
腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Android ] backdoor-apk : a shell script that simplifies the process of adding a backdoor to any Android APK file : https://github.com/dana-at-cp/backdoor-apk
"backdoor-apk -- 一个 shell 脚本,使用它可简化向 Android APK 添加后门的过程︰ https://t.co/JyLD0VoxT8"
-
[ Browser ] Chakra JIT CFG Mitigation Bypass http://theori.io/research/chakra-jit-cfg-bypass
"利用 Chakra JIT native code buffer 绕过 CFG: https://t.co/wpZ4IpmuBf"
-
[ Hardware ] #DNSChanger exploit kit attack targets routers, not browsers - #malvertising http://bit.ly/2hBS7if
"研究人员发现一款针对路由器的漏洞利用攻击套件:DNSChanger: https://t.co/qcrywKxF8n"
-
[ Hardware ] (1/6) The following is a list of all the car hacking papers written by me and @nudehaberdasher. In total 342 pages of info.
"car hacking papers: (part 1): http://illmatics.com/car_hacking.pdf ; (part 2): http://illmatics.com/car_hacking_poories.pdf (part 3): http://illmatics.com/remote%20attack%20surfaces.pdf (part 4): http://illmatics.com/Remote%20Car%20Hacking.pdf (part 5): http://illmatics.com/can%20message%20injection.pdf"
-
[ Linux ] Remote code exec in Ubuntu desktop all versions http://goo.gl/QENks7
"通过攻击 Crash Reporter 进一步控制 Ubuntu 桌面系统(版本>=12.10): https://t.co/uE5rRM9Hz5"
-
[ macOS ] macOS FileVault2 Password Retrieval http://blog.frizk.net/2016/12/filevault-password-retrieval.html
"macOS FileVault2 密码检索: https://t.co/qW39HTUPv4"
-
[ macOS ] XNU kernel UaF due to lack of locking in set_dp_control_port https://bugs.chromium.org/p/project-zero/issues/detail?id=965
"XNU 内核的 set_dp_control_port 函数缺少锁操作,经过线程间的条件竞争后可导致 UAF 漏洞: https://t.co/JCDWzA0K7m"
-
[ MalwareAnalysis ] Let It Ride: The Sofacy Group’s DealersChoice attacks continue http://oak.ctx.ly/r/5b8kd #Unit42
"APT 组织 Sofacy 使用 DealersChoice 漏洞利用平台继续发起攻击: https://t.co/uskrppW5Mw "
-
[ MalwareAnalysis ] Goldeneye Ransomware – the Petya/Mischa combo rebranded https://blog.malwarebytes.com/malwarebytes-news/2016/12/goldeneye-ransomware-the-petyamischa-combo-rebranded/
"针对 Goldeneye 勒索软件的分析: https://t.co/arqdIt7sHZ"
-
[ MalwareAnalysis ] Proper analysis of Mirai's DGA https://twitter.com/GovCERT_CH/status/809338059548459008
"Mirai 病毒 DGA 特性的重实现: https://www.govcert.admin.ch/blog/25/when-mirai-meets-ranbyus"
-
[ Others ] .@ Microsoft, @ Google to block @ Adobe Flash by default in Edge, Chrome - http://bit.ly/2hzeury
"Microsoft、Google 将在 Edge 和 Chrome 浏览器中禁用 Flash,转而支持 HTML5: https://t.co/YN9gVzBz9T"
-
[ Others ] Intel PIN, Cheatz, Hax, And Detection Part 1 http://www.gironsec.com/blog/2016/12/intel-pin-cheatz-hax-and-detection-part-1/
"Intel PIN, Cheatz, Hax, And Detection Part 1 : https://t.co/W77Ita06Gg"
-
[ Others ] Long read for you today on vulns in third-party code libraries finding their way into apps. https://threatpost.com/code-reuse-a-peril-for-secure-software-development/122476/ via @ threatpost
"使用第三方库所带来的风险研究: https://t.co/Brq49URNsx"
-
[ Pentest ] SS7 Pentesting Toolkit: ss7MAPer https://n0where.net/ss7-pentesting-toolkit-ss7maper/ #InfoSec #CyberSecurity
"SS7 Pentest Toolkit -- 基于通讯信号协议 SS7 的渗透测试套件 https://t.co/kwMO6N0TSx "
-
[ Pentest ] Injecting Flask - Template Injection attacks https://nvisium.com/blog/2015/12/07/injecting-flask/
"Flask 框架注入科普: https://t.co/1Wj0A6P5yJ"
-
[ Popular Software ] Simple Bug allows Hackers to Read all your Private #Facebook Messenger Chats http://thehackernews.com/2016/12/hack-facebook-messenger-chats.html #security https://t.co/MRrtnozgJX
"仅仅通过一个小 Bug ,Hacker 就能够浏览你所有 Facebook Messenger 聊天记录: https://t.co/jCjSgQ6H6T"
-
[ Popular Software ] Nice. Twitter expands 2-factor auth to third party TOTP apps, including Google Authenticator. https://twitter.com/safety/status/809171110293975041
"Twitter 扩展了对第三方 TOTP应用程序(包括 Google 身份验证器)的双因素验证: https://t.co/dxTiM0fvuS"
-
[ Popular Software ] Nagios Core < 4.2.4 Root Privilege Escalation [CVE-2016-9566] https://goo.gl/fb/2oKf1W #FullDisclosure
"Nagios Core < 4.2.4 提权漏洞 (CVE-2016-9566): https://t.co/a0i3N74Gzk #FullDisclosure"
-
[ Popular Software ] XenForo 1.5.x Unauthenticated Remote Code Injection https://goo.gl/fb/81rmBJ #FullDisclosure
"XenForo 1.5.x 存在远程代码注入漏洞: https://t.co/QGgkgmrTg1 "
-
[ SecurityReport ] Research report: Vulnerability Disclosure Attitudes and Actions - from the NTIA Awareness and Adoption Group http://r-7.co/2gONWRV
"针对漏洞披露和处理中的态度及方法调查报告,该报告从研究人员与厂商两个维度出发做了调查研究: https://t.co/yhbHON4ag8"
-
[ Web Security ] postMessage XSS on a million sites https://labs.detectify.com/2016/12/15/postmessage-xss-on-a-million-sites/
"AddThis widget 因调用 postMessage API 而导致上百万网站存在 XSS 漏洞: https://t.co/pXooYm8N5X"
-
[ Windows ] Find out how we bypass application whitelisting using msiexec, using a technique discovered by @benpturner https://t.co/splL95ngdB ?
"有趣的 Windows 二进制 - 使用 msiexec 绕过应用程序白名单: https://t.co/splL95ngdB "
-
[ WirelessSecurity ] BLE-Security #Hacking #Bluetooth Low Energy Locks #BTLE #IoT #Security https://github.com/merculite/BLE-Security
"针对 BLE(低功耗蓝牙) 锁的攻击脚本: https://t.co/0PmAyL1MAt"
-
[ Hardware ] JTAG Explained (finally!): Why "IoT" Software Security Engineers and Manufacturers Should Care,JTAG 调试入门文章: http://blog.senr.io/blog/jtag-explained
-
[ Exploit ] yuange 对漏洞利用思想的解释: 只要注意处处是学问。安全就是一些特性的积累和组合。安全漏洞利用就是你能控制什么?怎么传递这种控制? ms08-068的利用就是这种控制传递的经典例子: http://weibo.com/2246379231/EmbyzdTa0?type=comment http://weibo.com/2246379231/EmbRYuidx?ref=collection&type=comment http://weibo.com/2246379231/EmbU6xdWb?ref=collection&type=comment
-
[ Network ] The Query Volumes of Mirai DGAs: https://blog.opendns.com/2016/12/13/query-volumes-mirai-dgas/
-
[ Browser ] UXSS on Microsoft Edge – Adventures in a Domainless World(译): http://paper.seebug.org/143/
-
[ OpenSourceProject ] Chrome 的开发者工具可以调试 Node.js 了: http://v8project.blogspot.com/2016/12/v8-nodejs.html