
腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Crypto ] Google AI invents its own cryptographic algorithm : http://arstechnica.co.uk/information-technology/2016/10/google-ai-neural-network-cryptography/ , Paper : https://arxiv.org/pdf/1610.06918v1.pdf (pdf)
"Google AI 发明了一套自己的加密算法︰ https://t.co/IdaMd3yWDb Paper︰ https://t.co/8fm4OO98Un "
-
[ Fuzzing ] shared a ppt about my js-kernel-fuzzer https://github.com/tinysec/public/blob/master/FuzzWindowsKernelViaJavascript/JSkernelFuzzer.pptx
" 介绍 TinySec 的 js windows kernel fuzzer 的 PPT: https://t.co/AF1MgyPIQC 还有一篇相关的文档: https://github.com/tinysec/public/blob/master/FuzzWindowsKernelViaJavascript/zh.md "
-
[ iOS ] Controlled vm_deallocate size can lead to UaF in launchd https://bugs.chromium.org/p/project-zero/issues/detail?id=896
" iOS launchd vm_deallocate UAF 漏洞,来自 Project Zero: https://t.co/nzsRAi4REu"
-
[ iOS ] Logic issue in launchd message requeuing allows arbitrary mach message control https://bugs.chromium.org/p/project-zero/issues/detail?id=893
"iOS launchd mach 消息处理中的一个逻辑漏洞: https://t.co/8qSQkrbl98"
-
[ Linux ] DTrace for Linux 2016 : http://www.brendangregg.com/blog/2016-10-27/dtrace-for-linux-2016.html cc @ brendangregg https://t.co/tvVh9c0BPD
" DTrace for Linux 2016︰ https://t.co/3NU2wa5gsJ "
-
[ macOS ] To top it all off, Ian also found a bug in auto-generated MIG code leading to a UAF on a mach_port_t: https://bugs.chromium.org/p/project-zero/issues/detail?id=882
" macOS/iOS mach_ports_register 中的多个安全问题,来自 Project Zero︰ https://t.co/eMpTIbys6m"
-
[ macOS ] HITCON 2016 - (P)FACE into the Apple core and exploit to root http://hitcon.org/2016/CMT/slide/day1-r2-c-1.pdf
"趋势科技研究员今年 7 月份在 HITCON 2016 会议的演讲《(P)FACE Into the Apple Core and Exploit to Root》: https://t.co/J1IAYB90pr"
-
[ macOS ] Using email for persistence on OS X https://www.n00py.io/2016/10/using-email-for-persistence-on-os-x/
" 通过 OS X 的邮件规则实现持久控制: https://t.co/xcTTvkH7ZI "
-
[ macOS ] Strolling into Ring-0 via I/O Kit Drivers : https://speakerdeck.com/patrickwardle/o-kit-drivers (Slides) cc @ patrickwardle
"通过 I/O Kit 驱动走进 Ring-0︰ https://t.co/G4GGVJlX9t "
-
[ Malware ] Get your RAT on Pastebin https://blog.malwarebytes.com/cybercrime/2016/10/get-your-rat-on-pastebin/
" MalwareBytes 发现了一个从 Pastebin 下载 Payload 的恶意软件: https://t.co/YMbaxLQYyn"
-
[ Mitigation ] New post: Control Flow Guard Improvements in Windows 10 Anniversary Update http://bit.ly/2eYdFn7 @ TrendMicro
" Windows 10 周年更新版本中 CFG 特性增强的技术细节,来自趋势科技: https://t.co/FjIahAwKYg "
-
[ Network ] BinProxy - BinProxy is a proxy for arbitrary TCP connections http://www.kitploit.com/2016/10/binproxy-binproxy-is-proxy-for.html
"BinProxy - TCP 网络连接代理工具: https://t.co/BYtHkBMT3x "
-
[ Obfuscation ] Tigress_protection : Playing w/ Tigress binary protection.Automatic deobfuscation using symbolic execution and LLVM: https://github.com/JonathanSalwan/Tigress_protection
"Tigress_protection︰ 基于符号执行和 LLVM 自动化实现代码反混淆︰ https://t.co/JTsqMxykt7"
-
[ Others ] .@ Apple patches iTunes, iCloud for Windows, Xcode Server - http://bit.ly/2ejfpYa
" 苹果发布补丁更新,修复了 iTunes、iCloud for Windows、Xcode 的多个漏洞: https://t.co/Fr5aC7pjYP 官方的公告页面: https://support.apple.com/en-us/HT201222 "
-
[ Others ] "Mozilla announces Project Quantum, an improved rendering engine for Firefox" http://www.androidpolice.com/2016/10/27/mozilla-announces-project-quantum-improved-rendering-engine-firefox/
""Mozilla 宣布启动 Firefox 新渲染引擎的项目 Quantum: https://t.co/q8iarkE728"
-
[ Popular Software ] Oliver Chang (@ halbecaf) has been working with Project Zero on a '20% project' to attack the NVidia GPU driver: http://nvidia.custhelp.com/app/answers/detail/a_id/4247
" NVidia 上周五发布补丁公告,修复了多个漏洞︰ https://t.co/wv3PaTR97l 其中有 14 个是 Project Zero 的 Oliver Chang 发现的,Issues 列表: https://bugs.chromium.org/p/project-zero/issues/list?can=1&q=owner%3Aochang%40google.com+nvidia&sort=-id&colspec=ID+Type+Status+Priority+Milestone+Owner+Summary&cells=ids "
-
[ Tools ] my chakra based javascript windbg extension , part of my jsrt project https://github.com/tinysec/jswd https://t.co/fh28BggmKV
" jswd - TinySec 开源的他基于 Chakra 引擎写的一个 JavaScript WinDbg 扩展: https://github.com/tinysec/jswd "
-
[ Tools ] Hacking Secret Ciphers using Python : http://inventwithpython.com/hacking/chapters/
" 利用 Python 破解密码︰ https://t.co/dBxCL6A1Ts"
-
[ Tools ] Our #eko12 2016 Ebowla updates are posted! Includes slides and PowerShell payloads: https://github.com/Genetic-Malware/Ebowla/blob/master/README.md. Cc: @ wired33
" Payload 生成框架 Ebowla 的 GitHub 项目更新了一些模块和 PPT︰ https://t.co/Ycr1QXmHy8 "
-
[ Web Security ] Joomla – From No One to the Highest Privilege https://blog.fortinet.com/2016/10/27/joomla-from-no-one-to-the-highest-privilege
"Joomla — 从啥也不是到最高特权,来自 Fortinet: https://t.co/fnJ7IMQobo 来自 Sucuri 对野外 Joomla Exploits 攻击的情况的监测: https://blog.sucuri.net/2016/10/joomla-mass-exploits-privilege-vulnerability.html "
-
[ Windows ] New blog post! JavaScript extensibility and scripting in #WinDbg #JavaScript #debugging https://blogs.msdn.microsoft.com/windbg/2016/10/27/new-insider-sdk-and-javascript-extensibility/
" 用 JavaScript 扩展 WinDbg 的功能,来自微软官方对 14951 版本 SDK 带来的新变化的介绍: https://t.co/6v31ftz1N9 这个与上面提到的 TinySec 开源的 jswd 有些类似: https://github.com/tinysec/jswd "
-
[ Windows ] New feature in @ Microsoft Office 2016 protects against macros in Office 2013 - http://bit.ly/2dOuwwH
" Office 2016 中的宏恶意代码保护特性将移植到 Office 2013 中: https://t.co/eh36mFWMjE"
-
[ Windows ] Windows Metafiles : An Analysis of the EMF Attack Surface & Recent Vulnerabilities : http://www.slideshare.net/PacSecJP/jurczyk-windows-metafilepacsecv2 (Slides) cc @ j00ru
"Windows Metafiles: EMF 的攻击面和最近的漏洞分析,来自 PacSec 会议︰ https://t.co/gQm5YjT4q0 "
-
[ WirelessSecurity ] #PacSec 2016 "You Can Hijack Nearly Any Drone Mid-flight Using This Tiny Gadget - http://thehackernews.com/2016/10/how-to-hack-drone.html"
" 利用 SDR 攻击 DSMx 无人机,来自 PacSec 会议: https://t.co/z2PrZ7pNEp""