腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Browser ] Safari XSS 的新方法: https://twitter.com/mramydnei/status/902470271327551489 <script>location.href;'javascript:alert%281%29'</script>
-
[ Bug Bounty ] 大疆无人机开始启动 Bug Bounty 漏洞奖励项目: https://threatpost.com/dji-launches-drone-bug-bounty-program/127696/
-
[ Industry News ] 10 月份开始,Google将会在 Chrome 浏览器中标记 HTTP 网站为 "不安全" 状态: https://threatpost.com/google-reminding-admins-http-pages-will-be-marked-not-secure-in-october/127709/
-
[ IoTDevice ] 来自普林斯顿大学的研究员公开了一种可以对抗 ISP 监视的 IoT 设备流量隐私保护方法,这种方法会将任意速率的流量重新转成恒定速率,防止 ISP 从流量波形图推测信息: https://threatpost.com/researchers-figure-out-how-to-blind-isps-from-smart-home-device-traffic/127715/
-
[ MalwareAnalysis ] Malwarebytes Labs 对 Kronos 银行木马的深入剖析 Part 2: https://blog.malwarebytes.com/cybercrime/2017/08/inside-kronos-malware-p2/
-
[ Others ] ERNW 对朝鲜的大规模监视技术的剖析: https://www.ernw.de/download/exploring_north_koreas_survelliance_technology_troopers17.pdf
-
[ SecurityAdvisory ] Adobe 昨天发布补丁更新(APSB17-24),修复了 Adobe Acrobat Reader 的多个漏洞: https://helpx.adobe.com/security/products/acrobat/apsb17-24.html
-
[ Tools ] Vulnerable Docker VM - 用于练习 Docker 渗透的虚拟机环境: https://www.notsosecure.com/vulnerable-docker-vm/
-
[ Tools ] Pharos - CMU 开源的一个二进制静态分析工具,最近更新过,新增了用于分析面向对象类继承关系的 OOAnalyzer、新增了 IDA Pro 的插件 PyObjDigger、新增了用于分析函数调用信息的 CallAnalyzer: http://insights.sei.cmu.edu/sei_blog/2017/08/pharos-binary-static-analysis-tools-released-on-github.html Github: https://github.com/cmu-sei/pharos
-
[ Tools ] 即时(JIT)编译器原理课程: https://hacks.mozilla.org/2017/02/a-crash-course-in-just-in-time-jit-compilers/
-
[ Windows ] 今天的 Windows 10 系统中都有哪些(漏洞)攻击缓解措施: https://blogs.technet.microsoft.com/iftekhar/2017/08/28/threat-mitigation-in-windows-10/
-
[ Windows ] 攻击 PowerShell 的代码注入漏洞,绕过它的语言约束模式: http://www.exploit-monday.com/2017/08/exploiting-powershell-code-injection.html
-
[ Browser ] JavaScript V8 引擎是如何工作的以及如何写入高性能代码: https://blog.sessionstack.com/how-javascript-works-inside-the-v8-engine-5-tips-on-how-to-write-optimized-code-ac089e62b12e
-
-
[ Popular Software ] 虚拟仪器软件 LabVIEW 的代码执行漏洞(CVE-2017-2779): http://blog.talosintelligence.com/2017/08/vulnerability-spotlight-code-execution.html
-
[ Vulnerability ] Nginx 文件名逻辑漏洞(CVE-2013-4547): https://github.com/phith0n/vulhub/blob/master/nginx/CVE-2013-4547/README.md
-
[ Web Security ] 滥用爬虫进行间接的 Web 攻击(Paper): https://pdfs.semanticscholar.org/548d/afd83563bf49d1042fb47f052a680cfaed05.pdf