
腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Android ] Android: Kernel information disclosure in "maxdsm_read" https://bugs.chromium.org/p/project-zero/issues/detail?id=964
"Android Maxdsm_read 函数导致内核信息泄漏漏洞: https://t.co/fX20mZdaUz "
-
[ Android ] Android: Race condition in max86902 driver sysfs interfaces https://bugs.chromium.org/p/project-zero/issues/detail?id=963
"Android max86902 驱动 sysfs 接口中存在条件竞争漏洞: https://t.co/Oo51njq8fh"
-
[ Android ] CVE-2016-8467: Attacking Nexus 6 & 6P Custom Bootmodes @ MichaelGoberman @ IBMSecurity #netsec https://securityintelligence.com/android-vulnerabilities-attacking-nexus-6-and-6p-custom-boot-modes/
"攻击 Nexus 6 和 6P 自定义启动模式(CVE-2016-8467): https://t.co/JlabuxdcOz"
-
[ Attack ] DragonOK continues to update toolset and target Japanese organizations. Get the full #Unit42 report http://oak.ctx.ly/r/5cfks
"DragonOK 网络攻击团伙继续猖獗,瞄准 日本、台湾、西藏等多个地区,来自 Unit 42 的研究报告: https://t.co/2EmRAGKu8d"
-
[ Browser ] The full list of CSP bypasses with all known vectors that came up during the recent discussions: http://sebastian-lekies.de/csp/bypasses.php
"CSP nonces 绕过合集︰ https://t.co/826WO8YSFd"
-
[ Browser ] [remote] - Microsoft Windows 10 Edge - 'chakra.dll' Info Leak / Type Confusion Remote Code Execution https://www.exploit-db.com/exploits/40990/
"Microsoft Windows 10 Edge 'chakra.dll' 信息泄漏与类型混淆漏洞结合导致远程代码执行(CVE-2016-7200、CVE-2016-7201): https://t.co/pQF1TkSM8L"
-
[ Browser ] Reverse Engineering and things I don't want to forget: Building Webkit on Windows http://djmanilaice.blogspot.com/2017/01/building-webkit-on-windows.html?spref=tw
"Building Webkit on Windows: https://webkit.org/webkit-on-windows/"
-
[ Forensics ] #DFIR Cheat Sheets http://www.dfir.training/index.php/lists/dfir-infographics
"DFIR cheat Sheets: https://t.co/8W6ncCQRLu"
-
[ Language ] Some notes on Luz - an assembler, linker and CPU simulator http://eli.thegreenplace.net/2017/some-notes-on-luz-an-assembler-linker-and-cpu-simulator/
"Luz 备忘 - 汇编器,链接器和CPU模拟器: https://t.co/AByEjfhKCd"
-
[ Language ] Getting started writing 6502 assembly language : https://skilldrick.github.io/easy6502/
" 6502 汇编语言入门︰ https://t.co/dhqGdraFrl"
-
[ macOS ] task_t considered harmful - many XNU EoPs https://bugs.chromium.org/p/project-zero/issues/detail?id=837
"task_t considered harmful - many XNU EoPs(CVE-2016-4625 CVE-2016-7613) https://t.co/DrgaLnEdeL"
-
[ MalwareAnalysis ] Technical analysis of CryptoMix/CryptFile2 ransomware https://www.cert.pl/en/news/single/technical-analysis-of-cryptomixcryptfile2-ransomware/ by @ CERT_Polska_en
"针对 CryptoMix/CryptFile2 勒索软件的技术分析: https://t.co/YeuHRypyvz "
-
[ Network ] IP, DNS & Domain Enumeration Cheatsheet : https://www.rebootuser.com/?p=2189 cc @ rebootuser
"IP、DNS 、Domain 枚举备忘册︰ https://t.co/JuZktClWd7 "
-
[ Pentest ] [Blog] Lateral Movement using the MMC20.Application COM Object: https://enigma0x3.net/2017/01/05/lateral-movement-using-the-mmc20-application-com-object/
"利用 MMC20.Application 组件远程执行命令︰ https://t.co/AWb3F1IKmU"
-
[ Pentest ] Extracting Saved Credentials From a Pwn3d Nessus System https://www.appsecconsulting.com/blog/extracting-saved-credentials-from-a-pwn3d-nessus-system/
"从被控制的 NESSUS 扫描器系统中提取保存的凭证信息: https://t.co/dIGCOXvfjW"
-
[ Protocol ] S4U2Pwnage http://www.harmj0y.net/blog/activedirectory/s4u2pwnage/ constrained delegation and S4U2Self/S4U2Proxy, a follow on to @ meatballs__'s post https://t.co/VETJKSvweM
"Active Directory 的 S4U2Self/S4U2Proxy 协议扩展及安全研究 : https://t.co/grJJptc9N9 "
-
[ SecurityProduct ] hmmm 2017 began with my own packet of death vulnerability/reported :) https://blog.exodusintel.com/2016/02/10/firewall-hacking
"思科防火墙 IKE 协议堆溢出(CVE-2016-1287)漏洞分析与利用: http://blog.exodusintel.com/2016/02/10/firewall-hacking/ "
-
[ Tools ] HexInject : A very versatile packet injector and sniffer : http://hexinject.sourceforge.net/
"HexInject v1.6 发布 -- 一个网络数据报文篡改工具︰ https://t.co/QgKItiv1p3"
-
[ Tools ] dress : add symbols back into a stripped ELF binary (~strip) : https://github.com/docileninja/dress
"dress -- 为 strip 过的 ELF 二进制文件添加调试符号: https://t.co/f1s80sdjal"
-
[ Windows ] When whitelisting 3rd party software signed w/ a cert issued by a common issuer, Device Guard "Publisher" rules FTW. https://technet.microsoft.com/en-us/itpro/windows/keep-secure/deploy-code-integrity-policies-policy-rules-and-file-rules#code-integrity-file-rule-levels
"部署代码完整性策略 - 策略及文件规则 (Windows 10): https://t.co/654vbB6apq"
-
[ WirelessSecurity ] Hacking and Cloning a Garage Door Opener using SDR Radio #SDR #GnuRadio #Hacking https://www.youtube.com/watch?v=LE1CvGWqSsw
"使用 SDR Radio Hacking 车库门开启装置: https://t.co/yS9CxtF3CJ "
-
[ WirelessSecurity ] How we broke into your house:Hacking alarm systems with rtl-sdr and rfcat #SDR #RTL #rfcat http://boredhackerblog.blogspot.hk/2016/02/how-we-broke-into-your-house.html https://t.co/EaxbjFHzou
"利用 rtl-sdr和 rfcat 黑掉报警系统,闯进你的家: https://t.co/T44Uw4GdSH https://t.co/EaxbjFHzou"
-
[ Windows ] 之前有报道称微软将会移除 CMD,完全用 PowerShell 替代,这篇 Blog 表示这是个谣言, CMD 不会被移除: https://blogs.msdn.microsoft.com/commandline/2017/01/04/rumors-of-cmds-death-have-been-greatly-exaggerated/
-
[ SecurityProduct ] SANS 研究员警告一种新的基于 PDF 的钓鱼诈骗方式: https://threatpost.com/experts-warn-of-novel-pdf-based-phishing-scam/122896/
-
[ Windows ] 来自 ESET 的 Windows Exploitation 2016 趋势报告: http://www.welivesecurity.com/2017/01/05/windows-exploitation-2016/