腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Android ] Android Vulnerabilities Overview - 研究员 CHEF-KOCH 整理的 Android 已知漏洞的情况总结: https://github.com/CHEF-KOCH/Android-Vulnerabilities-Overview
-
[ APT ] 微软威胁防护(ATP)平台的对抗技术研究,来自 BlackHat 2017 会议: https://github.com/retbandit/BlackHat2017/blob/master/eu-17-Thompson-Red-Team-Techniques-for-Evading-Bypassing-and-Disabling-MS-Advanced-Threat-Protection-and-Advanced-Threat-Analytics.pptx
-
[ Browser ] 证书的扩展验证(EV,Extended validation)被浏览器使用提高用户体验,当用户访问证书有效并携带 EV 信息的网站时,地址栏不再显示 URL,而是公司名称,例如 "Stripe, Inc"。这篇 Blog 中作者提到了一种不同国家地区公司名称冲突带来的问题。美国有两个州都有 "Stripe, Inc" 公司,此时 URL 无法分辨: https://stripe.ian.sh/
-
[ Debug ] WinDbg 调试时调用栈中出现的 _invalid_parameter_noinfo_noreturn 是怎么回事儿?: https://randomascii.wordpress.com/2017/12/10/analyzing-a-confusing-crash/
-
[ Detect ] 通过静态分析检测二进制代码中的 Use-After-Free 漏洞: http://blog.amossys.fr/intro-to-use-after-free-detection.html
-
[ Industry News ] OilRig Performs Tests on the TwoFace Webshell: https://researchcenter.paloaltonetworks.com/2017/12/unit42-oilrig-performs-tests-twoface-webshell/
-
[ iOS ] Project Zero 研究员 Ian Beer 在 IOSurfaceRootUserClient Double Free 漏洞(CVE-2017-13861)详情中上传了一个 async_wake Exploit,并表示支持所有版本设备: https://twitter.com/i/web/status/940255539153588224
-
[ Linux ] Road to Exim RCE - 滥用 Exim 的 UAF(CVE-2017-16943)漏洞实现 RCE: https://devco.re/blog/2017/12/11/Exim-RCE-advisory-CVE-2017-16943-en/
-
[ MachineLearning ] Machine Learning for Systems and Systems for Machine Learning: http://learningsys.org/nips17/assets/slides/dean-nips17.pdf
-
[ macOS ] Project Zero 公开了几个 macOS/iOS 的漏洞细节(CVE-2017-13865、CVE-2017-13867、CVE-2017-13875、CVE-2017-13876、CVE-2017-13861): 1) https://bugs.chromium.org/p/project-zero/issues/detail?id=1386 ; 2) https://bugs.chromium.org/p/project-zero/issues/detail?id=1372 ; 3) https://bugs.chromium.org/p/project-zero/issues/detail?id=1373 ; 4) https://bugs.chromium.org/p/project-zero/issues/detail?id=1375 ; 5) https://bugs.chromium.org/p/project-zero/issues/detail?id=1417 ;
-
[ Malware ] Google Play 上的银行恶意软件将目标瞄准波兰银行: https://www.welivesecurity.com/2017/12/11/banking-malware-targets-polish-banks/
-
[ MalwareAnalysis ] 针对 Satori botnet 的分析: https://sissden.eu/blog/darknet-satori
-
[ Others ] 研究员 riscybusiness 昨天发现它的 Windows 联想笔记本存在一个叫做 "SynTPAPIMemMap" 的 shared memory object,该共享内存的 ACL 为空,任何进程都可以读写。经过分析他发现可以利用这个共享内存对象实现 RCE。不过后来他又澄清说这不是联想的问题,是他自己系统的问题: http://riscy.business/2017/12/lenovos-unsecured-objects/
-
[ Popular Software ] TarLogic 团队对 Office CVE-2017-11826 漏洞的分析: https://www.tarlogic.com/en/blog/exploiting-word-cve-2017-11826/
-
[ SecurityProduct ] 赛门铁克签名的 symerr.exe 会通过 DLL Side-Loding 方式加载同目录下的 cclib.dll,利用这个可以实现代码执行并解决签名验证的问题: https://twitter.com/0rbz_/status/940028712766005248
-
[ Tools ] WMIOps - 通过网络使用 WMI 来实现各种渗透测试目的的工具: https://github.com/ChrisTruncer/WMIOps
-
[ Tools ] PowerShell 脚本收集: https://github.com/Arno0x/PowerShellScripts
-
[ Tools ] mimiDbg - 从内存中检索密码的 PowerShell 脚本: https://github.com/giMini/mimiDbg
-
-
[ Tools ] 一款适用于 Burp Suite 和 Chrome 的漏洞检测插件: https://avleonov.com/2017/12/10/vulners-com-vulnerability-detection-plugins-for-burp-suite-and-google-chrome/
-
[ Vulnerability ] glibc 的 ld.so 中发现缓冲区溢出漏洞(CVE-2017-1000408、CVE-2017-1000409): http://seclists.org/oss-sec/2017/q4/385
-
[ Windows ] 浏览器的隔离与微软的 WDAG(基于虚拟化的硬件防护): What It Does, How It Works and What It Means: https://blogs.bromium.com/browser-isolation-with-microsoft-windows-defender-application-guard/
-
-
[ Browser ] Chrome v63 XSS Filter Bypass PoC: https://twitter.com/brutelogic/status/940197514149617665
-
-
[ Crypto ] Magic "Nothing Up My Sleeve" Numbers: https://tinycrypt.wordpress.com/2017/12/09/magic_numbers/
-
[ Industry News ] Cobalt Strike 3.10 发布,Beacon Payload 开始支持 Unicode: https://blog.cobaltstrike.com/2017/12/11/cobalt-strike-3-10-%D1%85%D0%B0%D0%BA%D0%B5%D1%80-vs-%E8%82%89%E9%9B%9E/
-
[ IoTDevice ] 安全研究人员发现 AMAG Technology 公司无钥匙智能系统中存在漏洞(CVE-2017-16241):https://threatpost.com/vulnerability-found-in-two-keyless-entry-locks/129132/
-
[ Language ] The Future of JavaScript Will Be Less JavaScript: https://codeburst.io/the-future-of-javascript-will-be-less-javascript-cea373eb57fd
-
-
[ Mobile ] 针对移动设备的安全的生物识别认证可替代方案: https://translate.google.com/#en/zh-CN/A%20Secure%20Mobile%20Authentication%20Alternative%20to%20Biometrics
-
[ Others ] 解密 Patchwork 网络间谍组织: http://blog.trendmicro.com/trendlabs-security-intelligence/untangling-the-patchwork-cyberespionage-group/
-
-
-
[ Vulnerability ] QNAP QTS 远程代码执行漏洞(CVE-2017-17033): https://blogs.securiteam.com/index.php/archives/3565
-
[ Windows ] Windows Defender 利用基于动态分析(Detonation)数据的机器学习技术对抗 Win32/Tibbar.A (Bad Rabbit) 勒索软件: https://blogs.technet.microsoft.com/mmpc/2017/12/11/detonating-a-bad-rabbit-windows-defender-antivirus-and-layered-machine-learning-defenses/
-
-