腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Malware ] 乌克兰政府机构遭大规模勒索软件攻击,该勒索软件是利用 EternalBlue(永恒之蓝)Exploit 传播的另一款勒索软件 Petya: http://www.freebuf.com/articles/system/138575.html https://securelist.com/schroedingers-petya/78870/ https://www.fireeye.com/blog/threat-research/2017/06/petya-ransomware-spreading-via-eternalblue-exploit.html 关于 Petya,之前我们推送过一些分析文章: https://securelist.com/petya-the-two-in-one-trojan/74609/ http://blog.fortinet.com/2017/02/01/ransomware-and-the-boot-process
-
[ Malware ] 卡巴斯基实验室对攻击 POS 机终端的修改版 Neutrino 后门的分析报告: https://securelist.com/neutrino-modification-for-pos-terminals/78839/
-
[ Others ] Top 10 Satellite Hacks: https://www.youtube.com/watch?v=k_hBC8AGMEU&feature=youtu.be
-
[ SecurityProduct ] Avast 反病毒软件在处理文件格式 Magic Number 时的一个栈缓冲区溢出漏洞: https://landave.io/2017/06/avast-antivirus-remote-stack-buffer-overflow-with-magic-numbers/
-
[ Tools ] 基于 Viper 的二进制软件自动分析框架: http://lockboxx.blogspot.com/2017/06/automated-binary-analysis-framework-for.html
-
[ Tools ] XSStrike - XSS 漏洞 Fuzz 工具,可绕过 WAF 防御: http://www.kitploit.com/2017/06/xsstrike-fuzz-and-bruteforce-parameters.htm
-
[ Tools ] Pharos - 一款二进制程序静态自动化分析框架,基于 ROSE 编译器框架: https://github.com/cmu-sei/pharos
-
[ Vulnerability ] VMware Workstation 12.5.2 拖拽(drag-and-drop)相关的一个 UAF 漏洞的利用,可以通过 RPC 请求直接触发: https://www.zerodayinitiative.com/blog/2017/6/26/use-after-silence-exploiting-a-quietly-patched-uaf-in-vmware
-
[ Vulnerability ] IBM DB2 9.7/10.1/10.5/11.1 - 命令行处理存在缓冲区溢出漏洞(CVE-2017-1297 ): https://www.exploit-db.com/exploits/42260
-
[ Vulnerability ] Easy File Sharing Web Server 7.2 - GET HTTP 请求处理存在缓冲区溢出漏洞: https://www.exploit-db.com/exploits/42261/
-
[ Windows ] Windows 7 系统 HitmanPro 反病毒软件内核 Kernel Pool 溢出漏洞的利用(CVE-2017-6008): http://trackwatch.com/kernel-pool-overflow-exploitation-in-real-world-windows-7/
-
[ Windows ] 从 Windows XP 到 Windows 10,各个版本的 Syscall Table 信息: https://github.com/tinysec/windows-syscall-table
-
[ Windows ] Windows 10 Fall Creators 版本中的 Windows Defender ATP 有哪些变化: https://blogs.technet.microsoft.com/mmpc/2017/06/27/whats-new-in-windows-defender-atp-fall-creators-update/
-
[ Android ] 从Android内核镜像中静态提取符号表: https://mp.weixin.qq.com/s?__biz=MjM5NDM1OTM0Mg==&mid=2651050636&idx=1&sn=0fcbb1ba1477f244690db14f5844130e&scene=0#wechat_redirect
-
[ Conference ] #今日小彩蛋#为防止你错失 3 万元的获得机会,重点已替你画出: 1.参与腾讯安全探索论坛(TSec)议题投稿,投一篇首发的原创安全议题 2.参与腾讯安全探索论坛(TSec)议题投稿,投一篇首发的原创安全议题 3.参与腾讯安全探索论坛(TSec)议题投稿,投一篇首发的原创安全议题 详情传送门: http://www.thecss.cn/topic_c.html
-
[ IoTDevice ] CVE-2017-6334 Netgear DGN2200 路由器 dnslookup.cgi 命令注入漏洞: https://securityonline.info/cve-2017-6334-netgear-dgn2200-dnslookup-cgi-command-injection/
-
-
-
[ Tools ] 一款开源的 WScript 模拟器: https://github.com/mrpapercut/wscript https://mrpapercut.com/sites/wscript/
-
-