腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Browser ] Google Chrome infinite alerts + crash Poc: https://pastebin.com/raw/kLVm9zhC
-
[ iOS ] Reading iOS app binary files part 1: https://appscreener.us/blog/?code=reading-ios-app-binary-files Part 2 : https://appscreener.us/blog/?code=reading-ios-app-binary-files-part-2-swift
-
[ MalwareAnalysis ] 卡巴斯基发现,ExPetr 恶意软件与 BlackEnergy APT 组织的 KillDisk 在代码上有很多相似性: https://threatpost.com/researchers-find-blackenergy-apt-links-in-expetr-code/126662/
-
[ Others ] 编写 NetBSD 内核模块,实现一个简单的字符设备驱动程序: https://saurvs.github.io/post/writing-netbsd-kern-mod/
-
-
[ Tools ] 用于解密 Cerber 勒索软件二进制文件中字符串的 IDA Pro 脚本: https://github.com/vallejocc/ida_scripts/blob/master/malware_analysis_scripts/cerber_string_decryptor.py
-
[ Tools ] filewatcher - macOS 下的一个简单审计套件,可以审计所有事件并根据文件名或进程名进行过滤: https://github.com/m3liot/filewatcher
-
[ Tools ] MSF 加入 SurgeNews 用户凭证扫描模块: https://github.com/rapid7/metasploit-framework/pull/8577
-
-
[ Vulnerability ] systemd 最近修复了一个 Bug,一个以数字开头的用户名会造成 systemd 以 Root 用户启动: https://ma.ttias.be/giving-perspective-systemds-usernames-start-digit-get-root-privileges-bug/
-
[ Vulnerability ] 我是怎么发现 Intel Skylake 处理器的 Bug 的: http://gallium.inria.fr/blog/intel-skylake-bug/
-
[ WirelessSecurity ] 蓝牙 BLE 4.0 通讯过程的逆向和攻击: http://payatu.com/reversing-exploiting-ble-4-0-communication/
-
[ Browser ] IE11-Flash-steal - 在 IE11 结合 Flash 偷文件的 PoC,作者表示目前该漏洞未修复: https://github.com/SandboxEscaper/IE11-Flash-steal/
-
-
-
[ Mobile ] TEEs(可信执行环境)的初始化过程以及在保护 TEE 过程中系统初始化扮演的角色: https://www.riscure.com/news/secure-initialization-of-tees-when-secure-boot-falls-short
-
[ Windows ] Windows 几个漏洞的 PoCs,大部分是内核漏洞,包括 CVE-2012-0217,CVE-2016-3309,CVE-2016-3371,CVE-2016-7255,CVE-2017-0213: https://github.com/WindowsExploits/Exploits
-
[ Windows ] 初学Windows内核漏洞利用(一):搭建实验环境: http://mp.weixin.qq.com/s/v6BsjpLU9dpYHEXsFkIUfg 初学Windows内核漏洞利用(二):熟悉HEVD: http://mp.weixin.qq.com/s/URed13WhcF0_GgtGxoBgBA
-