
腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Browser ] Part 2 of the BrowserGather project is out, for fileless Chrome cookie extraction with PowerShell. Check it out! https://t.co/7RadNW96Bs
" 浏览器信息收集 part 2: 利用 PowerShell 无文件读取 Chrome Cookie: https://t.co/7RadNW96Bs part 1: http://sekirkity.com/browsergather-part-1-fileless-chrome-credential-extraction-with-powershell/"
-
[ Firmware ] releasing udsploit, an exploit giving arm11 kernel code exec on 3DS firmware 11.3 with @ ylws8 https://github.com/smealum/udsploit
"任天堂 3DS 固件 11.3 arm11 内核代码执行 Exploit: https://t.co/lot8H6wBri"
-
[ Industry News ] Tools used by #Lamberts APT found in #Vault7 dumps - http://bit.ly/2omvX7i https://t.co/poYGRJsmjw
" Vault 7 中曝光的工具正在被 Lamberts 组织的 APT 行动所使用: https://t.co/GvEVL80Uuw ,同时 Kaspersky Lab 对 Lamberts Toolkit 进行了分析: https://securelist.com/blog/research/77990/unraveling-the-lamberts-toolkit/"
-
[ macOS ] Step-by-step guide to macOS source-level kernel debugging using VirtualBox. https://klue.github.io/blog/2017/04/macos_kernel_debugging_vbox
" 借助 VirtualBox 实现 macOS 内核的源码级调试: https://t.co/5M7bxMwdht"
-
[ MalwareAnalysis ] Threat actors use popular android applications to mask Ewind adware. Get the full report from #Unit42 http://oak.ctx.ly/r/5kbcv
"针对 Ewind 的分析,其为一款利用正常应用作外衣的安卓恶意广告软件: https://t.co/HxuDWxbMv4 "
-
[ Others ] A CMake tutorial for Visual C++ developers - CodeProject - https://www.codeproject.com/Articles/1181455/A-CMake-tutorial-for-Visual-Cplusplus-developers
"在 VS2017 中使用 cmake 的教程: https://t.co/mAcGR7nCiZ "
-
[ Pentest ] Wrote a new blogpost on Open Source Intelligence (#OSINT) Gathering 101 - https://blog.appsecco.com/open-source-intelligence-gathering-101-d2861d4429e3 #PenTest #hacking
" 渗透测试公开情报收集技巧: https://t.co/XF3ZFOujeJ "
-
[ Popular Software ] .@ Microsoft patches Word #0day spreading #Dridex malware - http://bit.ly/2o1q0Lf #PatchTuesday
"Windows 今天发布的补丁修复了前两周一直野外传播的 Office .hta OLE2Link 0Day: https://t.co/wViGbS7azS FireEye 刚发了一篇 Blog,介绍这个漏洞的技术细节: https://www.fireeye.com/blog/threat-research/2017/04/cve-2017-0199-hta-handler.html NCC Group 也发了一篇分析该漏洞的 Paper: https://github.com/nccgroup/Cyber-Defence/blob/master/Technical%20Notes/Office%20zero-day%20(April%202017)/2017-04%20Office%20OLE2Link%20zero-day%20v0.4.pdf "
-
[ Popular Software ] Microsoft Office OneNote 2007 DLL side loading vulnerability https://goo.gl/fb/dgqD6u #FullDisclosure
"Microsoft Office OneNote 2007 存在 DLL 劫持漏洞(CVE-2017-0197): http://seclists.org/fulldisclosure/2017/Apr/61?utm_source=feedburner&utm_medium=twitter&utm_campaign=Feed%3A+seclists%2FFullDisclosure+%28Full+Disclosure%29"
-
[ SecurityReport ] #PatchTuesday - #Security updates available for #Adobe #Flash Player: https://adobe.ly/2oT1T6s
"Adobe 发布 4 月安全公告︰ https://t.co/lmUEq0ijYW Adobe Reader: https://helpx.adobe.com/security/products/acrobat/apsb17-11.html Adobe Flash: https://helpx.adobe.com/security/products/flash-player/apsb17-10.html其他产品: https://helpx.adobe.com/security.html "
-
[ Tools ] How to develop an unpacker : http://www.synacktiv.ninja/ressources/unpacking_starforce_synacktiv.pdf (Slides) cc @ elvanderb https://t.co/MawKIwqGpE
"以 StarForce 为例谈如何写一个脱壳工具︰ https://t.co/Om1Wa48OXM "
-
[ Vulnerability ] Multiple local privilege escalation vulnerabilities in Proxifier for Mac https://goo.gl/fb/qIdeyG #FullDisclosure
"Proxifier for Mac 存在多处本地权限提升漏洞: https://www.securify.nl/advisory/SFY20170401/multiple_local_privilege_escalation_vulnerabilities_in_proxifier_for_mac.html "
-
[ Web Security ] Owasp top 10 2017 Release - The top 10 Most critical web application Security Risks : https://github.com/OWASP/Top10/raw/master/2017/OWASP%20Top%2010%20-%202017%20RC1-English.pdf (pdf)
"OWASP Top 10 2017 发布︰ https://t.co/zce5kSyfSx "
-
[ Web Security ] Cross-site (and cross-device!!) side channel to identify Netflix/Youtube videos using deep learning: https://t.co/AgKLkRszZ2 @RoeiSchuster
"不接触用户,远程泄露用户在看的视频信息,比如 Netflix、 Youtube。只要求用户(甚至是局域网其他用户)访问过攻击者特殊构造的网站︰ https://t.co/AgKLkRszZ2 "
-
[ Windows ] Great Post Here: #DFIR Hidden Treasure: Intrusion Detection with ETW (Part 1) https://blogs.technet.microsoft.com/office365security/hidden-treasure-intrusion-detection-with-etw-part-1/ cc: @ zacbrown
"基于 Windows ETW(事件日志)的入侵检测,Windows 提供了针对 PowerShell 的 ETW Provider,可以用来跟踪 PowerShell 脚本的行为: https://t.co/JLkjdJ8hA5"
-
[ WirelessSecurity ] Project Zero blog: "Over The Air: Exploiting Broadcom’s Wi-Fi Stack (Part 2)" by @ laginimaineb - https://googleprojectzero.blogspot.com/2017/04/over-air-exploiting-broadcoms-wi-fi_11.html
"实现 Broadcom Wi-Fi SoC 的代码执行之后,Project Zero 发表第二篇 Blog,研究如何从 Wi-Fi SoC 进一步获得内核的代码执行权限: https://t.co/eukSaSdm1M"
-
[ Industry News ] 微软发布本月的漏洞公告信息: https://portal.msrc.microsoft.com/en-us/security-guidance 致谢信息: https://portal.msrc.microsoft.com/en-us/security-guidance/acknowledgments
-
[ OpenSourceProject ] 17 年没有更新的 bc 项目突然发布了新版本 bc-1.07.tar.gz,bc 是一个用于处理高精度数字的开源库: https://ftp.gnu.org/gnu/bc/