
腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Android ] apkfile - Android APP 分析与特征提取的库,将 APK 转化为 JSON 对象: https://github.com/CalebFenton/apkfile
-
[ Android ] Android 漏洞奖励计划,过去一年的总结以及今年的一些变化: https://android-developers.googleblog.com/2017/06/2017-android-security-rewards.html
-
[ Browser ] Exploiting an integer overflow with array spreading (WebKit)(CVE-2017-2536/ZDI-17-358): https://phoenhex.re/2017-06-02/arrayspread
-
[ Browser ] 恶意软件最爱系列之深入分析 IE CVE-2014-1776 漏洞(视频): http://www.securitytube.net/video/16596
-
[ Hardware ] CompuLab Intense PC 的 BIOS 没有写保护机制(CVE-2017-8083): https://watchmysys.com/blog/2017/06/cve-2017-8083-compulab-intensepc-lacks-bios-wp/
-
[ Hardware ] ARM v8.3 中新增的指针验证功能 - 新安全指令的设计分析: https://www.qualcomm.com/media/documents/files/whitepaper-pointer-authentication-on-armv8-3.pdf
-
[ Hardware ] Intel、AMD & VIA CPU 的微架构手册,汇编语言开发者和编译器作者的优化指南: http://www.agner.org/optimize/microarchitecture.pdf
-
[ Malware ] Uperesia Blog 对 Kill Chain 模型中第二阶段 - Payload 投递(Dropper)的分析: https://www.uperesia.com/malicious-dropper-as-an-attack-vector
-
[ Network ] 国家级 DNS 劫持之旅与域名扩展(Domain Extensions)的潜在威胁: https://thehackerblog.com/the-journey-to-hijacking-a-countrys-tld-the-hidden-risks-of-domain-extensions/index.html
-
[ Pentest ] 如何实现渗透过程中的 Fileless 反弹 shell: https://0x00sec.org/t/running-binaries-without-leaving-tracks/2166
-
-
[ Tools ] UniversalROP - 基于 Z3 求解器和 Unicorn 模拟器写的一个 Gadgets 搜索工具: https://github.com/kokjo/universalrop
-
[ Tools ] getsploit - 命令行版本的 Exploit 搜索和下载工具: https://github.com/vulnersCom/getsploit 支持 Exploit-DB, Metasploit, Packetstorm 等来源
-
[ Tools ] portspider - 轻量级的多线程极速网络扫描工具: http://www.kitploit.com/2017/06/portspider-lightning-fast-multithreaded.html
-
[ Virtualization ] 微软 Hyper-V Bug Bounty 项目,最高奖励 15 万美元: https://technet.microsoft.com/en-us/security/mt784431
-
[ Windows ] 微软编译器的 Rich Signature: http://ntcore.com/Files/richsign.htm
-
[ Windows ] 渗透测试过程中 Windows 受限环境的逃逸,与上周推送的 Citrix 桌面虚拟化环境逃逸的那篇类似: http://infosecaddicts.com/bypassing-restricted-environments/
-
[ Windows ] 利用 AtomBombing 技术向 CFG 保护的进程注入代码: https://breakingmalware.com/injection-techniques/atombombing-cfg-protected-processes/
-
[ Windows ] 滥用 Windows 环境变量实现命令注入与特权提升: https://breakingmalware.com/vulnerabilities/command-injection-and-elevation-environment-variables-revisited/
-
[ Windows ] SMB 漏洞 Eternalblue(永恒之蓝)分析: http://markus.co/memory-forensics/2017/06/04/eternalblue-smb.html 还有一篇来自趋势科技的分析: http://blog.trendmicro.com/trendlabs-security-intelligence/ms17-010-eternalblue/
-
[ WirelessSecurity ] 华盛顿大学检测 IMSI-catcher (伪基站)的一个研究项目- SeaGlass: https://seaglass.cs.washington.edu/
-
-
[ Popular Software ] GhostButt - CVE-2017-8291利用分析,Ghostscript是一个流行的PostScript语言的解析器: http://paper.seebug.org/310/
-
[ Windows ] 在调试器里看 Windows 10 的 Linux 子系统: http://weibo.com/ttarticle/p/show?id=2309404114605776472796
-
[ Windows ] USBPcap.sys CVE-2017-6178:从补丁对比到Exploit,来自安全客: http://bobao.360.cn/learning/detail/3935.html