
腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Android ] An open source android emulator in the browser : https://medium.com/alter-way-innovation/announcing-aic-2-0-an-open-source-android-cloud-emulator-8571b06c424d https://t.co/XGizl0X6Pf
" AiC 2.0 - 一个开源的 Android 云模拟器,可以在浏览器里操作 Android 实例: https://t.co/9e5nMNk7Ct "
-
[ Conference ] Awesome, IEEE Security & Privacy @ IEEESSP #SP17 papers are publicly available during the event. http://www.ieee-security.org/TC/SP2017/program.html …
" 第 38 届 IEEE 隐私与安全研讨会的日程表,其中部分议题资料已经公开: https://t.co/FYVeA3q8OT "
-
[ Hardware ] SSD vulnerabilities could allow attackers to corrupt data, shorten device lifespan https://www.bleepingcomputer.com/news/hardware/ssd-drives-vulnerable-to-attacks-that-corrupt-user-data/
" 攻击 SSD 硬盘的两种方式简介: https://t.co/ckYsQBaBJW "
-
[ Hardware ] An Analysis of Emission Defeat Devices in Modern Automobiles (viz Volkswagen) : https://www.ieee-security.org/TC/SP2017/papers/101.pdf (pdf) cc @ thorstenholz
" 针对汽车厂商(大众、菲亚特)在尾气排放检测中使用的“作弊”设备 Defeat Device 的分析 : https://t.co/Eyl6tCDn55 "
-
[ MalwareAnalysis ] Ransomware Chronicle's : http://privacy-pc.com/articles/ransomware-chronicle.html
" 勒索软件编年史(16-17年): https://t.co/DDseErHhBz "
-
[ OpenSourceProject ] An epic survey of #javadeser RCE vulns/exploits across 13 different Java serialization technologies by Moritz Bechl… https://t.co/4hk94oSCnG
" Java Unmarshaller Security - Java 多个开源 marshalling 库中存在的对象序列化漏洞研究: http://seclists.org/oss-sec/2017/q2/307?utm_source=dlvr.it&utm_medium=twitter Github: https://github.com/mbechler/marshalsec/ "
-
[ Others ] Building a botnet on PyPi https://hackernoon.com/building-a-botnet-on-pypi-be1ad280b8d6
" PyPi 允许用户自己注册模块,并且可以以 Python 内置的软件包,比如 sys。这篇 Blog 中作者认为可以利用这个特性实现 Botnet: https://t.co/n9StRjnxft "
-
[ Others ] Joomla 3.7.0 SQL Injection proof of concept exploit https://github.com/XiphosResearch/exploits/tree/master/Joomblah
" Exploit for Joomla 3.7.0 (CVE-2017-8917): https://t.co/fHzoFbM4aD "
-
[ Others ] Linux: eBPF verifier log leaks lower half of map pointer https://bugs.chromium.org/p/project-zero/issues/detail?id=1251
" Linux 内核 eBPF verifier 的日志会泄露内核指针的一半字节: https://t.co/Co55VF1lmD "
-
[ Others ] Video: Defrag Tools #177 - Windows Internals 7th Edition Part 1 @ aionescu https://channel9.msdn.com/Shows/Defrag-Tools/Defrag-Tools-177-Windows-Internals-7th-Edition-Part-1
" Defrag Tools 第 177 期对 Windows Internals 7th Edition Part 1 新书的介绍: https://t.co/KY6CeU8csQ "
-
[ Popular Software ] SQL Server Link Attack Lab Setup Guide: https://blog.netspi.com/wp-content/uploads/2017/05/Technical-Article-Hacking-SQL-Server-Database-Links-Setup-and-Attack-Guide.pdf - it's old, but still useful for learning concepts :) enjoy
" SQL Server 数据库攻击手册: https://t.co/wM7y3cw582 "
-
[ Programming ] Python's Visualization Landscape — slides from my #PyCon2017 talk: https://speakerdeck.com/jakevdp/pythons-visualization-landscape-pycon-2017
" Python 的可视化设计: https://t.co/iBvw9HKmtH "
-
[ Tools ] https://github.com/hlldz/Invoke-Phant0m. - windows events logs killer (not tested)
" Invoke-Phant0m - 通过 Kill Event Log 服务处理日志的线程禁用日志服务,隐藏恶意行为: https://t.co/xbkloii9js "
-
[ Tools ] BoopSuite : Wireless Sniffer Tool (in Python for wireless auditing/security testing) as alternative to airodump-ng : https://github.com/M1ND-B3ND3R/BoopSuite
" BoopSuite: 基于 Python 编写的无线安全审计套件: https://t.co/k7TDK8qJDX "
-
[ Tools ] A little introduction into semantic search feature in ropper. https://scoding.de/semantic-search-in-ropper https://github.com/sashs/Ropper/tree/dev https://t.co/wyElZLBKKE
" Ropper - 支持不同架构(x86/x86_64, ARM/ARM64, MIPS, PowerPC)的 Rop Gadget 搜索工具: https://t.co/tCR589I99f Github: https://t.co/dInvXgZfdk "
-
[ Tools ] psychoPATH - a blind webroot file upload & LFI detection tool : https://github.com/PentestLtd/psychoPATH https://t.co/FCelvnI3q2
" psychoPATH - 本地文件包含/文件上传漏洞检测工具: https://t.co/iRrixrW5AD ; "
-
[ Tools ] A Simple Tool for Linux Kernel Audits http://www.droidsec.org/blogs/2017/05/22/a-simple-tool-for-linux-kernel-audits.html
" Linux Kernel reducer(lk-reducer) - 这个工具监控 Linux 内核构建过程中被访问的文件,该工具可以辅助源码审计: https://t.co/joeaWhiHel "
-
[ Vulnerability ] HP SimplePass Local Privilege Escalation https://goo.gl/fb/TjhNzl #FullDisclosure
-
[ Vulnerability ] Broadcom: Heap overflow in "dhd_handle_swc_evt" https://bugs.chromium.org/p/project-zero/issues/detail?id=1061
" 博通(Broadcom) bcmdhd 驱动 dhd_handle_swc_evt Event Handler 堆溢出漏洞(CVE-2017-0569): https://t.co/fjUd5FfRgl "
-
[ Vulnerability ] LG: Use of uninitialised pointer in OGMParser::VerifyVorbisHeader https://bugs.chromium.org/p/project-zero/issues/detail?id=1158
" LG OGM 文件格式解析 OGMParser::VerifyVorbisHeader 指针未初始化漏洞: https://t.co/2tfNPfXiJl "
-
[ Vulnerability ] Twitter disclosed a bug submitted by kedrisch: https://hackerone.com/reports/208978 - Bounty: $7,560 #hackerone #bugbounty https://t.co/moVsyzIrGz
" 可用其他用户身份发送推文的漏洞,twitter 为此奖励了 $7,560 给发现者 : http://kedrisec.com/twitter-publish-by-any-user/ "
-
[ Web Security ] From Serialized to Shell :: Exploiting Google Web Toolkit with EL Injection http://srcincite.io/blog/2017/05/22/from-serialized-to-shell-auditing-google-web-toolkit-with-el-injection.html #MotivationMondays
" 从序列化漏洞到弹计算器 - 利用 EL 表达式注入漏洞攻击 Google Web Toolkit。 Google Web Toolkit 是一个前端使用JavaScript,后端使用 Java 的 Web AJAX 框架: http://srcincite.io/blog/2017/05/22/from-serialized-to-shell-auditing-google-web-toolkit-with-el-injection.html #MotivationMondays "
-
[ Windows ] fodhelper.exe to the list of UAC bypasses with boring "stealth" type registry manipulations https://winscripting.blog/2017/05/12/first-entry-welcome-and-uac-bypass/
" 利用 fodhelper.exe 实现 Fileless UAC bypasses: https://t.co/sdyuKW2i4V "
-
[ Windows ] 7 DLL injection techniques in Microsoft Windows http://lallouslab.net/2017/05/15/7-dll-injection-techniques-in-the-microsoft-windows/ via @ lallouslab
" Windows 中的 7 种 DLL 劫持技术: http://lallouslab.net/2017/05/15/7-dll-injection-techniques-in-the-microsoft-windows "
-
[ WirelessSecurity ] Reverse-Engineering-Bluetooth-Protocols (Reverse-Engineering a Bluetooth-Enabled Radar Detector) : https://github.com/brandonasuncion/Reverse-Engineering-Bluetooth-Protocols
" Reverse-Engineering-Bluetooth-Protocols: https://t.co/tLaEfsh4uq "