
腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Malware ] Heads up: a new #googledocs phishing scam is here. And it’s able to mask itself as one of your friends. https://mcafee.ly/2pJlnKt
伪造 Google Docs 文档分享进行钓鱼的邮件正在快速传播: https://securingtomorrow.mcafee.com/business/heads-massive-google-doc-phishing-scam-hit-scene-spreading-fast/
-
[ MalwareAnalysis ] New Emotet likes Cookies, C2 Server Responds with Fake 404 https://www.cyphort.com/emotet-cookies-c2-fakes-404/
"来自 Cyphort Labs 团队对 Emotet 银行木马的详细分析: https://www.cyphort.com/emotet-cookies-c2-fakes-404/"
-
[ Mobile ] [CVE-2017-0563] #Nexus 9 Cypress SAR #Firmware #Injection via I2C #Vulnerability https://alephsecurity.com/vulns/aleph-2017009
Google Nexus 9 Cypress 传感器的固件可以通过 I2C 总线注入更新(CVE-2017-0563): https://alephsecurity.com/vulns/aleph-2017009
-
[ Others ] Debug Instrumentation via Flash ActionScript http://blog.checkpoint.com/2017/05/03/debug-instrumentation-via-flash-actionscript/
在分析野外 Flash Exploit 时,如何提高效率。作者的方法是调试器里巧妙地插桩、灵活使用多个反编译工具: http://blog.checkpoint.com/2017/05/03/debug-instrumentation-via-flash-actionscript/
-
[ Others ] [blog] Bypass for PowerShell Warning-level Event Logging of "Suspicious" Commands: https://cobbr.io/ScriptBlock-Warning-Event-Logging-Bypass.html
"绕过 PowerShell 运行可疑命令时记录 ScriptBlock 警告日志的方法: https://cobbr.io/ScriptBlock-Warning-Event-Logging-Bypass.html"
-
[ Popular Software ] CVE-2016-10033 WordPress Core - Unauthenticated Remote Code Execution (#RCE) #PoC #Exploit #infosec #itsecurity https://t.co/7OBxK6XD4q
WordPress 内核 PHPMailer 存在一个远程代码执行漏洞,未授权用户可以通过这个漏洞直接控制 Web 服务器(CVE-2016-10033),4.7.1 之前版本受影响,文章中附针对 4.6 版本的 PoC: https://exploitbox.io/vuln/WordPress-Exploit-4-6-RCE-CODE-EXEC-CVE-2016-10033.html
-
[ Tools ] Using Vim? Configuring or programming SSL/TLS servers? You better use this https://github.com/chr4/sslsecure.vim #crypto #encryption
sslsecure.vim - 一个可用于检测 SSL 错误配置的 VIM 插件: https://github.com/chr4/sslsecure.vim
-
[ Tools ] Exploit Course (Slides) : https://exploit.courses/files/bfh2017/content.html
在分析野外 Flash Exploit 时,如何提高效率。作者的方法是调试器里巧妙地插桩、灵活使用多个反编译工具: http://blog.checkpoint.com/2017/05/03/debug-instrumentation-via-flash-actionscript/
-
[ Tools ] DOMPurify 0.8.9 is out, with further hardening against the Safari DOMParser XSS https://github.com/cure53/DOMPurify/releases/tag/0.8.9
"DOMPurify 0.8.9 发布: https://github.com/cure53/DOMPurify/releases/tag/0.8.9"
-
[ WirelessSecurity ] Just finished uploading all past publications, including code and demo videos. now available at https://github.com/HackingThings/Publications
专注硬件和无线方向的研究员 Mickey Shkatov 整理的他近几年的演讲资料: https://github.com/HackingThings/Publications
-
[ Vulnerability ] PHPCMS V9.6.1 任意文件读取漏洞分析(含PoC,已有补丁): http://bobao.360.cn/learning/detail/3805.html