
腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Linux ] Linux/x86_64 - Bind 5600 TCP Port - Shellcode (87 bytes) : https://www.exploit-db.com/exploits/41128/
"Linux/x86_64 Bind 5600 TCP Port Shellcode(87 bytes)︰ https://t.co/Z8nfSzszeO"
-
[ Mobile ] local wifi can access any file including dropbox etc... on LG G3/G4/G5 if they know name https://goo.gl/SsXikc http://goo.gl/q9MMNx
"LG G3/G4/G5 云服务的任意文件读: https://t.co/ucjSNHMzww "
-
[ Others ] Added two more Java deserialization exploits! 1 for Jenkins and 1 for WebLogic. Get'em here https://github.com/CoalfireLabs/java_deserialization_exploits. Feedback welcome
"Java 反序列化漏洞利用脚本收集: https://t.co/oPm3epNnKV"
-
[ Popular Software ] Vulnerability Spotlight: Adobe Acrobat Reader DC jpeg Decoder Vulnerability http://blog.talosintel.com/2017/01/adobe-acrobat-jpeg-vuln.html
"Adobe Acrobat Reader DC JPEG 解码器存在远程代码执行漏洞(CVE-2017-2971): http://blog.talosintel.com/2017/01/adobe-acrobat-jpeg-vuln.html"
-
[ SecurityReport ] 2016 Cyber Attacks Statistics http://www.hackmageddon.com/2017/01/19/2016-cyber-attacks-statistics/ #Infosec
"针对 2016 网络攻击的数据统计: https://t.co/9jJDPEGUHB "
-
[ Tools ] BloodHound 1.2 is here! Changelog and download here - https://github.com/adaptivethreat/BloodHound/releases/tag/1.2
"BloodHound 1.2 发布 : https://t.co/6Vw63CVfpT"
-
[ Tools ] New #BinaryNinja plugin to decompile binary/functions using @ RetDec : https://github.com/hugsy/binja-retdec https://t.co/771Ekq7SMk
"binja-retdec -- BinaryNinja插件,可以使用 RetDec API 来反编译二进制文件: https://t.co/N1iYwy0ISb https://t.co/771Ekq7SMk"
-
[ Vulnerability ] Stopping Malware With a Fake Virtual Machine https://securingtomorrow.mcafee.com/mcafee-labs/stopping-malware-fake-virtual-machine/ @ McAfee #security #malware https://t.co/yZFu85ZQy2
"利用假虚拟机阻止恶意软件: https://t.co/qrhksFclhf "
-
[ Windows ] Geoff Chappel posted a quick userland memory corruption PoC that crashes NT 3.51 to Windows 10 and 2016. Details at https://t.co/gx6Hq6j1yZ
"人为误用 NtCreateProfile 和 NtCreateProfileEx 可以从用户态触发 Windows crash,包括 Windows NT 3.51 到 Windows 10 : https://t.co/gx6Hq6j1yZ "
-
[ Windows ] ArbitraryOverwrite exploit for Win10 x64 v1511 w/ SMEP bypass : https://github.com/GradiusX/HEVD-Python-Solutions/blob/master/Win10%20x64%20v1511/HEVD_arbitraryoverwrite.py cc @ GradiusX https://t.co/NWjPb0FVld
"Win10 x64 v1511 w / SMEP 绕过︰ https://t.co/F4poJg2HyB "