实录,来自 Seebug,作者为知道创宇黑哥: https://t.co/16Ap68PBYF"
-
[ macOS ] #VB2016 slides "A malicious OS X cocktail served from a tainted bottle" http://goo.gl/PMCZxc #MacMalware #DFIR #VolatilityBot #VolUtility
"VB2016 上,对 Mac os 木马 OSX/Keydnap 分析的议题【PPT】: https://www.virusbulletin.com/uploads/pdf/conference_slides/2016/Kalnai_Jirkal-vb-2016-malicious-osx-cocktail.pdf "
-
[ Malware ] Remsec driver analysis (Part 3) : https://artemonsecurity.blogspot.in/2016/10/remsec-driver-analysis-part-3.html , Part 2 : https://artemonsecurity.blogspot.in/2016/10/remsec-driver-analysis-part-2.html , Part 1 : https://artemonsecurity.blogspot.in/2016/10/remsec-driver-analysis.html
"恶意软件 Remsec 驱动程序分析 Part 3: https://t.co/P9Sc5TnA8p Part 2: https://t.co/orxbYYu4V1 Part 1: https://t.co/TPz2PhPt0r"
-
[ Mobile ] New blog entry: Samsung Pay NFC flaw https://salmg.net/2016/10/11/samsung-pay-nfc-flaw/ #infosec #ekoparty #BugCON @ zackwhittaker
"Samsung Pay NFC flaw : https://salmg.net/2016/10/11/samsung-pay-nfc-flaw/ "
-
[ Others ] New post: Several Exploit Kits Now Deliver Cerber 4.0 http://bit.ly/2e5kmsA @ TrendMicro
"Several Exploit Kits Now Deliver Cerber 4.0: http://blog.trendmicro.com/trendlabs-security-intelligence/several-exploit-kits-now-deliver-cerber-4-0/"
-
[ Others ] Android: Binder generic ASLR leak https://bugs.chromium.org/p/project-zero/issues/detail?id=889
" Android Binder 通用 ASLR 泄漏漏洞,来自 Project Zero(CVE-2016-6689): https://t.co/zWxkyEI3fo"
-
[ Others ] Klee is on the web! http://klee.doc.ic.ac.uk/
" 在线版本的 Klee: https://t.co/Rbxqy3idZc"
-
[ Tools ] PowerLurk - Malicious WMI Events using PowerShell http://www.kitploit.com/2016/10/powerlurk-malicious-wmi-events-using.html
"PowerLurk - 一个使用 PowerShell 构造恶意 WMI Events 的工具: http://www.kitploit.com/2016/10/powerlurk-malicious-wmi-events-using.html "
-
[ Tools ] A practical relational query compiler in 500 lines of code : http://scattered-thoughts.net/blog/2016/10/11/a-practical-relational-query-compiler-in-500-lines/
"一个 500 行代码的关系型查询编译器︰ https://t.co/LCSjhhzRn4"
-
[ Windows ] Windows Kernel Fuzzing (Slides by @ yongchuank ) : https://labs.mwrinfosecurity.com/assets/BlogFiles/mwri-fuzzing-the-windows-kernel.pdf ; Slides by @ nils : https://labs.mwrinfosecurity.com/assets/BlogFiles/bg-Windows-Kernel-Fuzzing.pdf
" 来自 MWR Labs 的两篇关于 Windows 内核 Fuzz 的演讲, Yong Chuan Koh 在 HITB 会议的演讲︰ https://labs.mwrinfosecurity.com/assets/BlogFiles/mwri-fuzzing-the-windows-kernel.pdf ; Nils 在 T2 InfoSec 会议的演讲: https://labs.mwrinfosecurity.com/assets/BlogFiles/bg-Windows-Kernel-Fuzzing.pdf"
-
[ Windows ] Privilege elevation on Windows 10, Object Manager Pathological Lookup EoP, https://bugs.chromium.org/p/project-zero/issues/detail?id=924
" Windows 10 对象管理器查询提权漏洞,来自 Project Zero: https://bugs.chromium.org/p/project-zero/issues/detail?id=924 "
-
[ Exploit ] 如何在不修改或注入代码只修改一些Function Pointer和数据的前提下,在目标(内核)中注入一个恶意行为(ROP): http://securitygossip.com/blog/2016/10/12/2016-10-12/