
腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Android ] 了解 Android 7.0 新引入的 APK Signature Scheme v2 签名机制: https://medium.com/@dhuma1981/understanding-new-apk-signature-scheme-v2-b705178f4d60
-
[ Others ] Hiding Your Process from Sysinternals: https://riscybusiness.wordpress.com/2017/10/07/hiding-your-process-from-sysinternals/
-
[ Tools ] VulnScan - 内存破坏漏洞的自动化分类和分析,来自微软 Blog: https://blogs.technet.microsoft.com/srd/2017/10/03/vulnscan-automated-triage-and-root-cause-analysis-of-memory-corruption-issues/
-
[ WirelessSecurity ] 利用树莓派在 Windows 上实现对 WiFi 数据包的嗅探: https://zone13.io/post/wifi-monitoring-using-raspberry-pi/
-
[ Android ] 支持 Android Nougat 版本的 Xposed 框架发布了: https://www.xda-developers.com/official-xposed-framework-android-nougat/
-
[ Browser ] Chrome IPC handler OnMsgDidDeleteInProcessInstance PP_Instance 不正确使用导致的沙箱逃逸漏洞的细节 CVE-2017-5092: https://bugs.chromium.org/p/chromium/issues/detail?id=733549
-
-
[ Industry News ] 嵌入式版本 Windows XP POSReady 2009 开始支持 TLS 1.1 和 TLS 1.2: https://cloudblogs.microsoft.com/microsoftsecure/2017/10/05/announcing-support-for-tls-1-1-and-tls-1-2-in-xp-posready-2009/
-
-
[ Industry News ] Netgear 最近修复了包括其下路由器、交换机等产品的 50 个漏洞: https://threatpost.com/netgear-fixes-50-vulnerabilities-in-routers-switches-nas-devices/128230/
-
[ Industry News ] SYSCON 后门利用 FTP 作为 C&C 信道: http://blog.trendmicro.com/trendlabs-security-intelligence/syscon-backdoor-uses-ftp-as-a-cc-channel/
-
[ Linux ] 针对 CVE-2017-1000112 漏洞的详细分析: https://securingtomorrow.mcafee.com/mcafee-labs/linux-kernel-vulnerability-can-lead-to-privilege-escalation-analyzing-cve-2017-1000112/
-
-
[ Pentest ] 域渗透——利用DCOM在远程系统执行程序,来自 3gstudent's blog: https://3gstudent.github.io/3gstudent.github.io/%E5%9F%9F%E6%B8%97%E9%80%8F-%E5%88%A9%E7%94%A8DCOM%E5%9C%A8%E8%BF%9C%E7%A8%8B%E7%B3%BB%E7%BB%9F%E6%89%A7%E8%A1%8C%E7%A8%8B%E5%BA%8F/
-
-
[ Tools ] SecWiki 整理的 Linux 平台提权漏洞集合:https://github.com/SecWiki/linux-kernel-exploits Windows 平台提权漏洞集合:https://github.com/SecWiki/windows-kernel-exploits
-
-
-
[ Vulnerability ] Angular-CLI Authentication Bypass: https://blogs.securiteam.com/index.php/archives/3451
-
[ Windows ] Use CLR to bypass UAC,来自 3gstudent's blog: https://3gstudent.github.io/3gstudent.github.io/Use-CLR-to-bypass-UAC/
-
[ Windows ] Bypassing SACL Auditing on LSASS: https://tyranidslair.blogspot.com/2017/10/bypassing-sacl-auditing-on-lsass.html
-
[ Windows ] Bypassing SACL Auditing on LSASS: https://tyranidslair.blogspot.com/2017/10/bypassing-sacl-auditing-on-lsass.html
-
[ Windows ] 利用二进制补丁 Diff 的方法挖掘 Windows 内核的内存泄漏漏洞: https://googleprojectzero.blogspot.com/2017/10/using-binary-diffing-to-discover.html
-
-
-
[ Windows ] Windows 10 RS3(16299.15) UAC 相关的变化总结: https://twitter.com/hFireF0X/status/915424082069479424