
腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Android ] Official, stable URLs for latest ADB & Fastboot, compiled by Google. No more XDAForums. You're welcome. /cc @jduck https://t.co/0tsaK4wt5D
"最新版 ADB 及 Fastboot 下载 : https://t.co/0tsaK4wt5D"
-
[ Android ] Samsung Android Security Updates - January 2017 http://security.samsungmobile.com/smrupdate.html
"Samsung Android 2017 年 1 月安全更新: https://t.co/Cm6MO7lIeE"
-
[ Android ] Stack buffer overflow in OTP TrustZone trustlet https://bugs.chromium.org/p/project-zero/issues/detail?id=938
"OTP TrustZone trustlet 堆缓冲区溢出: https://t.co/Oi717EcJXA "
-
[ Android ] Android: Kernel memory corruption via unchecked pointer in tzic_ioctl https://bugs.chromium.org/p/project-zero/issues/detail?id=962
"Android tzic_ioctl 中未检查的指针导致内核内存破坏: https://t.co/yEFkeH9caV"
-
[ Linux ] Firejail local root exploit: Posted by Sebastian Krahmer on Jan 04Hi Please find attached PoC for firejail, which… https://t.co/VOlTqmYuRz
"Firejail 本地权限提升: https://t.co/VOlTqmYuRz"
-
[ Others ] Detecting privilege escalation inside of containers using KVM: a new idea in #rkt https://coreos.com/blog/rkt-detect-privilege-escalation.html https://t.co/b4TaJvxt9V
"利用 KVM 在容器内检测提权: https://t.co/BDU3mBnsgH https://t.co/b4TaJvxt9V"
-
[ Others ] #linux #mm [PATCHv2 27/29] x86/mm: add support for 5-level paging for KASLR http://dlvr.it/MzPnrK
"x86/mm: add support for 5-level paging for KASLR: https://t.co/dDZbwirXSL "
-
[ Others ] Shared project: Teensy 3.2 CAN + MicroSD + IO shield v0.2 https://oshpark.com/shared_projects/MemVgGXH https://t.co/VMcCBHpexH
"Teensy 3.2 CAN + MicroSD + IO shield v0.2: https://t.co/fsxageI80C https://t.co/VMcCBHpexH"
-
[ Others ] Fuzz all the things! Pre-built image of American Fuzzy Lop w/ clang, qemu, afl-dyninst, TriforceAFL available here… https://t.co/N3HyabHBsT
"已经集成好 afl 及依赖工具的 docker 镜像: https://hub.docker.com/r/moflow/afl-tools/"
-
[ Others ] A Survey of Symbolic Execution Techniques https://arxiv.org/pdf/1610.00502v1.pdf
"一篇关于符号执行技术的概述: https://t.co/D1ePC55AWk"
-
[ Others ] .@ den_n1s wrote up his intern project on using @ sysdig and falco to create high interaction honeypots https://labs.mwrinfosecurity.com/blog/high-interaction-honeypots-with-sysdig-and-falco
"通过 sysdig 和 falco 工具创建一个高交互性的蜜罐: https://t.co/WdaTcJ5MPy"
-
[ Pentest ] What is LLMNR & WPAD and How to Abuse Them During Pentest ? https://pentest.blog/what-is-llmnr-wpad-and-how-to-abuse-them-during-pentest/
"LLMNR 和 WPAD 介绍以及在渗透测试中的利用: https://t.co/rQyT2qWSBF"
-
[ Sandbox ] Hardening your sandbox to prevent evasion: best practices cheatsheet, by @ fr0gger_ http://unprotect.tdgt.org/images/b/b6/Sandbox-Cheatsheet-1.0.pdf #DFIR
"加固沙盒实践手册: https://t.co/eM4oqVizKB "
-
[ Tools ] Announcing FirePhish! A fully featured phishing framework! Full documentation/instructions are available at… https://t.co/TnDviVkBS1
"FirePhish -- 一个网络钓鱼框架: https://github.com/Raikia/FirePhish"
-
[ Tools ] FLARE Script Series: Querying Dynamic State using the #FireEye Labs Query-Oriented Debugger (flare-qdb) http://bddy.me/2iPIuNE #malware
"FireEye FLARE 支持 Query 语法的调试器: https://t.co/X74QsR5ctM "
-
[ Tools ] Guessing this use of COM scriptlets is pentesting. Read @ subTee for more (https://gist.github.com/subTee/24c7d8e1ff0f5602092f58cbb3f7d302) https://t.co/EkUzR7wHvh
"通过 regsvr32.exe 远程执行脚本: https://t.co/vxHxLNh4ou "
-
[ Tools ] Introducing Backdoorme - a powerful backdooring utility https://github.com/Kkevsterrr/backdoorme
"Backdoorme -- 一个功能强大的自动化后门工具: https://t.co/gtoxqrpVgy"
-
[ Tools ] eyephish : PoC for computer vision phishing domain name generator : https://github.com/phar/eyephish
"eyephish -- 基于计算机视觉库 OpenCV 的钓鱼域名生成库: https://t.co/pVKGfz0kkq"
-
[ Tools ] Google Grumpy is a Python to Go source code transcompiler and runtime https://github.com/google/grumpy
" Grumpy -- python 转 go 源码工具: https://t.co/nBDNovCWzS"
-
[ Tools ] CINtruder v0.3 released... https://goo.gl/fb/p0FLLB #FullDisclosure
"用于绕过带有验证码的 web 登录系统工具 CINtruder v0.3 发布: https://t.co/oksJVneSBC "
-
[ Tools ] FLIRT database repository on GitHub: https://github.com/Maktm/FLIRTDB
" IDA FLIRT 签名文件数据库︰ https://t.co/fskbDo6ylH"
-
[ Vulnerability ] Stack Overflow On UnRTF https://marc.info/?l=oss-security&m=148325785002295&w=2 #infosec #vulnerability
"UnRTF 存在栈溢出漏洞(CVE-2016-10091): https://t.co/aUePSj9lbf "
-
[ iOS ] 针对 32 bit 设备的 iOS 9.3.4 越狱 : https://fce365.info/jailbreak-news/ios-9-3-4-jailbreak-trident-ipa-released-for-32-bit-devices/
-
[ Private ] Proof-of-Concept exploit for Edge bugs (CVE-2016-7200 & CVE-2016-7201): https://github.com/theori-io/chakra-2016-11