
腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Android ] Android get_user/put_user Exploit https://cxsecurity.com/issue/WLB-2016120148
"Android get_user/put_user Exp(CVE-2013-6282): https://t.co/yHP0fqDcq3"
-
[ Attack ] 650Gbps DDoS Attack from the Leet Botnet (Not Mirai) https://www.incapsula.com/blog/650gbps-ddos-attack-leet-botnet.html
"Leet Botnet 发起 650Gbps DDoS 攻击: https://t.co/ddVNFo9n1N "
-
[ Browser ] This sec-critical vuln seems to be fixed, double-free in Firefox JavaScript Engine (51) https://gist.github.com/revskills/3e6efaa8bd399a3de0ef99220cd4bde1 bz#1293258
"revskills 攻破 Firefox JS 引擎的 PoC: https://t.co/tfZJplnVT2 "
-
[ Conference ] Recon Brussels 2017 talks list has been released https://recon.cx/2017/brussels/
"Recon Brussels 2017 大会入选议题公布: https://t.co/5n6vgC4PA7"
-
[ iOS ] Slides for my Pegasus Internals talk at #33c3 https://speakerdeck.com/mbazaliy/pegasus-internals
"Pegasus Internals(Slides),来自 33c3 2016 大会: https://t.co/eBLhwTT6mo"
-
[ Others ] Kernel 101 – Let’s write a Kernel : http://arjunsreedharan.org/post/82710718100/kernel-101-lets-write-a-kernel ,Part 2 : http://arjunsreedharan.org/post/99370248137/kernel-201-lets-write-a-kernel-with-keyboard cc @ Arjun024
"让我们来编写个内核(Part 1)︰ https://t.co/NhwVjpJHWl,Part 2: https://t.co/T7OFNpFDr8 "
-
[ Others ] Guessing this use of COM scriptlets is pentesting. Read @ subTee for more (https://gist.github.com/subTee/24c7d8e1ff0f5602092f58cbb3f7d302) https://t.co/EkUzR7wHvh
"通过 regsvr32.exe 远程执行脚本: https://gist.github.com/subTee/24c7d8e1ff0f5602092f58cbb3f7d302"
-
[ Others ] Compiler-Agnostic Function Detection in Binaries https://syssec.mistakenot.net/papers/eurosp-2017.pdf
"二进制文件中检测函数的方法(Paper): https://t.co/VkbuXaweS1"
-
[ Popular Software ] Sweet, a first PHPMailer PoC: https://github.com/opsxcq/exploit-CVE-2016-10033
"PHPMailer < 5.2.18 远程代码执行漏洞 PoC: https://t.co/fiAc7tmQTo"
-
[ Popular Software ] Arbitrary file deletion vulnerability in Image Slider allows authenticated… https://goo.gl/fb/YPsK2T #FullDisclosure
"WordPress 插件 Image Slider 存在任意文件删除漏洞: https://t.co/GrZfVcYTqu"
-
[ Protocol ] Multipath TCP : Breaking today's networks with tomorrow's protocol : http://docplayer.net/4350923-Multipath-tcp-breaking-today-s-networks-with-tomorrow-s-protocol.html (Slides)
"Multipath TCP : Breaking today's networks with tomorrow's protocol ︰ https://t.co/hzmlHL6qTu"
-
[ Tools ] brut3k1t : Brute-force attack that supports multiple protocols and services : https://github.com/ex0dus-0x/brut3k1t
"brut3k1t -- 一个支持多协议的服务端爆破模块︰ https://t.co/AERGA9PR7A"
-
[ Tools ] Fern Wifi Cracker – Wireless Security Auditing Tool http://www.darknet.org.uk/2016/12/fern-wifi-cracker-wireless-security-auditing-tool/
"Fern Wifi Cracker — — 一个无线安全审计工具: https://t.co/MK7GUwpqY8"
-
[ Tools ] ufgraph - script which parses the output of the uf (un-assemble) command in WinDBG & uses graphviz to generate CFG https://github.com/bfosterjr/ufgraph
"ufgraph -- 为 WinDBG 生成 CFG 的脚本 https://t.co/F6hbJJrVj9"
-
[ Windows ] Cool poc to bypass LFH randomization https://github.com/saaramar/Deterministic_LFH
"绕过 LFH(低碎片堆) 随机化 : https://t.co/GvQ0Fhe6us"
-
[ Windows ] Great summary & examples of Control Flow Guard's current capabilities https://twitter.com/trailofbits/status/813701150365122561
"对安全特性 CFI 的分析总结: https://blog.trailofbits.com/2016/12/27/lets-talk-about-cfi-microsoft-edition/ "
-
[ WirelessSecurity ] OpenBTS is not super obvious how to setup. Maybe this post will help someone. https://blog.strcpy.info/2016/11/16/running-openbts-with-the-nuand-bladerf-on-ubuntu-the-definitive-guide/ #BladeRF #HackRF #SDR @ strcpy_
"OpenBTS 安装运行指南: https://t.co/Srx4DYUGft"
-
[ MalwareAnalysis ] 移动平台流量黑产研究——色情播放器类恶意软件产业链: http://blogs.360.cn/blog/porn_player_underground_industry/
-
[ Popular Software ] PHPMailer 命令执行漏洞(CVE-2016-10033)分析(含通用POC): https://www.leavesongs.com/PENETRATION/PHPMailer-CVE-2016-10033.html