
腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Android ] 有研究证明 Android swipe 锁屏模式比使用 PIN 安全性低: https://threatpost.com/android-lockscreen-patterns-less-secure-than-pins/128123/
-
[ Industry News ] 适用于 Linux 的 SQL Server 2017 发布: https://arstechnica.com/gadgets/2017/09/microsoft-ignite-2017-azure-sql/
-
[ Industry News ] 四大会计事务所之一的德勒承认遭受网络攻击,但表示仅有少数客户受影响: https://threatpost.com/deloitte-very-few-clients-impacted-by-cyber-attack/128129/
-
[ macOS ] Biting the Apple that feeds you(咬一口嘴边的苹果) - macOS 内核的 Fuzzing,来自 MWR Labs 在 44CON 会议的演讲: https://labs.mwrinfosecurity.com/assets/BlogFiles/mwri-44con-biting-the-apple-that-feeds-you-2017-09-25.pdf
-
[ macOS ] High Sierra macOS 系统中,未签名的程序通过编程可以导出 keychain 中的明文密码: https://twitter.com/i/web/status/912254053849079808
-
[ macOS ] macOS High Sierra 10.13 安全更新内容: https://support.apple.com/en-us/HT208144
-
[ MalwareAnalysis ] Paloalto 研究员对 AgentTesla 的详细分析: https://researchcenter.paloaltonetworks.com/2017/09/unit42-analyzing-various-layers-agentteslas-packing/
-
[ MalwareAnalysis ] 寻找内存驻留的恶意软件: http://www.irongeek.com/i.php?page=videos/derbycon7/s21-hunting-for-memory-resident-malware-joe-desimone
-
[ Others ] Hacking Games by Hooking LuaJIT : https://nickcano.com/hooking-luajit/
-
[ Others ] 基于 WebExtensions 标准,将 Copy as Markdown 扩展从 Chrome 移植到 Firefox 浏览器: https://medium.com/@yorkxin/things-i-learned-from-migrating-a-chrome-extension-to-firefox-using-webextensions-975474d4fa77
-
[ Popular Software ] Avast 对 CCleaner APT 事件(Avast 将其定性为 APT 事件)的进一步分析。事件初期,Avast 向渠道分发过存在后门的 CCleaner 5.33 版本: https://blog.avast.com/additional-information-regarding-the-recent-ccleaner-apt-security-incident 360 威胁情报中心今天也发了一篇《深入分析CCleaner后门代码 - 编译环境污染类的供应链攻击案例》: http://mp.weixin.qq.com/s/5IewlRR-1VZ5sx1YactNkg
-
[ Tools ] BaRMIe - Java RMI枚举和攻击工具: https://github.com/NickstaDB/BaRMIe
-
[ Tools ] BLE -- 一款 BLE 扫描器: https://github.com/evilsocket/bleah
-
[ Tools ] PyMLProjects: Python 机器学习项目: https://github.com/k3170makan/PyMLProjects
-
[ Tools ] PSAmsi - 生成创建绕过 AMSI 的 Payload 的工具: https://github.com/cobbr/PSAmsi
-
[ Tools ] redsails - 一个基于 Python 的后渗透项目,旨在绕过基于主机的安全监控与日志记录: https://github.com/BeetleChunks/redsails
-
[ Tools ] SniffAir - 无线渗透测试框架: https://github.com/Tylous/SniffAir
-
[ Vulnerability ] CLKSCREW - 曝光电源管理设计上的漏洞。利用这种缺陷可以推测出 AES 密钥、加载自签名的 APP: https://blog.acolyer.org/2017/09/21/clkscrew-exposing-the-perils-of-security-oblivious-energy-management/
-
[ Vulnerability ] Broadcom: Multiple overflows when handling 802.11r (FT) Reassociation Response(CVE-2017-11121): https://bugs.chromium.org/p/project-zero/issues/detail?id=1291
-
[ Web Security ] 在 https://finance.yahoo.com (手机版) 绕过 XSS 过滤器实现反射型 XSS: https://medium.com/@saamux/filter-bypass-to-reflected-xss-on-https-finance-yahoo-com-mobile-version-22b854327b27
-
[ WirelessSecurity ] BLE 应用攻击手法一览(PDF): https://www.owasp.org/images/6/6f/OWASP2017_HackingBLEApplications_TalMelamed.pdf
-
[ Backdoor ] Hijacking .NET to Defend PowerShell: https://arxiv.org/ftp/arxiv/papers/1709/1709.07508.pdf
-
[ Browser ] WebKit 内存破坏漏洞 CVE-2017-7092 疑似 PoC:var s = 'x'.repeat(0x7fffffff); http://s.link (s); : https://twitter.com/5aelo/status/912386187851190272
-
[ Others ] Sysmon v6.10 VS WMI Persistence: https://rawsec.lu/blog/posts/2017/Sep/19/sysmon-v610-vs-wmi-persistence/
-
-
[ Protocol ] 从核心概念和技术层面着眼,系统化认识RPC: https://mp.weixin.qq.com/s?__biz=MjM5MDE0Mjc4MA==&mid=2650997997&idx=1&sn=cdcd04fb6c5f2e6deb4b0ae89102ddf8&
-
[ Tools ] 在分析 APP 时,利用 WireMock 工具模拟定制的 HTTP 服务器 : https://speakerdeck.com/handstandsam/droidcon-nyc-2017-advanced-http-mocking-with-wiremock
-
[ Tools ] JavaScript in WinDbg Preview(Video): https://channel9.msdn.com/Shows/Defrag-Tools/Defrag-Tools-184-JavaScript-in-WinDbg-Preview
-
[ Vulnerability ] Andrey Konovalov 用 syzkaller Fuzz USB 第三方库发现的一些漏洞: https://twitter.com/andreyknvl/status/912436239055417345
-
[ Vulnerability ] 苹果和微软存在多年的漏洞 - iPhone 会明文发送账号密码到 Exchange 服务器,即使已经启用 SSL: http://litwinsaid.blogspot.com/2017/08/leakyx-vulnerability-that-apple-and.html
-
[ Windows ] 微软的 Matt Graeber 对 Windows 操作系统用户态信任架构模型的介绍《Subverting Trust in Windows》 :https://specterops.io/assets/resources/SpecterOps_Subverting_Trust_in_Windows.pdf