腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Browser ] Windows 10 Insider Preview Build 16237 版本中的 IE 11 已经默认禁用了 VBScript: https://blogs.windows.com/msedgedev/2017/07/07/update-disabling-vbscript-internet-explorer-11/
-
[ Browser ] Firefox 54.0.1 - 拒绝服务漏洞POC: https://www.exploit-db.com/exploits/42302/
-
[ MalwareAnalysis ] 原 Petya 勒索软件的解密密钥发布,已有安全研究员据此写出了解密工具: https://threatpost.com/decryption-key-to-original-petya-ransomware-released/126705/
-
[ Others ] MSRC-Security-Research - 微软 MSRC 团队近几年演讲资料的汇总: https://github.com/Microsoft/MSRC-Security-Research
-
[ Pentest ] 利用 CreateRestrictedToken API Bypass AppLocker: https://pentestlab.blog/2017/07/07/applocker-bypass-createrestrictedtoken/
-
[ Pentest ] Cisco Talos 团队对利用 Word 模板注入攻击基础设施的分析: http://blog.talosintelligence.com/2017/07/template-injection.html
-
[ Tools ] LuaQEMU - 基于 QEMU,将 QEMU 的内部 API 暴露给 LuaJIT 使用: https://github.com/comsecuris/luaqemu
-
[ Tools ] salt-scanner - 基于 Salt Open 和 Vulners audit API 的 Linux 漏洞扫描器: Z https://github.com/0x4D31/salt-scanner
-
[ Vulnerability ] Poppler PDF 存在多个 RCE 漏洞,成功利用可以完全控制用户计算机: http://blog.talosintelligence.com/2017/07/vulnerability-spotlight-talos-2017.html?utm_source=dlvr.it&utm_medium=twitter&utm_campaign=Feed%3A+feedburner%2FTalos+%28Talos+Blog%29
-
[ Windows ] windows_kernel_address_leaks - 从用户态泄露 Windows 内核地址的方法汇总: https://github.com/sam-b/windows_kernel_address_leaks