腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Browser ] HTML+CSS+GIF+BAT Firefox 中弹计算器,需要用户手动保存网页: http://leucosite.com/polyglot.html
-
[ Debug ] Hyper-V debugging for beginners - Hyper-V 调试入门: http://hvinternals.blogspot.com/2015/10/hyper-v-debugging-for-beginners.html
-
[ Forensics ] 利用 Volatility 取证分析框架分析内存中的 Windows 注册表储藏信息: https://andreafortuna.org/volatility-my-own-cheatsheet-part-6-windows-registry-ddbea0e15ff5
-
[ Industry News ] 黑客窃取了意大利最大的银行 UniCredit 的 40 万条用户数据: https://hotforsecurity.bitdefender.com/blog/hackers-steal-information-on-400000-customers-of-italys-biggest-bank-18562.html
-
[ Industry News ] HBO 遭受黑客攻击,权力的游戏即将播放的剧集已被泄露到网上: http://ew.com/tv/2017/07/31/hbo-hacked-game-of-thrones/
-
[ IoTDevice ] Alexa,你能听见我说话吗?Amazon Echo 智能硬件的设计问题(调试端口暴露、允许从外部 SD 卡启动)导致攻击者可以获得 Amazon Echo 的 Root Shell: https://labs.mwrinfosecurity.com/blog/alexa-are-you-listening/
-
[ macOS ] macOS 系统软件升级器(Updater)和安装器(Installer)漏洞所引入的提权问题,包括系统自带的也包括一些第三方软件提供的,来自 DEFCON 会议的演讲: https://speakerdeck.com/patrickwardle/defcon-2017-death-by-1000-installers-its-all-broken
-
[ Mobile ] 一加 2 手机篡改 Bootloader SBL1 分区可以禁用后续的 Bootloader 签名验证逻辑(CVE-2017-11105): https://alephsecurity.com/vulns/aleph-2017026
-
[ Operating System ] BSD 内核的漏洞研究,来自 DEFCON 会议: https://media.defcon.org/DEF%20CON%2025/DEF%20CON%2025%20presentations/DEFCON-25-Ilja-van-Sprundel-BSD-Kern-Vulns.pdf
-
[ Others ] InfoSec Blog 对 JavaScript (js) dropper 的逆向分析: http://resources.infosecinstitute.com/reverse-engineering-javascript-obfuscated-dropper/
-
[ Others ] 攻击者劫持了 Copyfish OCR 浏览器扩展并用于发送垃圾邮件: https://threatpost.com/copyfish-browser-extension-hijacked-to-spew-spam/127125/
-
[ Pentest ] 使用 Burp 和自定义的 Sqlmap Tamper 对 SQL 二次注入漏洞进行利用: https://pentest.blog/exploiting-second-order-sqli-flaws-by-using-burp-custom-sqlmap-tamper/
-
[ Popular Software ] 基于 NTFS ADS 实现的 Mark of the Web 特性需要所有网络客户端的自觉遵守,然而 7-zip 在解压文件时会丢失 "Mark of the Web" 标志: https://textslashplain.com/2016/04/04/downloads-and-the-mark-of-the-web/
-
[ Programming ] wtfjs - JavaScript 的一些有趣的小技巧(Tricks)总结: https://github.com/denysdovhan/wtfjs
-
[ SecurityReport ] 卡巴斯基发布《2017 第二季度 DDoS 攻击报告》: https://securelist.com/ddos-attacks-in-q2-2017/79241/
-
[ Tools ] BadIntent - 使用 Burp Suite 拦截、修改、重放和攻击 Android 的 Binder 通信: https://github.com/mateuszk87/BadIntent
-
[ Tools ] 构建一个 NFC 中间人代理工具,来自 DEFCON 会议的演讲: https://media.defcon.org/DEF%20CON%2025/DEF%20CON%2025%20presentations/DEFCON-25-Haoqi-Shan-and-Jian-Yuan-Man-in-the-NFC.pdf
-
[ Tools ] IRPMon - 增强版的 IrpTracker,用于监控驱动与应用、驱动自身之间的通信: http://www.kernelmode.info/forum/viewtopic.php?f=11&t=4785
-
[ Tools ] WMIMon - 用于监控 Windows WMI 行为的工具: https://github.com/luctalpe/WMIMon
-
[ Windows ] The Active Directory Botnet - 将企业内部的 Active Directory 变成内部 Botnet 控制器,来自 BlackHat 会议: http://www.harmj0y.net/blog/powershell/command-and-control-using-active-directory/ https://www.blackhat.com/docs/us-17/wednesday/us-17-Miller-The-Active-Directory-Botnet.pdf
-
[ Windows ] Windows 内核漏洞利用:栈溢出 : https://rootkits.xyz/blog/2017/08/kernel-stack-overflow/
-
[ Windows ] Windows 快捷方式 (.LNK) 代码执行漏洞(CVE-2017-8464)的野外利用代码分析: http://ivanlef0u.fr/cve-2017-8464.txt
-
[ Android ] 研究员 Gengjia Chen 公开了两个 Android Qualcomm 加密引擎驱动程序中提权漏洞(CVE-2016-3935/CVE-2016-6738)的 PoC: https://github.com/jiayy/android_vuln_poc-exp
-
[ Industry News ] 一位前 NSA 员工被美国政府调查,怀疑其与 Shadow Brokers 组织有关联: https://www.cyberscoop.com/shadow-brokers-investigation-nsa-former-insider-fbi-q-group/
-
-
[ Popular Software ] Jenkins < 1.650 反序列化漏洞(CVE-2016-0792)Exploit: https://cxsecurity.com/issue/WLB-2017070198
-
[ Vulnerability ] CVE-2017-7368:高通声卡驱动中的条件竞争漏洞分析,来自启明 ADLAB: http://mp.weixin.qq.com/s/tHhNrg-8Y4LvCTcZleoY2Q