腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Android ] 将 Metasploit Payloads 注入到 Android 应用的手法介绍: https://pentestlab.blog/2017/06/26/injecting-metasploit-payloads-into-android-applications-manually/
-
[ Android ] Android O API level 26 中更新了 DEX 文件格式,添加了两个新的 Dalvik opcodes(invoke-polymorphic 和 invoke-custom),用于支持动态调用(Dynamic Invocation): https://www.pnfsoftware.com/blog/android-o-and-dex-version-38-new-dalvik-opcodes-to-support-dynamic-invocation/#fn-619-1
-
[ Detect ] 如何检测来自 Malicious Hypervisor 的威胁,Paper: http://www.sicherheitsforschung-magdeburg.de/uploads/journal/MJS_051_Utin_Hypervisor.pdf
-
[ Forensics ] 内存取证分析示例 : https://articles.forensicfocus.com/2017/06/26/ram-forensic-analysis/
-
[ iOS ] 腾讯科恩实验室(KeenLab)上周在 MOSEC 2017 会议上演示的 iOS 11 Beta 2 和 iOS 10.3.2 的越狱视频: https://www.youtube.com/watch?v=cdPbMV5EDgA&feature=youtu.be
-
[ macOS ] 如何在 macOS 上安装 Powershell 6.0: http://www.techrepublic.com/article/how-to-install-microsoft-powershell-6-0-on-macos/
-
[ Malware ] 一种新型的使用无文件代码注入技术的勒索软件 Sorebrect 在野外传播: https://vulnerablelife.wordpress.com/2017/06/18/new-fileless-ransomware-with-code-injection-ability-detected-in-the-wild/
-
[ MalwareAnalysis ] 恶意软件分析系列之逆向分析 Dharma 勒索软件: https://crackinglandia.wordpress.com/2017/06/26/unpacking-malware-series-dharma-ransomware/
-
[ Others ] Responder 工具与 LLMNR/NBT-NS 协议: https://securitycafe.ro/2017/06/26/going-further-with-responders-basic-authentication/
-
[ Others ] JSONP 注入实例: https://www.exploit-db.com/docs/42250.pdf
-
[ Others ] 破解 Java Key Store (JKS) 文件中存储的密钥信息,Java 和 Android 一直默认使用 JKS 文件存储密钥。这个项目来源于 POC||GTFO 杂志的一篇文章《Nail in the Java Key Store Coffin》: https://github.com/floyd-fuh/JKS-private-key-cracker-hashcat
-
[ Others ] 红队攻击手法的要点备忘录: https://github.com/vysec/RedTips
-
[ Pentest ] 渗透测试基础架构系列 part4: 后渗透攻击: http://bitvijays.github.io/LFF-IPS-P4-PostExploitation.html
-
[ Pentest ] 渗透测试工程师常用的 Python 库和程序列表: https://vulnerablelife.wordpress.com/2017/05/13/python-for-penetration-testers/
-
[ Pentest ] 无文件应用白名单绕过及 Powershell 混淆: http://blog.4n6ir.com/2017/06/fileless-application-whitelist-bypass.html https://t.co/Rh0Z2DBcVS
-
[ Popular Software ] MAMP 存在CSRF与目录遍历漏洞,可进一步导致远程代码执行: https://www.itsec.nl/en/2017/06/26/drive-by-remote-code-execution-by-mamp/
-
[ SecurityReport ] 卡巴斯基发布 2016-2017 勒索软件报告: https://securelist.com/ksn-report-ransomware-in-2016-2017/78824/
-
[ Tools ] Illuminate Js - JS 在线反混淆网站: https://www.illuminatejs.com/
-
[ Tools ] Mal Tindex - 为二进制可执行文件建立索引的工具,基于 IDA,主要用于归类搜索恶意软件。这个工具来源于 Joxean Koret 在 EuskalHack 2017 会议的演讲《Call Graph Agnostic Malware Indexing 》: Github: https://github.com/joxeankoret/maltindex slides: https://es.slideshare.net/JoxeanKoret/call-graph-agnostic-malware-indexing-euskalhack-2017
-
[ Tools ] rtfm - 以数据库形式存储常用工具的命令行参数的工具,比如记录 sqlmap 的命令行格式: https://github.com/leostat/rtfm
-
[ Vulnerability ] PHPMaker 的不安全对象直接引用漏洞: http://0x3c.ghost.io/2017/06/26/phpmaker/
-
[ Vulnerability ] 基于 JSON Types 的 GraphQL NoSQL 注入漏洞: https://medium.com/@east5th/graphql-nosql-injection-through-json-types-a1a0a310c759
-
[ Windows ] NTFS 文件格式的取证、恶意滥用与漏洞分析: https://drive.google.com/file/d/0B3P18M-shbwrM1E2V24tTVFUU3M/view
-
-
[ Popular Software ] Microsoft Skype 7.2/7.35/7.36 栈缓冲区溢出漏洞: https://packetstormsecurity.com/files/143143
-
-
[ Windows ] 微软官方确认部分 Windows 10 源码被泄露在 Beta Archive 网站,容量大约1.2GB: http://www.cnbeta.com/articles/tech/625603.htm http://mp.weixin.qq.com/s/rM86bWbOdSBaglbGtsDalQ