
腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Android ] Android - IOMXNodeInstance::enableNativeBuffers unchecked index https://bugs.chromium.org/p/project-zero/issues/detail?id=932
"Android - IOMXNodeInstance::enableNativeBuffers unchecked index(CVE-2016-6706): https://t.co/Rc71sUqM3G"
-
[ iOS ] idb - iOS App Security Assessment Tool http://www.kitploit.com/2016/12/idb-ios-app-security-assessment-tool.html
"idb -- 一个 iOS 应用程序安全评估工具: https://t.co/BVv775i6C4"
-
[ macOS ] Abusing the Mac Recovery & OS Update Process : https://speakerdeck.com/patrickwardle/syscan360-2016-abusing-the-mac-recovery-and-os-update-process (Slides) cc @ patrickwardle
"滥用 Mac Recovery 及 OS 更新程序 (Slides),来自 ZeroNights / Syscan360 2016︰ https://t.co/qZP879sV7f
-
[ macOS ] 0day SIP bypass → subvert the OS or install malware in an 'undeletable' manner ? ? https://objective-see.com/blog/blog_0x14.html #0day #SIPbypass #SharingIsCaring
"[0day] 利用本地更新程序绕过 Apple SIP 保护: https://t.co/i7WesFgoDW "
-
[ macOS ] via @mikeymikey mac admins have prev 'abused' El Capitan Installer to bypass SIP for custom deployments https://t.co/pZqQQ7WDU1 great read!
"利用 El Capitan 更新来绕过 SIP(System Integrity Protection) 安全技术: https://t.co/pZqQQ7WDU1 "
-
[ MalwareAnalysis ] Shamoon2 malware samples: https://www.dropbox.com/s/ihunhfmtfol2l6t/shamoon2.zip?dl=1 password: infect3d -has embedded creds for General Auth of Civil Aviation Saudi Arabia :/
"Shamoon2 恶意软件样本︰ https://t.co/tsd6gsew6Z 密码︰ infect3d"
-
[ Others ] New post: One Bit To Rule A System: Analyzing CVE-2016-7255 Exploit In The Wild http://bit.ly/2gGXiNF @ TrendMicro
"一比特控制整个系统:分析 CVE-2016-7255 的野外漏洞利用: https://t.co/9CsyJUZX6p"
-
[ Pentest ] pentest All in one place for pentesters : #python #shellcode #exploit #writeup #bruteforce and more Author: @jivoi https://t.co/7NHcR6L835
"渗透测试方向的攻击脚本资源集: https://t.co/7NHcR6L835"
-
[ Windows ] Microsoft Edge: Info Leak in JSON.parse https://bugs.chromium.org/p/project-zero/issues/detail?id=952
"Microsoft Edge: Info Leak in JSON.parse(CVE-2016-7241): https://t.co/lUnduZHH74 "