
腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Browser ] Hunting bugs in the Microsoft Edge Script Engine : https://recon.cx/2017/brussels/resources/slides/RECON-BRX-2017-Your_Chakra_Is_Not_Aligned.pdf (Slides) cc @ natashenka #reconbrx
"Microsoft Edge 脚本引擎 Chakra 的漏洞挖掘,来自 RECON BRX 2017: https://t.co/iGeaGPaUzt "
-
[ iOS ] #iOS 10.3 (14E5260b) OTA [Beta: #iOS103DevBeta4] has been released for 36 devices https://ipsw.me/otas/10.3
"iOS 10.3 OTA 固件下载: https://t.co/A8MktuVACK"
-
[ Malware ] #Unit42 observes threat group distributing new, custom developed malware. Learn more about the Gamaredon Group: http://oak.ctx.ly/r/5gexr
" 从 2013 年到现在,Gamaredon 攻击组织的工具集的进化︰ https://t.co/b2e71y7y81"
-
[ MalwareAnalysis ] NCC Group Blog: Latest ISM RAT analysis used by a group called Greenbug - https://www.nccgroup.trust/uk/about-us/newsroom-and-events/blogs/2017/february/ism-rat/ by our Cyber Defence Ops malware team
"解析远程访问木马 Greenbug: https://t.co/4na2yh45HW "
-
[ MalwareAnalysis ] #Necurs botnet adds SOCKS/HTTP proxy, learns new #DDoS trick - http://bit.ly/2lgvtwp
"习得新 DDoS 技能的 Necurs botnet: https://t.co/p1V7kuKG6L"
-
[ MalwareAnalysis ] #NDSS17 Today Enrico presents MaMaDroid, our paper on Android malware detection from API calls behavior. Read it at… https://t.co/DZmdJsc4MR
"MaMaDroid: 利用行为模式建立 Markov 链用于检测安卓恶意软件: https://arxiv.org/pdf/1612.04433.pdf"
-
[ Mitigation ] The Chakra Exploit and the Limitations of Modern Mitigation Techniques - https://www.endgame.com/blog/chakra-exploit-and-limitations-modern-mitigation-techniques
" Chakra 的漏洞利用及现代缓解技术的局限性: https://t.co/1LBluAGpmC"
-
[ Mobile ] SSD Advisory – HTC Sync Remote Code Execution https://blogs.securiteam.com/index.php/archives/3026
"HTC Sync 软件 v3.3.63 版本被发现了一个远程代码执行漏洞: https://t.co/d4DwZCY6gU"
-
[ Operating System ] How I ended up writing a new real-time kernel : https://dmitryfrank.com/articles/how_i_ended_up_writing_my_own_kernel https://t.co/HvLJ3bogXz
" 如何实现一个实时内核︰ https://t.co/U9N6wNhZRU "
-
[ Others ] ROP Primer - Walkthrough of Level 0: https://xpnsec.tumblr.com/post/156417043491/rop-primer-walkthrough-of-level-0 , Lvl - 1 : https://xpnsec.tumblr.com/post/156575450701/rop-primer-walkthrough-of-level-1 , Lvl 2: https://xpnsec.tumblr.com/post/156732742881/rop-primer-walkthrough-of-level-2 cc @ _xpn_
"ROP Primer - Walkthrough of Level ︰ https://t.co/h6vKmOzW9c Lvl -1: https://t.co/IzCBFjt0f9 Lvl -2: https://t.co/SnXuL7jtPI "
-
[ Pentest ] OS Command Injection to Meterpreter https://hack2rule.wordpress.com/2017/02/25/os-command-injection-to-meterpreter https://t.co/1E1xXNhVgS
"利用 OS 命令注入获取 Meterpreter Session: https://t.co/9GXDjUNuXd "
-
[ Popular Software ] The project integrates #OpenPGP into #Gmail via a #Chrome extension. #E2EMail https://threatpost.com/google-releases-e2email-to-open-source/123923/ via @ threatpost
"Google 将 E2EMail 开源了: https://t.co/ZgxF9CsPCY"
-
[ Popular Software ] Multiple remote code execution vulnerabilities in Iceni Argus PDF Content Extraction affect MarkLogic http://blogs.cisco.com/security/talos/vulnerability-spotlight-multiple-remote-code-execution-vulnerabilities-in-iceni-argus-pdf-content-extraction-affect-marklogic
"Iceni Argus PDF Content Extraction 中存在多个 RCE 漏洞: https://t.co/JRHM1EHEod"
-
[ SecurityProduct ] CVE-2016-9892 - Remote Code Execution as Root via ESET Endpoint Antivirus 6 https://goo.gl/fb/8rFncV #FullDisclosure
"ESET 终端反病毒软件存在一个 Root 远程代码执行漏洞(CVE-2016-9892): https://t.co/gojtdnkxKe "
-
[ Tools ] Just posted my source code to GitHub for reflectively loading a Windows kernel driver https://github.com/Professor-plum/Reflective-Driver-Loader
" Reflective-Driver-Loader -- 用于绕过 KMCS 并从内存将驱动加载到内核的工具: https://t.co/ljtYJpPbcC"
-
[ Tools ] haveIbeenHarvested - Automated HaveIbeenPwned lookups using theharvester results https://github.com/depthsecurity/haveIbeenHarvested
"haveIbeenHarvested -- 可用于判断个人在网络上的信息泄露情况: https://t.co/JlSHZI0UOm"
-
[ Windows ] First post in a series on Windows kernel shellcode on Windows 10 https://improsec.com/blog//windows-kernel-shellcode-on-windows-10-part-1
"Windows kernel shellcode on Windows 10,Windows 10 提升权限时的 Token 窃取技巧: https://t.co/M85q221LSM"
-
[ Windows ] x64 version of my HEVD StackOverflow exploit with SMEP Bypass https://github.com/Cn33liz/HSEVD-StackOverflowX64/blob/master/HS-StackOverflowX64/HS-StackOverflowX64.c Works on Windows 8.1 x64 (ver… https://t.co/m2Fj4nAHiT
" HEVD 栈溢出漏洞驱动的利用代码(x64,Bypass SMEP): https://t.co/XHAeJrF9W7 https://t.co/m2Fj4nAHiT"
-
[ Windows ] This week's release: Windows Kernel Local Denial-of-Service #2: win32k!NtDCompositionBeginFrame (Windows 8-10), http://j00ru.vexillium.org/?p=3151
"Windows 内核本地拒绝服务 #2: win32k!NtDCompositionBeginFrame (Windows 8-10): https://t.co/lvvvACkGBw"