
腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Industry News ] Stegano Exploit Kit now uses the Diffie-Hellman Algorithm http://securityaffairs.co/wordpress/59284/malware/stegano-exploit-kit-diffie-hellman.html
" Stegano Exploit Kit 现已使用 Diffie-Hellman 算法进行CC通信: https://t.co/SHrVvkWaK4 "
-
[ Others ] @ timstrazz @ revskills @ Shopify Slides: https://goo.gl/HXkPdG Vulnerable docker environment:… https://t.co/QnvBCWzyfW
" 脚本引擎漏洞挖掘与利用技术详解: https://t.co/QnvBCWzyfW "
-
[ Pentest ] Playing with the regsrv32 applocker bypass http://atropineal.com/2017/05/20/playing-with-the-regsrv32-applocker-bypass/
" regsrv32 Applocker Bypass 实战: http://atropineal.com/2017/05/20/playing-with-the-regsrv32-applocker-bypass/ "
-
[ Sandbox ] Using RegisterApplicationRestart as a (lame) sandbox evasion http://www.hexacorn.com/blog/2017/05/20/using-registerapplicationrestart-as-a-lame-sandbox-evasion/ #DFIR #malware
" 利用 Windows 系统提供的 RegisterApplicationRestart 应用重启功能,Bypass 沙盒检测环境: https://t.co/n12K0BZP7w "
-
[ Tools ] Check out @NCCGroupInfosec's "Sobelow" project, a security-focused static analysis tool for Phoenix https://t.co/LE4fVWbBor
" Sobelow - 针对 Phoneix 框架的安全性静态分析工具: https://t.co/LE4fVWbBor "
-
[ Tools ] My #PowerShell projects are available on github http://ift.tt/2fgsnJg
" PowerShell 脚本集合,可管理 AD、SCCM、Exchange 等多种应用: https://t.co/BoiHLHdxbh "
-
[ Vulnerability ] sighax (Nintendo 3DS BootROM exploit) finally released! Get it here: http://www.sighax.com
" sighax - 33C3 会议上公开的针对 Nintendo 3DS/2DS/New3DS 的 BootROM Exploit,它利用的是 RSA 签名的解析漏洞: https://t.co/Q03w027CB9 "
-
[ Windows ] Microsoft Windows 7/2008 R2 x64 EternalBlue Remote Code Execution https://cxsecurity.com/issue/WLB-2017050144
" NSA SMB EternalBlue exploit for Windows 7/2008: https://t.co/YCaQa5jEyI "
-
[ Windows ] Adding a new Bytecode Instruction to the CLR : http://mattwarren.org/2017/05/19/Adding-a-new-Bytecode-Instruction-to-the-CLR/ cc @ matthewwarren
" 如何给微软开源的 .NET Core CoreCLR 添加一个新的字节码指令支持: https://t.co/3td9bRXQvb "