腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Browser ] Chrome Turbofan 编译器优化不正确导致的类型混淆漏洞,漏洞的分析和 PoC: https://blogs.securiteam.com/index.php/archives/3379
-
[ Browser ] Microsoft Edge 浏览器 CInputDateTimeScrollerElement::_SelectValueInternal 越界读漏洞(CVE-2017-8644): https://www.exploit-db.com/exploits/42459
-
[ Browser ] Project Zero 新公开了 Edge ChakraCore JIT 引擎的多个漏洞(CVE-2017-8548/CVE-2017-8601/CVE-2017-8637/CVE-2017-8659/CVE-2017-8646): https://bugs.chromium.org/p/project-zero/issues/detail?id=1290 https://bugs.chromium.org/p/project-zero/issues/detail?id=1316 https://bugs.chromium.org/p/project-zero/issues/detail?id=1284 https://bugs.chromium.org/p/project-zero/issues/detail?id=1287 https://bugs.chromium.org/p/project-zero/issues/detail?id=1277
-
[ Industry News ] 谷歌移除了银行欺诈中使用的 Chrome 浏览器扩展: https://threatpost.com/google-removes-chrome-extension-used-in-banking-fraud/127469/
-
[ iOS ] Apple iOS 10.3 短消息应用 UI 访问权限绕过漏洞: http://seclists.org/fulldisclosure/2017/Aug/24?utm_source=feedburner&utm_medium=twitter&utm_campaign=Feed%3A+seclists%2FFullDisclosure+%28Full+Disclosure%29
-
[ IoTDevice ] 可联网汽车的危机:当漏洞影响到 CAN 标准时: http://blog.trendmicro.com/trendlabs-security-intelligence/connected-car-hack/
-
[ Malware ] Pulse Wave - 新的 DDoS 攻击模式被发现: https://www.bleepingcomputer.com/news/security/pulse-wave-new-ddos-assault-pattern-discovered/
-
[ MalwareAnalysis ] 趋势科技对安卓上的点击欺诈应用 GhostClicker 的简单分析: http://blog.trendmicro.com/trendlabs-security-intelligence/ghostclicker-adware-is-a-phantomlike-android-click-fraud/
-
[ Others ] 对 Paypal Phishing Kit 的简单分析: https://isc.sans.edu/forums/diary/Analysis+of+a+Paypal+phishing+kit/22726/
-
[ Others ] Realmode Assembly - Writing bootable stuff - Part 3: https://0x00sec.org/t/realmode-assembly-writing-bootable-stuff-part-3/3116 Part 2 : https://0x00sec.org/t/realmode-assembly-writing-bootable-stuff-part-2/2992 ,Part 1 : https://0x00sec.org/t/realmode-assembly-writing-bootable-stuff-part-1/2901
-
[ Popular Software ] Adobe Flash Invoke Accesses Trait Out-of-bounds(CVE-2017-3106): https://bugs.chromium.org/p/project-zero/issues/detail?id=1320
-
[ Tools ] kAFL - USENIX 2017 上公开的一个内核 Fuzzing 工具,它基于 Intel’s Processor Trace (PT) 和 Hypervisor 实现代码覆盖率的反馈: https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/schumilo Github: https://github.com/RUB-SysSec/kAFL
-
[ Tools ] LNKup - 利用 Windows 快捷方式窃取用户 NTLM Hash 以及环境变量的工具: https://github.com/Plazmaz/LNKUp
-
[ Tools ] graudit - Bash 实现的源代码安全漏洞扫描器,可自定义漏洞的判断规则: https://github.com/wireghoul/graudit
-
[ Tools ] Epona - QuarksLab 基于 LLVM 开发了一个编译器,该编译器专注安全性,提供代码完整性、混淆、防篡改等保护特性: https://epona.quarkslab.com/
-
[ Tools ] Reconned - 用于搜集子域名的工具,之前叫 PyBrute: https://github.com/OrOneEqualsOne/reconned
-
[ Tools ] Puppeteer - 基于 DevTools 协议,用于自动化控制 Chrome 浏览器的 Node 库,可用来实现网络爬虫、网页截图、UI 测试等等: https://github.com/GoogleChrome/puppeteer
-
-
[ MachineLearning ] 加州大学柏克莱分校 Dawn Song 在微软举办的 Faculty Summit 2017 学术峰会上关于 AI 与安全的演讲,介绍 AI 和安全是如何相互影响的: https://www.microsoft.com/en-us/research/wp-content/uploads/2017/07/AI_and_Security_Dawn_Song.pdf
-
-
-
[ Tools ] Digtool - 基于虚拟化的内核漏洞检测框架,来自 360 IceSword Lab,Digtool 监控内核的执行流程、对象分配、内存访问、线程调度、函数调用等信息,检测可能存在的 UAF、越界访问、 ToCToU 漏洞: https://www.usenix.org/system/files/conference/usenixsecurity17/sec17-pan.pdf