
腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Debug ] Kernel Debugging 101 – (Part 1) : https://vvalien1.wordpress.com/2016/12/26/kernel-debugging-101/ ,Part 2 : https://vvalien1.wordpress.com/2017/01/01/kernel-debugging-101-part2/ , Part 3: https://vvalien1.wordpress.com/2017/01/01/kernel-debugging-101-part3/ cc @ vvalien1
"Kernel Debugging (Part 1)︰ https://t.co/iVPvCv2VYO Part 2: https://t.co/yryKUnyoUx Part 3: https://t.co/Mg1FlgUVlY "
-
[ Forensics ] Windows 10 PE for Digital Forensics http://ow.ly/ZVl5307KIQN #dfir #digitalforensics
"Windows 10 PE for Digital Forensics: https://t.co/a04KC8oKPZ "
-
[ IoTDevice ] How to get into IoT Hardware Hacking (Introductory Guide) https://blog.securityevaluators.com/the-introductory-iot-hardware-hacking-tool-box-389c4605329f
" IoT Hardware Hacking 工具集介绍 : https://t.co/vWKvri4sqs"
-
[ Malware ] MM Core APT malware is back, Forcepoint has detected 2 new versions http://securityaffairs.co/wordpress/55089/apt/mm-core-apt-malware.html
"MM Core APT 恶意软件再度归来,Forcepoint 已经检测到 2 个新版本: https://t.co/9Nx0FgL524"
-
[ MalwareAnalysis ] Reversing an AV killer driver https://securityintelligence.com/exposing-av-disabling-drivers-just-in-time-for-lunch/
"Reversing an AV killer driver: https://t.co/UPrmiu0LHb"
-
[ MalwareAnalysis ] Deep analysis of malware doc (found by @ JohnLaTwC) using @ enigma0x3's UAC bypass http://bit.ly/2jbyuxr #infosec… https://t.co/EIAFB1w065
" 针对 doc 的恶意文件分析: https://t.co/wKCg41JYPs "
-
[ MalwareAnalysis ] Analyzing a variant of the GM Bot Android malware http://securityaffairs.co/wordpress/55125/malware/gm-bot-android-malware.html
"Android GM Bot 变种分析: https://t.co/0DsiVDaXfb "
-
[ MalwareAnalysis ] 2016 Updates to Shifu Banking Trojan http://researchcenter.paloaltonetworks.com/2017/01/unit42-2016-updates-shifu-banking-trojan/
"针对 Shifu 银行木马的新特性分析,来自 Palo Alto: https://t.co/RTW6uETLdG"
-
[ Others ] How to Bypass Anti-Virus to Run Mimikatz : http://www.blackhillsinfosec.com/?p=5555
"How to Bypass Anti-Virus to Run Mimikatz : https://t.co/VChVJVgbnS"
-
[ Others ] Did you miss @mrjefftang @matrosov's talk on #AV hooking at #zeronights 2016? Never fear, slides here! https://t.co/Ir2nXc6IKs @zeronights
"You're Off the Hook: Blinding Security Software: https://t.co/Ir2nXc6IKs"
-
[ Popular Software ] Analysis of PHPMailer Remote Code Execution Vulnerability (CVE-2016-10033 http://blog.fortinet.com/2017/01/05/analysis-of-phpmailer-remote-code-execution-vulnerability-cve-2016-10033
"PHPMailer 远程代码执行漏洞 (CVE-2016-10033)分析: https://t.co/aNwcc5UP5m "
-
[ Programming ] Free Programming Books : https://github.com/vhf/free-programming-books/blob/master/free-programming-books.md
"较为齐全的编程学习资料合集︰ https://t.co/NRrfhhGqt3"
-
[ SecurityReport ] Intelligence agencies' report on Russian cyberattack and influence operation targeting the 2016 US election: https://t.co/onQUYb04No
"DNI 公布了一份关于 2016 年俄罗斯针对美国大选发起的网络攻击的分析报告︰ https://t.co/onQUYb04No"
-
[ Tools ] New bladeRF 2016.01-rc1 features include updated MATLAB/Simulink, 1pps GPSDO synchronization, SMB clocking support https://t.co/GEUhHXisHw
"bladeRF 2016.01-rc1 发布: https://t.co/GEUhHXisHw"
-
[ Web Security ] Exploiting difficult SQL injection vulnerabilities using sqlmap (Part 1) : http://www.thegreycorner.com/2017/01/exploiting-difficult-sql-injection.html
"使用 sqlmap 对复杂的 SQL 漏洞进行利用(Part 1): https://t.co/JRObxeTiuV"
-
[ WirelessSecurity ] Very good talk about reverse engineering digital radio, here: the #Outernet http://bit.ly/2hu2FUn #satcom #hamradio #33c3 #hackrf #rtlsdr
"Reverse engineering Outernet,来自 33c3 2016 大会: https://t.co/a9BDYRZN5C "