
腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Android ] Infected firmware spotted in well-known low-cost Android devices http://securityaffairs.co/wordpress/54360/malware/low-cost-android-devices.html
"Doctor Web的专家发现了有新的木马‘入驻’ Android 智能手机及其平板电脑的固件中: https://t.co/vFIGWmwNha "
-
[ Attack ] Modbus Stager: Using PLCs as a payload/shellcode distribution system http://www.shelliscoming.com/2016/12/modbus-stager-using-plcs-as.html
"Modbus Stager: 将 PLCs 设备作为 payload/shellcode 分发系统: https://t.co/8EbvYBeFDR"
-
[ Browser ] Project Zero guest blog post: "Chrome OS exploit: one byte overflow and symlinks" - https://googleprojectzero.blogspot.com/2016/12/chrome-os-exploit-one-byte-overflow-and.html
"Chrome OS 漏洞利用:DNS库中1个字节的溢出,来自 Project Zero: https://t.co/xd2x1PtBWV"
-
[ Firmware ] Practical Reverse Engineering a router(Part 5)- Digging Through Firmware: http://jcjc-dev.com/2016/12/14/reversing-huawei-5-reversing-firmware/ 4: http://jcjc-dev.com/2016/06/08/reversing-huawei-4-dumping-flash/ cc @ Palantir555
"逆向华为路由器实战(part 5)之固件漏洞挖掘︰ https://t.co/9qbldtljFe "
-
[ Hardware ] New post: Home Routers: Mitigating Attacks that can Turn them to Zombies http://bit.ly/2h0oPsO @ TrendMicro
"缓解路由器的攻击面,避免成为僵尸路由器: https://t.co/FYW76xrGnj "
-
[ IoTDevice ] Some brilliant exploits collected by GeekPwn could lead to a systematic study of IoT devices' security flaws #BHASIA http://ow.ly/Hdno3076r0i
"BlackHat ASIA 2017 议题推荐:IoT 中的漏洞挖掘与漏洞利用技术;议者总结过往 3 年中 GeekPwn 上那些真实生活中的漏洞,并介绍其中一些精妙的漏洞利用技术: https://t.co/gzLQyfAoOW"
-
[ Linux ] Linux 4.9 allows introspecting to enumerate all the namespaces on a system (description + Golang example program); https://t.co/Klk49adash
"Linux 4.9 新特性允许枚举命名空间的关系: https://t.co/Klk49adash"
-
[ MalwareAnalysis ] Nymaim using MAC addresses to uncover virtual environments and bypass antivirus http://feedproxy.google.com/~r/nakedsecurity/~3/zx9a3jywFsc/
"恶意软件 Nymaim 使用 MAC 地址来逃避沙盒检测和绕过防病毒 https://t.co/vfujhMtYW3"
-
[ MalwareAnalysis ] Been shopping lately? Fake credit card email can spook you into downloading Cerber ransomware https://blogs.technet.microsoft.com/mmpc/2016/12/13/been-shopping-lately-fake-credit-card-email-can-spook-you-into-downloading-cerber-ransomware/
"最近购物了吗? 假的信用卡电子邮件会欺骗你下载 Cerber 勒索软件: https://t.co/ZxqHI4PjBp"
-
[ Others ] IE/Edge Workers SOP bypass using leaked script errors thanks to base href or importScripts) http://www.brokenbrowser.com/workers-sop-bypass-importscripts-and-basehref/ https://t.co/1kse7COZvJ
"IE/Edge Workers 类通过修改 basehref 并引入外部脚本可绕过 SOP 限制: https://t.co/XcXugVuzUV https://t.co/1kse7COZvJ"
-
[ Others ] For our 14th advent calendar gift, we analyzed not less than all available Wordpress plugins with RIPS https://blog.ripstech.com/2016/the-state-of-wordpress-security/
" Wordpress 插件安全漏洞总结: https://t.co/MgbrtHRfK4"
-
[ Others ] Google Discloses Contents of Eight National Security Letters: https://threatpost.com/google-discloses-contents-of-eight-national-security-letters/122488/ via @ threatpost
"Google 公开了的八份国家安全信函内容: https://t.co/G3hJqvuQ10"
-
[ Others ] Project Springfield - Microsoft fuzz testing service, implemented in F# https://blogs.msdn.microsoft.com/dotnet/2016/12/13/project-springfield-a-cloud-service-built-entirely-in-f/
"Project Springfield -- 用纯 F# 构建的 Microsoft 云 fuzz 服务: https://t.co/s9z5Lk2rhp"
-
[ Others ] Apple Security Update https://support.apple.com/en-us/HT201222 https://t.co/LHOnpqVird
"Apple 发布安全更新,修复了 97 个漏洞,涵盖 macOS、iCloud、iTunes 和 Safari: https://t.co/GlVlEize0V "
-
[ Others ] Metadata Recovery From Obfuscated Programs Using Machine Learning http://mediatum.ub.tum.de/doc/1340143/1340143.pdf
"利用机器学习从被混淆的程序中恢复元数据: https://t.co/g1FAGqpHPP"
-
[ Popular Software ] Nagios Core < 4.2.2 Curl Command Injection Exploit PoC (CVE-2016-9565) : https://legalhackers.com/advisories/Nagios-Exploit-Command-Injection-CVE-2016-9565-2008-4796.html
"监控系统 Nagios Core < 4.2.2 存在 Curl 命令注入漏洞,含 PoC (CVE-2016-9565): https://t.co/I5gVOOPQlP"
-
[ Popular Software ] Adobe Animate <= v15.2.1.95 Memory Corruption Vulnerability https://goo.gl/fb/Ryggxp #FullDisclosure
"Adobe Animate <= v15.2.1.95 内存破坏漏洞(CVE-2016-7866): https://t.co/cCWU6mTyJQ "
-
[ Popular Software ] Reflected XSS in MailChimp for WordPress could allow an attacker to do… https://goo.gl/fb/tuVEc0 #FullDisclosure
"WordPress 插件 MailChimp 存在反射型 XSS 漏洞: https://t.co/nsjrV88K8X"
-
[ SecurityReport ] A really interesting document on evolution of #phishing attacks! Worth reading .. A Decade of Phishing from RSA https://t.co/DLNtDGWBQ0
"网络钓鱼十年路,报告中介绍了网络钓鱼这些年来的演化: https://t.co/DLNtDGWBQ0 "
-
[ SecurityReport ] Security Bulletin 2016. Review of the year. Overall statistics for 2016: https://securelist.com/analysis/kaspersky-security-bulletin/76858/kaspersky-security-bulletin-2016-executive-summary/ https://t.co/HRLvUeklkD
"kaspersky 2016 年安全公告,对今年一年的数字化回顾︰ https://t.co/FuNvZfzEsr https://t.co/HRLvUeklkD"
-
[ Tools ] #BloodHound is a tool to analyze and understand #ActiveDirectory Trust Relationships. Amazing ;) cc: @binitamshah… https://t.co/Pguqq1oMvu
"BloodHound -- 可用来分析和理解 Active Directory 信任关系的工具: https://t.co/Pguqq1oMvu"
-
[ Vulnerability ] Vulnerability Spotlight: Joyent SmartOS http://blogs.cisco.com/security/talos/vulnerability-spotlight-joyent
"Joyent smartos 中的漏洞: https://t.co/NTw1LzAsIL"
-
[ Windows ] [BLOG] CVE-2016-7259: An empty file into the blue: a tale of a crash in win32k.sys http://blog.quarkslab.com/cve-2016-7259-an-empty-file-into-the-blue.html
"CVE-2016-7259︰ win32k.sys 处理打印机字体 PFM、PFB 时存在的漏洞: https://t.co/8UvgfexJ6F "
-
[ WirelessSecurity ] Bluetooth Attacks on Commercial-Grade Electronic Locks : http://www.somersetrecon.com/blog/2016/10/14/electronic-safe-lock-analysis-part-2- , Demo : https://www.youtube.com/watch?v=4lkJsRkwGXY
-
[ Browser ] ChakraCore Array.prototype.reverse CVE-2016-7202 漏洞的 Git 提交日志: https://github.com/Microsoft/ChakraCore/commit/fc7ea25190ecba4827f2e784e3788ef75909cc4a