
腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Android ] TIMA Arbitrary Kernel Module Verification Bypass https://bugs.chromium.org/p/project-zero/issues/detail?id=960
"Android TrustZone TIMA 任意内核模块认证绕过: https://t.co/XkHvqtO2Nc"
-
[ Android ] Latest Android Security Bulletin: https://source.android.com/security/bulletin/2017-01-01.html
"Google 发布 Android 2017 年 1 月安全公告︰ https://t.co/q07nkLMUSw"
-
[ MachineLearning ] An absolute beginner's guide to Machine Learning and Image Classification with Neural Networks : https://github.com/humphd/have-fun-with-machine-learning
"机器学习新手指南︰ https://t.co/ZxBSbHrOdC"
-
[ MalwareAnalysis ] Technical details on the Fancy Bear Android malware (poprd30.apk) http://blog.crysys.hu/2017/01/technical-details-on-the-fancy-bear-android-malware-poprd30-apk/ https://twitter.com/PhysicalDrive0/status/816036960053686272
"Fancy Bear Android 恶意软件技术细节(poprd30.apk) : https://t.co/YfPeHyRxW0 https://t.co/ounJVcetPQ"
-
[ Network ] Explore Hidden Networks With Double Pivoting https://pentest.blog/explore-hidden-networks-with-double-pivoting/
"图解 Meterpreter 实现网络穿透的方法: https://t.co/kiIqK8NrqM"
-
[ Others ] TLS Fingerprinting - a method for identifying a TLS client without decrypting: http://bit.ly/2hIGoNW via… https://t.co/5Zd5QFjOS9
"TLS 指纹收集:一种不用解密就能认证 TLS 客户端的方法"
-
[ Others ] Beyond detection: exploiting blind SQL injections with Burp Collaborator https://blog.silentsignal.eu/2017/01/03/beyond-detection-exploiting-blind-sql-injections-with-burp-collaborator/
"通过 BurpSuite 插件更好的挖掘 SQL 盲注漏洞: https://t.co/aXWno8nrmH"
-
[ Pentest ] Hack the Padding Oracle Lab http://www.hackingarticles.in/hack-padding-oracle-lab/
" PentesterLab 的 Padding Oracle 漏洞靶机测试: https://t.co/rXSqaUntit"
-
[ SecurityProduct ] Kaspersky were using an ACCESS_MASK blacklist instead of filesystem ACLs to protect private keys https://bugs.chromium.org/p/project-zero/issues/detail?id=989. ¯\_(ツ)_/¯
"Kaspersky 本地 CA 证书权限配置不正确,普通用户可读: https://t.co/mscLDVSnvH"
-
[ SecurityProduct ] Kaspersky identified SSL certificates by a 32bit fingerprint (!!!), making it trivial for MITM to create collisions. https://bugs.chromium.org/p/project-zero/issues/detail?id=978
"Kaspersky SSL 证书校验绕过 : https://t.co/XInWtOyyG2"
-
[ Tools ] Introducing Invoke-TheHash - #PowerShell #PassTheHash WMI and SMB command execution https://github.com/Kevin-Robertson/Invoke-TheHash https://t.co/jlJ8n0FHgQ
"Invoke-TheHash:一个 NTLMv2 pass the hash 工具: https://t.co/p1MJvEaVHS https://t.co/jlJ8n0FHgQ"
-
[ Windows ] Windows Kernel Exploitation - Uninitialized Heap Variable Assignment http://dokydoky.tistory.com/445
" Windows 内核溢出教程之未初始化堆变量利用: https://t.co/8jyf93rw7D"
-
[ Windows ] great post :-) is it exploitable in Win10 ? https://twitter.com/Saif_Sherei/status/816356528529829893
"在 Windows 8.1 x64 上通过重用 GDI objects 来利用 MS16-098 RGNOBJ Integer Overflow :Blog : https://sensepost.com/blog/2017/exploiting-ms16-098-rgnobj-integer-overflow-on-windows-8.1-x64-bit-by-abusing-gdi-objects/ Github: https://github.com/sensepost/ms16-098"
-
[ Forensics ] 如何通过自动化重用程序代码,从内存镜像中恢复出属于该程序的可以被人理解的数据(图片、pdf、文档文件等):http://securitygossip.com/blog/2017/01/03/2017-01-03/
-
[ Virtualization ] 科普 VT(Intel 硬件虚拟化) EPT: http://mp.weixin.qq.com/s/3h_kPaHzkRu9_xDJvCtCUg VT 调试器 X64 原码分享: http://mp.weixin.qq.com/s/L3bj0rs1tkYkn1xL9pOwgQ