
腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Attack ] 5th and last part of Kings In Your Castle blog series is out: APT correlation and do-it-yourself threat research https://t.co/YoujBTLn1B
"APT 攻击目标之间的相关性与自主威胁研究: https://t.co/YoujBTLn1B"
-
[ Browser ] RedStar OS: Naenara Browser 3.5 exploit (JACKRABBIT) & others https://www.myhackerhouse.com/naenara-browser-3-5-exploit-jackrabbit/
"利用 CVE-2009-2477 黑掉朝鲜红星操作系统浏览器 Naenara : https://t.co/gRd4eUAExB"
-
[ Conference ] Now Available: Videos from re:Invent 2016 Security and Compliance Sessions https://aws.amazon.com/blogs/security/now-available-videos-and-slide-decks-from-reinvent-2016-security-and-compliance-sessions/
"AWS re:Invent 2016 会议视频发出: https://t.co/ukOaRF22BE"
-
[ Conference ] Material used for the 2016 #MISP training in Zurich (Switch-CERT) & #BotConf workshop (inc. virtual image) https://www.circl.lu/services/misp-training-materials/#switch-misp-training-2016-and-botconf-workshop-2016 #DFIR
"SWITCH MISP Training 2016 (and BotConf workshop 2016) PDF: https://t.co/yGcDzxZrev"
-
[ Crypto ] [BLOG] Differential Fault Analysis on White-box AES Implementations http://blog.quarkslab.com/differential-fault-analysis-on-white-box-aes-implementations.html #reverse #crypto by @ doegox & @ haxelion
"白盒 AES 实现上的差分故障分析: https://t.co/BhRX1qpM8t"
-
[ Hardware ] Small-scale honeynet with Raspberry Pi https://www.redpill-linpro.com/sysadvent/2016/12/19/raspberry-pi-honeynet.html
"用树莓派搭建小型 honeynet: https://t.co/LSpxTwVWPm"
-
[ IoTDevice ] Remote Attacks on vehicles by exploiting vulnerable telematics : http://hitcon.org/2016/pacific/0composition/pdf/1201/1201%20R1%201410%20remote%20attacks%20on%20vehicles%20by%20exploiting%20vulnerable%20telematics.pdf (Slides)
"利用远程信号处理系统攻击汽车(Slides),来自 HITCON Pacific 2016︰ https://t.co/e2kJDlbhuS 会议议题幻灯片已放出: http://hitcon.org/2016/pacific/agenda.htm"
-
[ Others ] Malware Training Sets: A machine learning dataset for everyone - http://marcoramilli.blogspot.cz/2016/12/malware-training-sets-machine-learning.html
"恶意软件训练集之每个人的机器学习数据集: https://t.co/EsgeRsK7P3"
-
[ Others ] Automatic Binary Exploitation and Patching using Mechanical [Shell]Phish : http://hitcon.org/2016/pacific/0composition/pdf/1202/1202%20R2%201510%20automatic%20binary%20exploitation%20and%20patching%20using%20mechanical%20shellphish.pdf (Slides)
"Shellphish 团队在 CGC 比赛中使用的自动化二进制漏洞利用与防御框架介绍(已开源),来自 HITCON Pacific 2016︰ https://t.co/e8Rdk6zBDy "
-
[ Others ] MISP 2.4.57 released including the new feature to enforce warning-lists at API and many new attribute types https://t.co/FF3IgcQFWy
"恶意软件信息分享平台 MISP 2.4.57 发布: https://t.co/FF3IgcQFWy"
-
[ Popular Software ] RCE and Cardholder Data Exfiltration in Oracle's Hotel Management Platform : http://jackson.thuraisamy.me/oracle-opera.html // CVE-2016… https://twitter.com/i/web/status/810800265565704192
"Oracle 酒店管理平台中存在的 RCE 和持卡人数据泄露漏洞分析(CVE-2016-5663/4/5): http://jackson.thuraisamy.me/oracle-opera.html"
-
[ Protocol ] OpenSSH 7.4 released! http://undeadly.org/cgi?action=article&sid=20161219155115
"OpenSSH 7.4 版发布: https://t.co/oINZny1QZl"
-
[ Tools ] merged HalfSipHash, 32-bit version of SipHash motivated by needs of the Linux kernel https://github.com/veorq/SipHash
"新签名算法 SipHash, 可用于缓解 hash-flooding 拒绝服务攻击: https://t.co/lIKjE5u3ph"
-
[ Tools ] #Docker replaced by 100 lines of shell script https://github.com/p8952/bocker (bwo @ parazyd) #VM #Virtualization… https://t.co/FtC69Vcm40
"Bocker -- 基于 bash 开发的 docker 命令辅助工具: https://github.com/p8952/bocker"
-
[ Tools ] morpheus - automated ettercap TCP/IP Hijacking tool https://github.com/r00t-3xp10it/morpheus
"morpheus -- 基于 ettercap 的自动化 TCP/IP 劫持工具: https://t.co/LjF6HYbhnN"
-
[ Virtualization ] Architecting Virtualization Labs for fun,Profit & learning : https://blindseeker.com/AVATAR/AVATAR-12-3-16.pdf (pdf) cc @ da_667
"利用虚拟机搭建网络攻防实验环境教程(PDF)︰ https://t.co/CCPTqZ4D52"
-
[ Virtualization ] XSA-204 - Xen "x86: Mishandling of SYSCALL singlestep during emulation", oops… http://xenbits.xen.org/xsa/advisory-204.html
"由于 Xen 不正确处理 SYSCALL 单步执行存在的漏洞(CVE-2016-10013): https://t.co/K3SI5Jtzkn"
-
[ Windows ] 3/4 Mitigation bounty — 4 techniques to bypass mitigations: https://medium.com/@ mxatone/mitigation-bounty-4-techniques-to-bypass-mitigations-2d0970147f83#.nqp3nj1i0
"绕过 Windows 缓解技术的 4 种方法︰ https://t.co/7sHiehlbMJ"
-
[ WirelessSecurity ] Design and Implementation of Open BTS on Software Defined Radio [PDF] http://www.irdindia.in/journal_itsi/pdf/vol4_iss3/6.pdf #GSM #SDR
"基于 SDR 的 Open BTS 的设计与实现(PDF): https://t.co/7JbYqKpXXl "
-
[ WirelessSecurity ] Demonstration of Vulnerabilities in GSM Security with USRP B200 and Open-Source Penetration Tools https://www.researchgate.net/publication/307544953_Demonstration_of_Vulnerabilities_in_GSM_Security_with_USRP_B200_and_Open-Source_Penetration_Tools #GSM #SDR #OpenBTS
"使用 USRP B200 和开源的渗透测试工具来挖掘 GSM 安全架构中的漏洞: https://t.co/VHdNhRkKdk "
-
[ Crypto ] Wycheproof - Google 新开源的一个加解密库测试套件,用于在加解密库中检测常见的安全缺陷,目前已经有超过 80 个测试用例: http://security.googleblog.com/2016/12/project-wycheproof.html