
腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Android ] Derestricted a fun vuln yesterday; bypassing the TrustZone-enforced kernel module verification. https://bugs.chromium.org/p/project-zero/issues/detail?id=960
"TrustZone TIMA 任意内核模块认证绕过: https://t.co/6wzCrGajH4"
-
[ Backdoor ] Debugging mechanism in Intel CPUs allows seizing control via USB port : http://www.slideshare.net/phdays/tapping-into-the-core (Slides) , Video : https://www.youtube.com/watch?v=QuuTLkZFsug
"基于 Intel DCI 接口的硬件后门(Slides),可通过 USB 3.0 访问 JTAG 调试接口︰ https://t.co/t6jEkS4TFL Video︰ https://t.co/gJ6X0W23k9"
-
[ Browser ] JavaScript Regular Expressions are now 7-15% faster in V8. Updates & tips on keeping your RegExps fast by @schuay https://t.co/RUhQOlpCyd ?
"V8 JavaScript 引擎提升了正则表达式的性能: https://t.co/RUhQOlpCyd "
-
[ IoTDevice ] IoT mode fuzzing with OpenBTS #GSM #SDR #IoT #GNURadio https://cn0xroot.com/2017/01/10/iot-mode-fuzzing-with-openbt/ http://www.freebuf.com/articles/wireless/124147.html https://t.co/PCHUY6uLni
"使用OpenBTS基站测试物联网模块 IoT mode fuzzing with OpenBTS: https://t.co/pa58wmTmzy "
-
[ Linux ] updated Linux tools diagram (PNG & SVG) with recent bcc additions http://www.brendangregg.com/linuxperf.html https://t.co/ek5CMy3oUU
"Linux 各个层级、模块对应的调试工具一览: https://t.co/tMyCAxSzAS "
-
[ MalwareAnalysis ] The second wave of Shamoon 2 attacks have been identified. Get the full #Unit42 report http://oak.ctx.ly/r/5cpsh
"第二波 Shamoon 2 攻击袭来,来自 Unit42: https://t.co/v4BQHOtVKC"
-
[ MalwareAnalysis ] Clickjacking campaign abuses Google Adsense, avoids ad fraud bots https://blog.malwarebytes.com/cybercrime/2017/01/clickjacking-campaign-abuses-google-adsense-avoids-ad-fraud-bots/
"Clickjacking campaign abuses Google Adsense, avoids ad fraud bots: https://t.co/IoKJuwgxfz"
-
[ MalwareAnalysis ] Partial Evaluation of String Obfuscations for Java Malware Detection https://kar.kent.ac.uk/53716/7/main.pdf
"Java 恶意软件检测之字符串混淆评测: https://t.co/0pHZTTlFqQ ;"
-
[ Popular Software ] Command execution on Ansible controller from host https://www.computest.nl/advisories/CT-2017-0109_Ansible.txt
"自动化管理工具 Ansible controller 命令执行漏洞(CVE-2016-9587) https://t.co/KPNU4sE4Yn "
-
[ Popular Software ] New advisory and poc for Adobe Flash Player vulnerability found by the COSIG. https://cosig.gouv.qc.ca/en/cosig-2017-01-en/
"Adobe Flash Player 远程命令执行漏洞 (CVE-2017-2930): https://t.co/T69yK8QWj4"
-
[ SecurityReport ] #PatchTuesday - #Security updates available for #Adobe #Flash Player: https://adobe.ly/2iB4awy
"Adobe 发布 1 月安全公告︰ https://t.co/zCEpSmh1hA"
-
[ SecurityReport ] Microsoft Security Bulletin Summary for January 2017 https://technet.microsoft.com/library/security/ms17-jan
"Microsoft 发布 1 月安全公告: https://t.co/JaBvFdNfwt"
-
[ SecurityReport ] Just blogged: A data breach investigation blow-by-blow http://ift.tt/2izh91P
"eroticy.com 网站数据泄露调查: https://t.co/dcsjgTmWlR"
-
[ Tools ] Announcing Alacritty, a GPU-accelerated terminal emulator written in #rustlang http://blog.jwilm.io/announcing-alacritty/
"Alacritty -- 一个基于 GPU 加速的终端模拟器: https://t.co/Zuu3IPoNAU ;"
-
[ Tools ] ceed : A tiny x86 compiler with ELF and PE target : https://github.com/intellectualheaven/ceed , Details : http://logicpundit.com/blog/ceed/
"ceed -- 小型 ELF&PE 编译器︰ https://t.co/X2gvm6W2Hz 详情︰ https://t.co/byMHik0N71"
-
[ Tools ] Build your own Bad USB Stick for pentesting with wifi and dip switches http://bit.ly/2i8Xpko #infosec #hacking… https://t.co/caCZqaiTm5
"Teensy Payload 生成器: https://t.co/xEoIKQvuyo "
-
[ Tools ] An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically http://www.kitploit.com/2017/01/autolocalprivilegeescalation-automated.html
"AutoLocalPrivilegeEscalation -- 一个针对 linux 的自动化提权脚本: https://t.co/N4aAmVyxfA"
-
[ Tools ] Inspector : Privilege Escalation unix helper (Forensics, Kernel exploit list, process) : https://github.com/graniet/Inspector
"Inspector -- unix 系统提权辅助工具 ︰ https://t.co/1mIAeW6wGx"
-
[ Tools ] Fluxion – Automated EvilAP Attack Tool http://www.darknet.org.uk/2017/01/fluxion-automated-evilap-attack-tool/
"Fluxion -- 自动 EvilAP 攻击工具: https://t.co/N5TPC1YyXr"
-
[ Vulnerability ] CVE-2016-7056 ECDSA P-256 timing attack key recovery (OpenSSL, LibreSSL, BoringSSL) http://seclists.org/oss-sec/2017/q1/52
"ECDSA P-256 timing attack key recovery (OpenSSL, LibreSSL, BoringSSL): https://t.co/hMfzxw2RUi"
-
[ Vulnerability ] Terror Exploit Kit? More like Error Exploit Kit https://www.trustwave.com/Resources/SpiderLabs-Blog/Terror-Exploit-Kit--More-like-Error-Exploit-Kit/
"Terror Exploit Kit? More like Error Exploit Kit: https://t.co/fNJiTx4WIO"
-
[ Windows ] Great work on Windows Intel PT driver, now support kernel mode tracing. Cool guys @richinseattle and @aall86 !. https://t.co/WH0imtqunT
"为 Windows Skylake 架构中提供处理器 trace 功能的驱动: https://t.co/WH0imtqunT"
-
[ Windows ] Walkthrough of CVE-2016-7255 (PrivEsc) with working POC for Windows 7, 8.1, 10, and 2012 R2 http://ricklarabee.blogspot.com/2017/01/virtual-memory-page-tables-and-one-bit.html
"Windows Win32k 提权漏洞 CVE-2016-7255 分析: https://t.co/G6jnPSWw5E"
-
[ Linux ] GrSecurity 对于 Linux Reuse Attack Protector (RAP) 保护特性的说明文档: https://grsecurity.net/rap_faq.php
-
[ Private ] Windows 10 build 15002 中,Edge 浏览器 Exports 导出表中的函数也不再是 Valid CFG Call Targets 了: https://twitter.com/epakskape/status/818617656886497280 https://twitter.com/mxatone/status/818652168399880192
-
[ Android ] Android 设备管理组件 AirDroid 存在多个漏洞: https://labs.mwrinfosecurity.com/advisories/airdroid-multiple-vulnerabilities/
-
[ Network ] 以大站的名义:专注地下产业的网络基础设施: http://blog.netlab.360.com/fraudulent-top-sites-a-dedicated-underground-market-infrastructure-chinese