腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Firmware ] Digging Into The Core of Boot - Coreboot 启动过程中的安全性分析,来自 RECon 会议: https://recon.cx/2017/montreal/resources/slides/RECON-MTL-2017-DiggingIntoTheCoreOfBoot.pdf
-
[ MalwareAnalysis ] RECon 会议一篇关于恶意软件分析的演讲 - 利用恶意软件自身的解密逻辑解密其加密部分: https://recon.cx/2017/montreal/resources/slides/RECON-MTL-2017-crypton.pdf
-
[ MalwareAnalysis ] WannaCry 与 ExPetr 背后的动机之谜: https://threatpost.com/motivation-mystery-behind-wannacry-expetr/126970/
-
[ Others ] security-notes - jaybosamiya的安全学习笔记: https://github.com/jaybosamiya/security-notes
-
[ Pentest ] 利用 COM 对象 Excel.Application 的 RegisterXLL() 方法加载并执行 DLL: https://gist.github.com/ryhanson/227229866af52e2d963cf941af135a52
-
[ Tools ] 用于辅助分析 UEFI 的 IDA Python 脚本: https://github.com/kyurchenko/IDAPython-scripts-for-UEFI-analisys
-
[ Tools ] Visual Studio 更新 2017 15.3.0 版本,诊断功能有所提高: https://blogs.msdn.microsoft.com/vcblog/2017/07/21/diagnostic-improvements-in-vs2017-15-3-0/
-
[ Vulnerability ] 我是如何利用 Paypal 服务器的任意文件上传漏洞远程执行代码的: http://blog.pentestbegins.com/2017/07/21/hacking-into-paypal-server-remote-code-execution-2017/
-
[ Windows ] Bypass Windows 10 S 的 Device Guard 保护特性,执行任意代码: https://tyranidslair.blogspot.com/2017/07/dg-on-windows-10-s-executing-arbitrary.html
-
[ Windows ] 基于 Neo4j 的 Windows 日志可视化分析: https://haveyousecured.blogspot.ca/2017/07/visualize-windows-logs-with-neo4j.html
-
-
-
[ Tools ] Rust SGX SDK v0.2.0 发布,来自 百度安全实验室: https://mp.weixin.qq.com/s?__biz=MzA3NTQ3ODI0NA==&mid=2247483868&idx=1&sn=82fa7e49c8ea57fd7e6b02538ef8406f