
腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Android ] Hack Android Phone using HTA Attack with QR Code http://www.hackingarticles.in/hack-android-phone-using-hta-attack-qr-code/
"Hack Android Phone using HTA Attack with QR Code: https://t.co/l9nkI7l0y4 "
-
[ Android ] Android malware analysis with Radare: Dissecting the Triada Trojan https://www.nowsecure.com/blog/2016/11/21/android-malware-analysis-radare-triada-trojan/
"使用 Radare 对 Android 恶意软件进行分析: https://t.co/rZdVeds8or"
-
[ Browser ] PoC for Microsoft Edge Scripting Engine Memory Corruption Vulnerability (MS16-129) (CVE-2016-7202): http://www.security-assessment.com/files/documents/advisory/edge_chakra_mem_corruption.pdf
"Microsoft Edge Chakra JavaScript engine 内存破环漏洞(CVE-2016-7202) PoC : https://t.co/liR3KJmIQT"
-
[ iOS ] [CVE-2016-4673] Apple CoreGraphics macOS/iOS JPEG memory corruption https://marcograss.github.io/security/apple/cve/macos/ios/2016/11/21/cve-2016-4673-apple-coregraphics.html
"Apple CoreGraphics macOS/iOS JPEG 内存破坏漏洞(CVE-2016-4673): https://t.co/O4hNgEaho8"
-
[ Malware ] New #Nemucod campaign spreading #Locky #ransomware via @ Facebook Messenger - http://bit.ly/2ficnDm
" Nemucod 通过 Facebook Messenger 来传播 Locky 勒索软件: https://t.co/SMBA13RZP9"
-
[ Malware ] little-doctor : A JavaScript worm that can exfiltrate files, microphone, webcam, and other data : https://github.com/infosec-au/little-doctor cc @ infosec_au
"little-doctor -- 一个可以泄露文件、 麦克风、 摄像头和其他数据的 JavaScript 蠕虫病毒︰ https://t.co/zL7oYW0Bph "
-
[ MalwareAnalysis ] Mirai Botnet Itself is Flawed; Hacking Back IoTs Could Mitigate DDoS Attacks http://thehackernews.com/2016/10/mirai-botnet-iot-malware.html?utm_campaign=crowdfire&utm_content=crowdfire&utm_medium=social&utm_source=twitter https://t.co/cvoboATcFd
"利用 Mirai Botnet 本身的漏洞,缓解其造成的 DDoS 攻击: https://t.co/cMOYvMUiE9 https://t.co/cvoboATcFd"
-
[ Network ] Monitoring ‘DNS’ inside the Tor network - http://blog.0x3a.com/post/153468210759/monitoring-dns-inside-the-tor-network https://t.co/ciZgjrGKFL
"监控 Tor 网络中的 'DNS': https://t.co/tM56RUXx0L "
-
[ Others ] remote pre-auth single packet DoS of ntpd (exploit included) http://dumpco.re/cve-2016-7434/
"remote pre-auth single packet DoS of ntpd(含 Exp): https://t.co/JiIy7cgtfL"
-
[ Others ] Slides (and soon, code) for my recent talk on automated shellcode generation with encoding restrictions: https://t.co/GuSyEHA1CH
"Synesthesia: A Modern Approach to Shellcode Generation,来自︰Ekoparty 2016 大会议题: https://t.co/GuSyEHA1CH"
-
[ Others ] At @SlackHQ we use Linux Audit to continuously monitor thousands of hosts. Today we are open sourcing our tools. https://t.co/byiHD9Do7A
"go-audit 工具开源,此工具可通过 Syscall 进行网络审计: https://t.co/byiHD9Do7A"
-
[ Others ] The slides of our "Lifting the Fog on RedStar OS" talk from #32c3 are now online: https://github.com/takeshixx/redstar-tools/raw/master/RedStar_OS_32c3.pdf cc: @ 0x79
"朝鲜 RedStar OS 分析(PDF)︰ https://t.co/n7u7VwBJcX "
-
[ Others ] New Lenovo advisory provides mitigation strategy to protect against unauthorized bypass of Microsoft Device Guard: https://t.co/Wi316fTpkU
"Lenovo ThinkPad 的 BIOS 内核驱动存在漏洞,导致 Device Guard 被绕过 (CVE-2016-8222)︰ https://t.co/Wi316fTpkU"
-
[ Others ] Circumventing Malwarebytes Anti-Exploit 1.08 with a single write to memory https://blog.ropchain.com/2016/11/21/circumventing-malwarebytes-anti-exploit-1-08-with-a-single-write-to-memory/
"利用内存写来绕过 Malwarebytes Anti-Exploit(1.08) 漏洞缓解工具: https://t.co/DL864lhOqr"
-
[ Others ] Improving Digital Side Channel Protection with Static Analysis Techniques http://apps.cs.utexas.edu/tech_reports/reports/tr/TR-2228.pdf
"使用静态分析技术提高数字侧信道保护: https://t.co/1ZEePgMUjM "
-
[ Others ] Device Guard Code Integrity Policy Auditing Methodology http://www.exploit-monday.com/2016/11/code-integrity-policy-audit-methodology.html
"Device Guard Code Integrity Policy Auditing Methodology : https://t.co/TvEp0DsjGU"
-
[ Others ] Bypassing Application Whitelisting by using dnx.exe : https://enigma0x3.net/2016/11/17/bypassing-application-whitelisting-by-using-dnx-exe/ cc @ enigma0x3
"利用 dnx.exe 绕过应用白名单︰ https://t.co/sCPuqLh2qh "
-
[ Others ] Reversing & breaking (in)secure HDD enclosures : https://syscall.eu/pdf/2016-Lenoir_Rigo-HDD_PIN.pdf (Slides) , Paper : https://syscall.eu/pdf/2016-Lenoir_Rigo-HDD_PIN-paper.pdf
"Lost your “secure” HDD PIN? We can help! (slides)︰ https://syscall.eu/pdf/2016-Lenoir_Rigo-HDD_PIN.pdf Paper︰ https://t.co/Fvkof51EED"
-
[ Pentest ] aws_pwn : A collection of AWS penetration testing junk : https://github.com/dagrz/aws_pwn
"aws_pwn -- 一个关于 AWS 渗透测试脚本的收集︰ https://t.co/0NmBa0DTTf"
-
[ Tools ] We have two code releases for you today! Windows Intel Processor Trace Driver https://github.com/talos-vulndev/TalosIntelPtDriver and FuzzFlow https://t.co/isTrrvbnNF
"Windows Intel Processor Trace Driver: https://t.co/FD433CGZpJ FuzzFlow: https://t.co/isTrrvbnNF"
-
[ Tools ] Unfolding obfuscated code with Reven (part 1, full write-up) http://blog.tetrane.com/2016/11/reversing-f4b-challenge-part1.html
"使用 Reven 进行代码反混淆: https://t.co/pwL3aJtWKF"
-
[ Tools ] HexRaysPyTools - Plugin assists in creation classes/structures and detection virtual tables. Based on IDAPython. https://github.com/igogo-x86/HexRaysPyTools
"HexRaysPyTools -- 一个可协助创建类、结构及检测虚表的 IDA 插件: https://t.co/BFcm7QouW3"
-
[ Vulnerability ] This advisory covers findings identified by Inverse Path in collaboration with Airbus ICT Industrial Security, affe… https://t.co/vIUoUGS3Qx
"西门子 SIMATIC CP 343-1/CP 443-1 存在两个 Web 漏洞: http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-603476.pdf"
-
[ WirelessSecurity ] New blog post: A journey into the depths of VoWiFi Security https://insinuator.net/2016/10/a-journey-into-the-depths-of-vowifi-security/
"深入了解 VoWiFi 安全性: https://t.co/FIq6RsuO2w"