
腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Android ] Second part of my intro "Hacking Android apps with Frida" (@fridadotre) online: Solving @Owasp Android Uncrackable 1 https://t.co/jq4KefLfh0
"Hacking Android apps with FRIDA II - Crackme: https://t.co/jq4KefLfh0"
-
[ Browser ] Microsoft Edge: Chakra incorrect jit optimization with TypedArray setter. https://bugs.chromium.org/p/project-zero/issues/detail?id=1045
"Microsoft Edge Chakra TypedArray setter JIT 优化过程不正确导致的类型混淆漏洞(CVE-2017-0071): https://t.co/G8M4QaPwww"
-
[ Browser ] Microsoft Edge: Undefined behavior on some getters https://bugs.chromium.org/p/project-zero/issues/detail?id=1043
"Edge 一些 getters 未定义行为触发的 UAF(CVE-2017-0070): https://t.co/VsHJ9LiOLU"
-
[ Browser ] MS Edge (Again): Spoofing the Address-bar thanks to SmartScreen Malware Warning. https://www.brokenbrowser.com/bypass-the-patch-to-keep-spoofing-the-address-bar-with-the-malware-warning/ [ Bypass… https://twitter.com/i/web/status/842129410606129155
"利用 Edge 浏览器的恶意软件警告页面实现地址栏欺骗,虽然微软已经发补丁修复这个问题,但这篇 Blog 介绍如何 Bypass 这个补丁: https://t.co/jmuuxD3dSe "
-
[ Bug Bounty ] Some news from #CanSecWest: @ Intel, @ Microsoft announce #bugbounty programs - http://bit.ly/2n19rm0
"Intel 发布了第一份漏洞悬赏计划,奖励发现其硬件高危漏洞者 3 万美金;同时,微软针对 Microsoft Office Insider 也发布了漏洞悬赏计划: https://t.co/3wapLNoOB3"
-
[ Challenges ] #Pwn2Own #CanSecWest https://t.co/lziChascDE
"Pwn2Own Targets and Awards: https://t.co/lziChascDE"
-
[ Challenges ] Welcome to Pwn2Own 2017 - The Schedule https://www.zerodayinitiative.com/blog/2017/3/15/welcome-to-pwn2own-2017-the-schedule
"Pwn2Own 2017 Schedule,比赛当前战况: https://t.co/POfjueTbnn"
-
[ Industry News ] GitLab acquires Gitter, will open-source the code http://venturebeat.com/2017/03/15/gitlab-acquires-software-chat-startup-gitter-will-open-source-the-code/
"GitLab 收购了 Gitter,并打算将其开源: https://t.co/nBRWMT3tFw"
-
[ Malware ] New #Linux #malware has shell execution and DDoS capabilities. Learn more here: http://bit.ly/2lGmeuy https://t.co/aF98CoBV2F
-
[ MalwareAnalysis ] Ursnif Malware http://resources.infosecinstitute.com/ursnif-malware/
"Ursnif 恶意软件分析: https://t.co/XeVdJRxGU3"
-
[ MalwareAnalysis ] .@ Unit42_Intel investigates NexusLogger: a new cloud-based keylogger primarily distributed via phishing emails… https://twitter.com/i/web/status/842103145165611010
"NexusLogger 一个基于云平台的 keylogger, Unit42 针对其进行了分析 : http://researchcenter.paloaltonetworks.com/2017/03/unit42-nexuslogger-new-cloud-based-keylogger-enters-market/?adbsc=social70815306&;adbid=842103145165611010&adbpl=tw&adbpr=4487645412"
-
[ MalwareAnalysis ] New post: MajikPOS Combines PoS Malware and RATs to Pull Off its Malicious Tricks http://bit.ly/2ms5v9P @ TrendMicro
"针对 PoS 恶意软件 MajikPOS 的分析: https://t.co/360L3DImyw "
-
[ Others ] Practical Cryptanalysis of JSON Web Token https://www.cs.bris.ac.uk/Research/CryptographySecurity/RWC/2017/nguyen.quan.pdf
"Json Web Signature(go-jose) 的安全性分析: https://t.co/OQTM7zcI5U"
-
[ Others ] Our #SMS blog series is complete! Part 3: https://www.contextis.com/resources/blog/wap-just-happened-my-samsung-galaxy/ Part 2: https://www.contextis.com/resources/blog/targeting-android-ota-exploitation/ Part 1 :… https://t.co/cZfYL2YPED
"Context 团队发表了三篇关于 SMS PDU 相关的文章,介绍短信 PDU 的潜在攻击界面,最新的这篇文章介绍他们发现的可以通过短信远程触发的 Android Samsung Galaxy 手机中的漏洞 part 3︰ https://t.co/XjGFiJYtUq part 2: https://t.co/q0rZCjqwsv part 1: https://t.co/cZfYL2YPED"
-
[ Popular Software ] Nice ones :) - WhatsApp & Telegram vulnerability writeup for account takeover http://blog.checkpoint.com/2017/03/15/check-point-discloses-vulnerability-whatsapp-telegram/
"Check Point 公开 Whatsapp 和 Telegram 中存在漏洞,此漏洞危及上百万用户 : https://t.co/37Kg7tOA5m"
-
[ SecurityReport ] [Blog] Still Getting Served: A Look at Recent #Malvertising Campaigns Involving #Exploit Kits http://bddy.me/2mJlan3
"FireEye 对近期恶意广告(Malvertising Campaigns)的分析报告: https://t.co/KU0kMx1cHZ"
-
[ Tools ] Small IDA Pro guide on how to run it from a chroot with schroot on Linux 64Bit using our own version of python: https://t.co/l6OgbHlNSl
"如何让 IDA Pro 使用我们提供的 Python 版本以及如何在 Chroot 的环境中运行 IDA Pro︰ https://t.co/l6OgbHlNSl"
-
[ Tools ] BrainDamage - A fully featured backdoor that uses Telegram as a C&C server http://www.kitploit.com/2017/03/braindamage-fully-featured-backdoor.html
"BrainDamage -- 利用 Telegram 作为 C&C 服务器的远程控制工具: https://t.co/qIqkHDDKwx"
-
[ Tools ] GammaRay is a really nice tool for inspection and RE'ing a Qt application (works on Linux too) - https://www.kdab.com/development-resources/qt-tools/gammaray/
"GammaRay -- 用于检查和操作运行中的 Qt 应用程序内部的工具: https://t.co/Wl6c2N3xIQ Github: https://github.com/KDAB/GammaRay/wiki/Getting-GammaRay"
-
[ Tools ] RpcView - powerfull RPC interface explorer (http://www.rpcview.org/features.html) now w/ source code - https://github.com/silverf0x/RpcView
"RpcView -- 探索 RpcView : https://t.co/eoEYnEouC2 Github: https://t.co/rDtXmkP0A3"
-
[ Vulnerability ] IBM WebSphere Remote Code Execution Java Deserialization https://cxsecurity.com/issue/WLB-2017030142
"利用 IBM WebSphere Java 反序列化漏洞进行远程代码执行的 MSF 漏洞利用脚本: https://t.co/5FXyrchaHk"
-
[ Windows ] Fileless UAC Bypass using CompMgmtLauncher.exe -- http://x42.obscurechannel.com/?p=368
"Fileless UAC Bypass using CompMgmtLauncher.exe : https://t.co/rVFyc79plj"
-
[ Windows ] PCAUSA Rawether for Windows local privilege escalation #0day #exploit http://blog.rewolf.pl/blog/?p=1778 https://t.co/6mwW0RE4ZY
"利用 PCAUSA 的驱动通信框架 Rawether 实现 Windows 本地提权: https://t.co/uXe9wzAXoT "
-
[ Windows ] Injecting a DLL without a remote thread: http://blogs.microsoft.co.il/pavely/2017/03/14/injecting-a-dll-without-a-remote-thread/ https://t.co/OXVsX9ElRr
"通过异步过程调用(APC)来实现 DLL 注入: https://t.co/7t7FF5vKLQ "
-
[ Industry News ] 当地时间 2017 年 3 月 15 日在加拿大温哥华举办的 Pwn2Own 2017 上,腾讯玄武实验室的 Ether 战队仅用 10 秒成功攻破微软 Edge 浏览器,也是整场比赛第一个攻破浏览器的队伍: http://www.chinanews.com/it/2017/03-16/8175167.shtml
-
[ Pentest ] 如何渗透测试 Node.js APP: http://resources.infosecinstitute.com/penetration-testing-node-js-applications-part-1/
-
[ Popular Software ] MySQL Out-of-Band 注入攻击: http://weibo.com/ttarticle/p/show?id=2309404085632950477326