腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Linux ] Linux 堆利用技术之 UAF 漏洞及利用,来自 SensePost: https://sensepost.com/blog/2017/linux-heap-exploitation-intro-series-used-and-abused-use-after-free/
-
[ Obfuscation ] Revoke-Obfuscation - PowerShell 代码的混淆也开始出现了,来自 FireEye 在 BlackHat 会议的演讲: https://www.fireeye.com/blog/threat-research/2017/07/revoke-obfuscation-powershell.html https://www.fireeye.com/content/dam/fireeye-www/blog/pdfs/revoke-obfuscation-report.pdf
-
[ Popular Software ] 如何利用 Photoshop 的远程连接特性,实现 RAT 远控,文章作者已经删除了,看 Google 的缓存吧: https://webcache.googleusercontent.com/search?q=cache:wM9HbXH70EMJ:https://medium.com/0xcc/how-to-turn-photoshop-into-a-remote-access-tool-972238dc98e9+&cd=1&hl=zh-CN&ct=clnk&gl=cn
-
[ Tools ] mitm-router - 伪造公共 WiFi 网络执行中间人攻击的 Docker 容器 : https://github.com/brannondorsey/mitm-router
-
[ WirelessSecurity ] Ghost Telephonist - 来自 360 Unicorn Team 在 BlackHat 会议关于 4G LTE 链路劫持的演讲: https://www.blackhat.com/docs/us-17/thursday/us-17-Yuwei-Ghost-Telephonist-Link-Hijack-Exploitations-In-4G-LTE-CS-Fallback.pdf
-
[ WirelessSecurity ] 利用 GPS 欺骗的方式控制时间(NTP),来自 DEFCON 会议的演讲: https://zxsecurity.co.nz/presentations/201707_Defcon-ZXSecurity-GPSSpoofing.pdf
-
[ Conference ] DEFCON 25 会议的 PPT 资料公开了: https://media.defcon.org/DEF%20CON%2025/DEF%20CON%2025%20presentations/
-
-
-