腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Others ] JSM Bypass via createClassLoader https://www.n0tr00t.com/2016/12/30/jsm-Bypass-via-CreateClassLoader.html
"利用 createClassLoader 来绕过 JSM: https://t.co/RkjztLbMc9"
-
[ Others ] Video https://media.ccc.de/v/33c3-8022-memory_deduplication_the_curse_that_keeps_on_giving and slides https://fahrplan.events.ccc.de/congress/2016/Fahrplan/system/event_attachments/attachments/000/003/152/original/33c3_memdedup_curse_slides_final.pdf of my #33c3 talk with @ AntonioHBarresi on memory d… https://t.co/o47Gh9BPVq
"Memory Deduplication: The Curse that Keeps on Giving ,来自 33c3 2016 大会议题: https://fahrplan.events.ccc.de/congress/2016/Fahrplan/system/event_attachments/attachments/000/003/152/original/33c3_memdedup_curse_slides_final.pdf"
-
[ Others ] An intro to SGX from 33c3. http://bit.ly/2inPp0K
" Intel SGX 介绍,来自 33c3 2016 大会议题: https://t.co/Zru7EhJECm"
-
[ Others ] Understanding pool corruption: Part 1 https://blogs.msdn.microsoft.com/ntdebugging/2013/06/14/understanding-pool-corruption-part-1-buffer-overflows/ Part 2 https://blogs.msdn.microsoft.com/ntdebugging/2013/08/22/understanding-pool-corruption-part-2-special-pool-for-buffer-overruns/ Part 3 https://blogs.msdn.microsoft.com/ntdebugging/2013/12/31/understanding-pool-corruption-part-3-special-pool-for-double-frees/
"理解内存池破坏:Part 1 https://blogs.msdn.microsoft.com/ntdebugging/2013/06/14/understanding-pool-corruption-part-1-buffer-overflows/ ; Part 2 https://blogs.msdn.microsoft.com/ntdebugging/2013/08/22/understanding-pool-corruption-part-2-special-pool-for-buffer-overruns/ ; Part 3 https://blogs.msdn.microsoft.com/ntdebugging/2013/12/31/understanding-pool-corruption-part-3-special-pool-for-double-frees/ "
-
[ Tools ] Mini x86: x86 decompiler and emulator : https://github.com/xem/minix86
"Mini x86 -- 包含 x86 文档,反汇编器和模拟器,可运行 MS-DOS 环境的.COM文件︰ https://t.co/xLiVgzQTKM"
-
[ Windows ] I ported the DCR.sys Driver Exploit to Windows 10. This is rugged code. Uses MSBuild to prove a point. https://gist.github.com/subTee/3a2080ea537853bb6aa6ad84a4af5127 Blog Soon ;-)
" Windows 10 DCR.sys 驱动漏洞利用: https://t.co/63if42NGt9 "
-
[ WirelessSecurity ] Keyspace List for WPA on Default Routers http://hashcat.net/forum/thread-6170.html
"各类路由器的默认 WPA Keygen 收集: https://t.co/HZpuDk67ZE"