腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ IoTDevice ] 汽车黑客 第1部分: CAN 协议: https://www.hackers-arise.com/single-post/2017/08/04/Automobile-Hacking-Part-1-The-CAN-Protocol
-
[ MalwareAnalysis ] Trustwave 对两款恶意软件 - TrickBot 和 Nitol 的详细分析: https://www.trustwave.com/Resources/SpiderLabs-Blog/Tale-of-the-Two-Payloads-%e2%80%93-TrickBot-and-Nitol/
-
[ Mobile ] 使用智能手机的相机进行有效的指纹提取与匹配(Paper): https://arxiv.org/pdf/1708.00884.pdf
-
[ Others ] 创建从 Github 仓库中自更新的 Powershell 脚本: https://curi0usjack.blogspot.com/2017/08/creating-self-updating-powershell.html
-
[ Pentest ] 大型客户端渗透测试 第3部分:Java 反序列化漏洞导致的远程代码执行: http://blog.securelayer7.net/thick-client-penetration-testing-3javadeserialization-exploit-rce/
-
[ Popular Software ] Apache Tomcat 7.x 安全加固指南: https://www.ernw.de/download/hardening/ERNW_Checklist_Tomcat7_Hardening.pdf
-
[ SecurityReport ] 安天针对“魔鼬”木马DDoS事件分析报告: http://www.antiy.com/response/weasel.html
-
[ Windows ] Windows 处理图标显示的代码存在 Bug,攻击者可以伪装成其他 PE 文件,骗取用户点击: https://www.cybereason.com/labs-a-zebra-in-sheeps-clothing-how-a-microsoft-icon-display-bug-in-windows-allows-attackers-to-masquerade-pe-files-with-special-icons/