
腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Android ] Here’s the apk from @vvdveen/@vu5ec for testing #android for #Drammer attack. Presentation coming up at #ccs16.... https://t.co/vP3vaS0gTg
" 用于测试 Android Drammer 攻击的 APK 样本: https://t.co/vP3vaS0gTg "
-
[ Browser ] New post: Bypassing Content-Security-Policy with DNS prefetching https://blog.compass-security.com/2016/10/bypassing-content-security-policy-with-dns-prefetching/
"通过 DNS 预读取绕过内容安全策略: https://t.co/FgxhRa2MXc"
-
[ Browser ] This is huge: Chrome will require Certificate Transparency for all new public certificates from Oct 2017 https://t.co/byz9iRUEEv
"从 2017年10月开始,Google 要求所有的新公共证书都要使用Certificate Transparency 策略: https://t.co/byz9iRUEEv"
-
[ Bug Bounty ] War Stories from Google's Vulnerability Reward Program : https://docs.google.com/presentation/d/e/2PACX-1vTMBZV_hXgZkEyGBUw8K_pvPjrDBhceV-TYuHWw-Nc3LXA8PZwkW2zQj268W8XBhSkfDEXZ6DN7jrvC/pub?start=false&loop=false&delayms=3000&slide=id.g137e0edca9_0_0
"Google 漏洞奖励计划中的'战争'故事︰ https://t.co/KQIMUB3q9a"
-
[ Crypto ] Hacking GSM A5 crypto algorithm by using commodity hardware http://securityaffairs.co/wordpress/52666/hacking/gsm-crypto-hacking.html
"使用通用计算图形处理器(general-purpose graphics processing unit) 破解 GSM A5 加密算法: http://securityaffairs.co/wordpress/52666/hacking/gsm-crypto-hacking.html"
-
[ Debug ] Debug Linux kernel from Visual Studio (VisualKernel) - http://sysprogs.com/VisualKernel/
" VisualKernel - 从 Visual Studio 中调试 Linux 内核: https://t.co/ihTx4lB6j4"
-
[ Detect ] A simple way for detection the remote user's antivirus : https://vah13.github.io/AVDetection/
"用一个简单的方法来远程检测用户的反病毒软件︰ https://t.co/oYxZocmV6T"
-
[ Exploit ] PrivEsc : A collection of Windows, Linux and MySQL privilege escalation scripts and exploits : https://github.com/1N3/PrivEsc cc @ crowdshield
"PrivEsc - Windows、Linux 和 MySQL 提权脚本收集︰ https://t.co/VCqW7d26Ge "
-
[ Fuzzing ] So #fuzzinator is out: https://github.com/renatahodovan/fuzzinator! All the awesome and crazy ideas for extensions are welcome! ;)
"Fuzzinator Fuzz框架︰ https://t.co/dzLo5NovrG "
-
[ macOS ] Project Zero blog: "task_t considered harmful" by Ian Beer (design issue in iOS/MacOS) - https://goo.gl/yHsnSK
" XNU 内核 task_t 相关的两个 Bug,Project Zero 这篇 Blog 具体分析这两个 Bug 以及如何利用他们实现沙箱逃逸: https://t.co/YWjY45Vupn"
-
[ macOS ] task_t (a design issue at core of XNU kernel which powers iOS & MacOS) considered harmful: https://googleprojectzero.blogspot.in/2016/10/taskt-considered-harmful.html ; https://bugs.chromium.org/p/project-zero/issues/detail?id=837
"XNU kernel 中的代码设计缺陷,此问题影响到 iOS 和 MacOS︰ https://t.co/lT1vSg2xSW; https://t.co/aJ9lcPJIbi"
-
[ macOS ] OS X/iOS kernel use-after-free in IOSurfaceh ttps://bugs.chromium.org/p/project-zero/issues/detail?id=831
"OS X/iOS kernel use-after-free in IOSurface: https://bugs.chromium.org/p/project-zero/issues/detail?id=831 "
-
[ macOS ] OS X kernel use-after-free in IOThunderboltFamily https://bugs.chromium.org/p/project-zero/issues/detail?id=834
"OS X kerner IOThunderboltFamily UAF 漏洞: https://t.co/ZBQ4EuV7c4 "
-
[ macOS ] OS X kernel use-after-free in CoreStorage https://bugs.chromium.org/p/project-zero/issues/detail?id=833
"OS X kerner CoreStorage UAF 漏洞: https://t.co/VbzHdmhMbV "
-
[ macOS ] OS X/iOS kernel use-after-free in IOHDIXController https://bugs.chromium.org/p/project-zero/issues/detail?id=832
"OS X/iOS IOHDIXController UAF 漏洞: https://t.co/6Ckvb7Usx3 "
-
[ macOS ] OS X kernel use-after-free in IOBluetoothFamily.kext https://bugs.chromium.org/p/project-zero/issues/detail?id=830
"OS X kerner IOBluetoothFamily.kext UAF 漏洞: https://t.co/0VzhdUh6hM "
-
[ Malware ] 过期签名“红颜”木马分析 - http://bobao.360.cn/learning/detail/3121.html
"过期签名“红颜”木马分析: https://t.co/znIYgDP9AN"
-
[ Malware ] Trojan[DDOS]/Linux. Znaich分析笔记 - http://www.antiy.com/response/Znaich/Znaich.html
"Trojan[DDOS]/Linux. Znaich分析笔记: https://t.co/sXrO8awzep"
-
[ Malware ] 恶意软件伪装“正规军”,撕开Booster Cleaner“画皮”下的真相 http://blog.avlsec.com/2016/10/3886/booster-cleaner/
"恶意软件伪装'正规军',撕开Booster Cleaner '画皮'下的真相: https://t.co/iuXJhmNcI1"
-
[ Mobile ] Fun for researchers: Cellebrite phone hacking firmware leaked online: http://motherboard.vice.com/read/the-phone-hackers-at-cellebrite-have-had-their-firmware-leaked-online
"以色列数字取证公司 Cellebrite 固件泄露︰ https://t.co/I6Wf9Fzhp3"
-
[ OpenSourceProject ] Vulnerability Spotlight: LibTIFF Issues Lead To Code Execution http://blogs.cisco.com/security/talos/libtiff-code-execution
"LibTIFF 库被发现存在多个漏洞: https://t.co/crejaseBvw"
-
[ OpenSourceProject ] SSL Death Alert: OpenSSL (CVE-2016-8610) : http://seclists.org/oss-sec/2016/q4/224
"OpenSSL SSL/TLS SSL3_AL_WARNING undefined alert Remote DoS: https://t.co/suaU4O8Iet"
-
[ OpenSourceProject ] Baidu Tera is a structured distributed database which is designed to manage trillions of links and webpages https://t.co/REl6A9OXci
"百度开源的 Tera 是一个结构化的分布式的数据库,旨在管理链接和 web 网页: https://t.co/REl6A9OXci"
-
[ Others ] New blog post(technical): Micro architecture attacks on KASLR. http://cyber.wtf
"文中介绍了4种已知的 Micro architecture 攻击,并讨论了可能的缓解措施: https://cyber.wtf/2016/10/25/micro-architecture-attacks-on-kasrl/ "
-
[ Others ] Enumerating Disk Artifacts in Memory http://resources.infosecinstitute.com/enumerating-disk-artifacts-in-memory/
"通过内存取证框架 Volatility 的插件来枚举磁盘对象: https://t.co/7uCmdHxbK9"
-
[ Popular Software ] Foxit Reader FlateDecode Use-After-Free Remote Code Execution Vulnerability CVE-2016-8604 http://srcincite.io/advisories/src-2016-44/
"福昕阅读器的 FlateDecode 中存在 UAF 远程代码执行漏洞 (CVE-2016-8604): https://t.co/KwgFHCVQoF"
-
[ Programming ] All-in-one API documentation browser with offline mode and instant search : http://devdocs.io/
"可离线使用的 API 文档,其中包括: HTML, CSS, JavaScript, PHP, Ruby, Python, Go, C, C++, jQuery 等︰ https://t.co/ONuMUYJ7HD"
-
[ Tools ] Istvan is presenting our #TypeSan @ vu5ec type confusion bug detector @ acm_ccs: https://github.com/vusec/typesan
"Istvan -- 类型混淆漏洞检测工具: https://t.co/u4EovlY4Ok"
-
[ Tools ] exploit_generator : Automated Exploit generation with WinDBG : https://github.com/theevilbit/exploit_generator
"exploit_generator -- 自动化漏洞利用生成器: https://t.co/BeNHGf03f2"
-
[ Tools ] Frida 8.1 is out with brand new networking APIs and lots of other improvements: http://www.frida.re/news/2016/10/25/frida-8-1-released/
"插桩框架 Frida 8.1 发布︰ https://t.co/eeYOokhZ7q"
-
[ Tools ] Detect TCP content injection attacks with findject http://www.netresec.com/?page=Blog&month=2016-10&post=Detect-TCP-content-injection-attacks-with-findject
" 利用 findject 工具检测 TCP 包注入攻击: https://t.co/ml8mJnbAt4"
-
[ Web Security ] Combining host header injection and lax host parsing serving malicious data : https://labs.detectify.com/2016/10/24/combining-host-header-injection-and-lax-host-parsing-serving-malicious-data/
"通过修改Header中host的地址可绕过IE、Edge 浏览器的 SOP︰ https://t.co/KICYN5qVAt"
-
[ Windows ] #mimikatz Windows Server 2016 edition! - https://github.com/gentilkiwi/mimikatz/releases Full support for Windows 10 AU & Server 2016 (1607… https://t.co/J1gCe25Gdl
" mimikatz 发布了完全支持 Windows Server 2016 的版本: https://t.co/Wzb5GAfWfd "
-
[ Windows ] Invoke Win32 applications with Bash on Windows : https://msdn.microsoft.com/en-us/commandline/wsl/interop
"在 Windows 中使用 Bash 拉起 Win32 可执行程序: https://t.co/81garRz85K"
-
[ WirelessSecurity ] LTE security downright ridiculous: every call, text, can be intercepted, blacked out... http://www.theregister.co.uk/2016/10/23/every_lte_call_text_can_be_intercepted_blacked_out_hacker_finds/
"LTE 每一次电话呼叫和文本信息都可被劫持: https://t.co/XiIWXqiH4Y"
-
[ Android ] 通杀所有系统的漏洞? - 聊一聊Drammer,Android上的RowHammer攻击: http://weibo.com/ttarticle/p/show?id=2309404034511389214467
-
[ MachineLearning ] 利用深度学习的思路,对恶意软件从系统调用(Syscall)序列的角度分类: https://www.sec.in.tum.de/assets/Uploads/deeplearning.pdf