腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Fuzzing ] Python JSON Fuzzer: PyJFuzz: https://n0where.net/python-json-fuzzer-pyjfuzz/
-
[ IoTDevice ] 无线投影设备 WePresent WiPG 1000/1500/2000 远程 Root Exploit: https://github.com/XiphosResearch/exploits/tree/master/wipgpwn
-
[ Malware ] 微软对 WannaCrypt 勒索软件感染过程的分析,包括初始 Shellcode 执行、后门植入、内核态 Shellcode 执行以及 Payload 拉起: https://blogs.technet.microsoft.com/mmpc/2017/06/30/exploring-the-crypt-analysis-of-the-wannacrypt-ransomware-smb-exploit-propagation/
-
[ Malware ] McAfee 的报告显示,攻击者正在开发用于逃逸机器学习的技术: https://twitter.com/i/web/status/880932734843092992
-
[ Malware ] 据 FireEye 报道,定向攻击中越来越多地开始使用混淆和逃逸技术: https://www.fireeye.com/blog/threat-research/2017/06/obfuscation-in-the-wild.html
-
[ MalwareAnalysis ] Malware Unicorn - 用于分析恶意软件的虚拟机环境: https://securedorg.github.io/RE101/section1/
-
[ Network ] ssl_logger - 解密并记录进程 SSL 流量的工具: https://github.com/google/ssl_logger
-
[ Popular Software ] 德国 e-Government 系统中使用的 OSCI-Transport 通信库被发现严重漏洞,攻击者可以实现外部 XML 实体注入攻击: https://www.darkreading.com/vulnerabilities---threats/vulnerabilities-found-in-german-e-government-communication-library/d/d-id/1329268
-
[ Virtualization ] Docker 安全部署手册: https://github.com/GDSSecurity/Docker-Secure-Deployment-Guidelines
-
[ Web Security ] 从 PhantomJS 图片渲染中的 XSS 到 SSRF/本地文件读取: http://buer.haus/2017/06/29/escalating-xss-in-phantomjs-image-rendering-to-ssrflocal-file-read/
-
[ Windows ] 利用 Mutable Read Only Data(MRDATA) Bypass CFG,来自 Alex Ionescu 在 EuskalHack 2017 会议的演讲: http://alex-ionescu.com/publications/euskalhack/euskalhack2017-cfg.pdf