
腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Browser ] IE11 and the attack of the zombies. https://www.brokenbrowser.com/zombie-alert/ Persistent script that runs *even* after the user lef… https://twitter.com/i/web/status/833691414185771011
"IE11 和僵尸 alert: https://t.co/jg0SJkjeTe https://t.co/MQijGnBCHm"
-
[ Conference ] Looking for the slides to our talks at #RSAC2017 in the IoT Sandbox? Look no further, they are all linked here!… https://t.co/kzZuzgBVgp
"IoT Village 团队整理的 RSA 2017 大会关于 IoT 议题的 PPT: https://www.iotvillage.org"
-
[ Detect ] Defeating Dynamic Data Kernel Rootkit Attacks via VMM-based Guest-Transparent Monitoring : https://www.csc2.ncsu.edu/faculty/xjiang4/pubs/ARES09.pdf (pdf)
"通过虚拟机监控(VMM)实现对 Dynamic Data Kernel Rootkit 的检测︰ https://t.co/9pIvH544wr "
-
[ Linux ] Web Server Exploitation with SSH Log Poisoning through LFI http://www.hackingarticles.in/web-server-exploitation-ssh-log-poisoning-lfi/
"通过污染 SSH 日志攻击 Web 服务器: https://t.co/wFT8rrkw64"
-
[ Others ] Pretty good write up describing AV detection and bypass techniques. http://ow.ly/sC7P3099pDx
"免杀的艺术,文章主要介绍如何绕过杀软检测: https://t.co/1cvvQkkt3t 之前还推送过作者的演讲 Paper: https://www.exploit-db.com/docs/40900.pdf "
-
[ Others ] Posh-Sysmon Module for Creating Sysmon Configuration Files http://www.darkoperator.com/blog/2017/2/17/posh-sysmon-powershell-module-for-creating-sysmon-configuration-files
"用于创建 Sysmon 配置文件的 posh-sysmon 模块: https://t.co/eSbHRNHSEU"
-
[ Others ] Post on bypassing application whitelisting and Powershell Constrained Language Mode remotely by chaining bypasses https://improsec.com/blog//babushka-dolls-or-how-to-bypass-application-whitelisting-and-constrained-powershell
"如何绕过应用白名单和受限的 PowerShell: https://t.co/2eBlF76HhZ "
-
[ Popular Software ] NCC Group Advisory: Shell Injection in MacVim mvim URI handler - https://www.nccgroup.trust/us/about-us/newsroom-and-events/blog/2017/february/technical-advisory-shell-injection-in-macvim-mvim-uri-handler/?Year=2017&Month=2 by @ dan_crowley
"MacVim mvim URI Handler 存在 shell 注入漏洞:: https://t.co/04R2Whkqwn "
-
[ Popular Software ] NCC Group Advisory: Shell Injection in SourceTree - https://www.nccgroup.trust/us/about-us/newsroom-and-events/blog/2017/february/technical-advisoryshell-injection-in-sourcetree/?Year=2017&Month=2 by @ dan_crowley
"Mac 版 SourceTree 存在 shell 注入漏洞: https://t.co/DiTtjsd46D "
-
[ Programming ] I published the EBook "The Ultimate Question of Programming, Refactoring, and Everything" at Intel: https://t.co/CWyRHwyvUI Please retweet.
"C++ 编程的 42 条建议︰ https://t.co/CWyRHwyvUI"
-
[ SecurityProduct ] Java/Python FTP Injections Allow for Firewall Bypass : http://blog.blindspotsecurity.com/2017/02/advisory-javapython-ftp-injections.html cc @ ecbftw
"基于 Java 和 Python 的 FTP 服务器在进行 URL 解析时存在协议流注入可被用于绕过防火墙限制︰ https://t.co/XLpCSY3zd0 "
-
[ Tools ] GitLeaks - Search Engine for exposed secrets on the web https://gitleaks.com/
" Gitleaks -- 用于寻找 GitHub 中泄露的敏感信息的搜索引擎: https://t.co/OyeHZmB1Ik "
-
[ Tools ] Tool for easily generating sketches for Arduinos to deliver HID attacks via keyboard emulation https://github.com/RedLectroid/OverThruster
"OverThruster -- Arduinos 上的 HID 攻击 Payload 生成器: https://t.co/dFlhXOvvtO "
-
[ Web Security ] MySQL Out-of-Band Hacking : https://osandamalith.com/2017/02/03/mysql-out-of-band-hacking/ , Pdf : https://www.exploit-db.com/docs/41273.pdf cc @ OsandaMalith https://t.co/YKoCiY8uz7
"MySQL Out-of-Band 注入攻击︰ Pdf https://t.co/T2hRZHt1DP"
-
[ Web Security ] SQL injection in an UPDATE query - a bug bounty story! http://zombiehelp54.blogspot.ro/2017/02/sql-injection-in-update-query-bug.html
"UPDATE 查询中的 SQL 注入 - Bug Bounty 故事: https://t.co/CqkTdRjEmp"
-
[ Windows ] Windows 10 Lock Screen: Abusing the Network UI for Backdoors (and how to disable it) http://www.mathyvanhoef.com/2017/02/windows-10-lock-screen-abusing-network.html
"Windows 10 锁屏界面可以允许修改连接的无线网络,所以攻击者可以在用户锁屏时使用户连接上一个攻击者控制的网络环境: https://t.co/hOyoVFQdPk"
-
[ WirelessSecurity ] Flipping Bits and Opening Doors reverse engineering a wireless security device by @ sirus https://duo.com/blog/flipping-bits-and-opening-doors-reverse-engineering-the-linear-wireless-security-dx-protocol
" Linear DX 电子门卡系统的无线控制协议逆向: https://t.co/SWHzKfO73K"
-
[ ReverseEngineering ] BlackHat 专题:Flash漏洞利用样本逆向分析艺术(来自 Seebug 的译文): http://paper.seebug.org/224/#0-tsina-1-97355-397232819ff9a47a7b7e80a40613cfe1
-
[ Private ] 这几个月搞研究,还是出来了一些好东西。DVE的利用,还有一些别的安全方面的一些问题,侧信道、过DEP+RFG+CFG的办法等等。其中一个对象就发现3个比较有意思的漏洞,2个分别可以单独的形成很好的利用,1个可以对付ASLR等。 过段时间内部分享分享。这些年利用方面还是算出了很多原创,window最先获取API地址解决通用性,c代码写shellcode、数据通道、内存修改web、内存传播、ASPCODE的堆利用、TEB指针、Seh、dve、内核替换token、safemode、Rpc的完善的利用等等。
-
[ Private ] 侧信道攻击,关键是某种我们需要的信息和另外一种不被关注但可以测量的信息发生了一些可以求解的关联。GC的弱标记清除算法里面,数据和对象没有区分,数据也被当成对象做标记,这样数据就和对象发生了关联,如果某个数据和另外的对象相同,对象就不能被释放。 报告的时候微软就死活不认为这是漏洞,现在都还没修补。
-
[ APT ] 关于俄罗斯 APT28 组织的所有资料汇总: http://contagiodump.blogspot.com/2017/02/russian-apt-apt28-collection-of-samples.html