
腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ APT ] New blog post on Red|Blue: Automating APT Scanning using the Open Source Loki APT Scanner and Splunk! https://goo.gl/7zyuhS Thx @ cyb3rOps
" 使用 loki scanner 和 splunk 进行自动化 APT 扫描: https://t.co/rtv2o7OoiN "
-
[ Browser ] MS Edge - SOP bypass abusing of the reading mode view. Spoof the user! Courtesy of the read: pseudo-protocol ??… https://twitter.com/i/web/status/853943139626831873
"利用 Edge 浏览器的阅读模式( read: 伪协议)实现地址栏欺骗,然后进一步利用 <object data:> 实现完整的页面伪造: https://www.brokenbrowser.com/sop-bypass-abusing-read-protocol/"
-
[ Browser ] Phishing with Unicode Domains - https://www.xudongz.com/blog/2017/idn-phishing/
"Unicode 特殊字符与 URL 结合带来的地址栏欺骗问题,影响 Firefox 浏览器: https://t.co/bn9dMG0L1t"
-
[ Browser ] Mozilla kills Firefox Aurora channel, builds will move directly from Nightly to Beta https://venturebeat.com/2017/04/17/mozilla-kills-firefox-aurora-channel-builds-will-move-directly-from-nightly-to-beta/
"Firefox 将不再有 Aurora 版,以后会直接从 Nightly 版本到 Beta 版本。之前 Aurora 版本会包含所有标记 'experimental' 的特性: https://t.co/EV8kVZf5Nz"
-
[ Browser ] Attacking Microsoft Edge to identify users by leaking URLs from Fetch requests http://mov.sx/2017/04/16/microsoft-edge-leaks-url.html
"在 Microsoft Edge 中通过 Fetch 请求来泄露 URLs 以识别用户: https://t.co/amoyawDusP"
-
[ Industry News ] .@ VMware fixes critical RCE in vCenter Server - http://bit.ly/2oijCAt https://t.co/PnJ5lg2F1m
"VMware 修复 vCenter Server 的 RCE 漏洞(CVE-2017-5641), 来自ThreatPost : https://t.co/hZmD0mXjRH "
-
[ Industry News ] This trend holds for all heap boundary violation CVEs (read & write). Historically, heap out-of-bound reads have be… https://twitter.com/i/web/status/854026092738338816
"一张图了解近几年微软修补的堆破坏漏洞趋势: https://t.co/326BnfkZkA"
-
[ Industry News ] Wave of Java-Based RATs Target Tax Filers: https://threatpost.com/wave-of-java-based-rats-target-tax-filers/125006/ via @ threatpost
"针对税务员(Tax Filer)的 JAVA 后门攻击波来袭: https://t.co/CqU4Ls5lZT"
-
[ Linux ] CVE - CVE-2017-7889 - CVE http://nzzl.us/rC56qkz
"Linux kernel 4.10.10 中的 mm 子系统没有适当的执行CONFIG_STRICT_DEVMEM 保护机制导致本地用户可读/写内核内存(CVE-2017年-7889): https://t.co/7qKqTB8c8m"
-
[ Others ] Rigorous Analysis of Software Countermeasures against Cache Attacks http://software.imdea.org/~bkoepf/papers/pldi17.pdf
"Rigorous Analysis of Software Countermeasures against Cache Attacks(paper): https://t.co/S52EE20eXU"
-
[ Others ] A list of publicly known but unfixed security bugs : https://github.com/ludios/unfixed-security-bugs
"一份关于已公开却未被修复的漏洞列表︰ https://t.co/55WTfDChqP"
-
[ Others ] [Good Read] Using Debugging Tools to Find Token and Session Leaks https://blogs.technet.microsoft.com/askds/2017/04/05/using-debugging-tools-to-find-token-and-session-leaks/
"用调试器找到 Token 以及泄露的 Session: https://t.co/f1oXAlmnXl"
-
[ Others ] Calling JNI Functions with Java Object Args from Cmd Line https://calebfenton.github.io/2017/04/14/calling_jni_functions_with_java_object_arguments_from_the_command_line/ Great follow-up on https://t.co/gn3QYN4Lik @ caleb_fenton
"如何从命令行调用 Android JNI 函数并传递 Java 对象参数: https://t.co/2XysrqU1ff https://t.co/gn3QYN4Lik "
-
[ Tools ] #Nmap Converter - Python script for converting nmap reports into XLS https://github.com/mrschyte/nmap-converter
"nmap-converter - 将 nmap 扫描报告转换为 XLS 文件的 Python 脚本: https://t.co/J8RaWLFn1j"
-
[ Tools ] We've run some quick analysis on the latest Shadow Brokers dump. Weird obfuscation decisions, stolen code and more https://t.co/PazX3VCwgM ?
"针对最近 Shadow Brokers 曝光的 NSA 工具的简单分析: https://t.co/PazX3VCwgM "
-
[ Tools ] Made a new script to automatically setup an Apache2 Mod_Rewrite redirector. Blog Post here: https://blog.inspired-sec.com/archive/2017/04/17/Mod-Rewrite-Automatic-Setup.html
"自动化配置安装 Apache Mod-Rewrite 模块以方便渗透测试的脚本︰ https://t.co/FosN58ZrIF"
-
[ Virtualization ] Our @ WEareTROOPERS slides from #TR17 with @ mikhailgorobets @ c7zero: Attacking hypervisors through hardware emulation https://www.troopers.de/downloads/troopers17/TR17_Attacking_hypervisor_through_hardwear_emulation.pdf
"通过硬件模拟接口攻击 Hypervisor: https://t.co/baMxyj141P "
-
[ Conference ] Android Security Symposium 2017 会议的视频和 PPT: https://usmile.at/symposium/program https://www.youtube.com/playlist?list=PL61IkVbNYniXoAXEFtftfElcSDNZoCLpe