
腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ APT ] Wikileaks 昨天又公开了一个 CIA 的项目 - Pandemic,Pandemic 是一个木马植入器,专门用于攻击 Windows 文件共享网络,它将用户从文件服务器下载的文件木马化: https://wikileaks.org/vault7/releases/#Pandemic
-
[ Attack ] Bachosens 行动 - 走进这个存在很久的犯罪活动,来自赛门铁克: https://medium.com/threat-intel/cybercrime-investigation-insights-bachosens-e1d6312f6b3a
-
[ Browser ] ClusterFuzz - Google Chrome 的大规模 Fuzz 和 Crash 分析框架,来自 Chromium 团队 Abhishek Arya 2015 年在 NullCon GOA 会议的演讲: https://nullcon.net/website/archives/ppt/goa-15/analyzing-chrome-crash-reports-at-scale-by-abhishek-arya.pdf
-
[ Browser ] Chrome 允许用户单独配置,绕过 key pinning,企业可以利用这个特性实施监控: https://dev.chromium.org/Home/chromium-security/security-faq#TOC-How-does-key-pinning-interact-with-local-proxies-and-filters-
-
[ Conference ] AppSecEU 2017 会议的视频公开了: https://www.youtube.com/playlist?list=PLpr-xdpM8wG8RHOguwOZhUHkKiDeWpvFp
-
[ Debug ] Troll - 针对 ARM Cortex-M 系统的 C 语言源码级调试器: https://github.com/stoyan-shopov/troll#testing-the-troll
-
[ Defend ] LLVM 编译器中新增了对指针溢出的检查: https://reviews.llvm.org/D33305 https://wdtz.org/catching-pointer-overflow-bugs.html
-
[ Detect ] PCRE 正则在被动网络防御方面的应用: http://ropgadget.com/posts/defensive_pcres.html
-
[ Linux ] syscall_intercept - 在用户态 Hot Patch 进程内存实现劫持 Linux 系统调用的工具,Intel 开源的: https://github.com/pmem/syscall_intercept
-
[ MachineLearning ] 机器学习与 Python 数学运算相关的总结手册,以各种图表形式展示: https://unsupervisedmethods.com/cheat-sheet-of-machine-learning-and-python-and-math-cheat-sheets-a4afe4e791b6
-
[ Mobile ] Appthority 的 2017 移动威胁报告显示,超过 43 TB 的用户数据存储在逾 2.1 万台未加密的 Elasticsearch 服务器上: https://www.bleepingcomputer.com/news/security/backend-servers-for-1-000-apps-expose-terabytes-of-user-data/
-
[ Mobile ] SS7 GPRS 互联攻击,来自 2015 年的 CCC 会议: https://events.ccc.de/camp/2015/Fahrplan/system/attachments/2649/original/CCCamp-SRLabs-Advanced_Interconnect_Attacks.v1.pdf 在 Shodan 上的搜索结果: https://www.shodan.io/search?query=GGSN
-
[ Obfuscation ] obfusion - x86 汇编代码混淆工具: https://github.com/kgretzky/obfusion 作者还为此写了 3 篇 Blog: https://breakdev.org/x86-shellcode-obfuscation-part-1/ https://breakdev.org/x86-shellcode-obfuscation-part-2/ https://breakdev.org/x86-shellcode-obfuscation-part-3/
-
[ SecurityReport ] 赛门铁克发布的《2017 金融威胁综述报告》: https://www.symantec.com/connect/blogs/financial-malware-more-twice-prevalent-ransomware
-
-
[ Windows ] 微软的文档中心( https://docs.microsoft.com/zh-cn/),其中保存中 GitHub 上的 WinDbg 文档: https://github.com/MicrosoftDocs/windows-driver-docs/tree/staging/windows-driver-docs-pr/debugger
-
[ Windows ] Helium, Argon, Krypton & Xenon - Windows 容器中的惰性气体,来自 Alex Ionescu 在 SyScan 360 会议的演讲: http://www.alex-ionescu.com/publications/syscan/syscan2017.pdf
-
[ Windows ] 《Windows Internals》 第 7 版中涉及的一些工具: https://github.com/zodiacon/windowsinternals
-
[ WirelessSecurity ] probesniffer - 无线设备未加密探测请求 Sniffer: http://www.kitploit.com/2017/06/probesniffer-tool-for-sniffing.html
-
[ Android ] Google 提高了对安全研究者报告 Android Exploit 的奖励标准,搞定 TEE 最高可获得 20 万美金: https://www.google.com/about/appsecurity/android-rewards/ http://weibo.com/5274004507/F5RWuhyTA
-
[ Android ] Pwning the Nexus of Every Pixel,来自科恩实验室 Flanker 在高通移动安全峰会的演讲: https://blog.flanker017.me/wp-content/uploads/2017/06/qmss2017.pdf
-
[ macOS ] 一篇文章走进Mac逆向的世界,来自 AloneMonkey Blog: http://www.alonemonkey.com/2017/05/31/get-start-with-mac-reverse/