
腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Attack ] 使用 qemu 和 volatility 攻击加密系统: https://diablohorn.com/2017/12/12/attacking-encrypted-systems-with-qemu-and-volatility/
-
[ Browser ] Dolphin Browser for Android 不安全的 URI Scheme 解析漏洞披露 (CVE-2017-17553): https://github.com/VerSprite/research/blob/master/advisories/VS-2017-002.md
-
[ Crypto ] 19 年前,研究员 Daniel Bleichenbacher 公开了一种利用 PKCS #1 1.5 错误信息实现的自适应 RSA/TLS 攻击方法,成功利用可以解密 RSA 密文。今天另外一位研究员称发现了这种攻击的变种,可以攻击大量 HTTPS 服务器: https://robotattack.org/ ; https://web-in-security.blogspot.de/2017/12/tls-attacker-v22-and-robot-attack.html
-
[ Forensics ] SANS 内存取证分析秘籍: http://forensicmethods.com/sans-memory-forensics
-
[ iOS ] 基于 ian beer 昨天公开的 iOS 11 Exploit,获取 uid0 ROOT 权限: https://gist.github.com/iabem97/d11e61afa7a0d0a9f2b5a1e42ee505d8
-
[ Malware ] 卡巴斯基调查发现窃取 VK.Com 信息的恶意应用在 Google Play 商店被大量安装: https://securelist.com/still-stealing/83343/
-
[ Malware ] 基于P2P网络的网络犯罪调查研究之僵尸网络技术的应用(Paper): https://arxiv.org/pdf/1712.03455.pdf
-
[ Malware ] ProcessRefund - 前两天推送了一种新的无文件恶意软件杀软逃逸技术 - Process Doppelgänging,今天研究员在 GitHub 上分享了一个 PoC 代码: https://github.com/Spajed/processrefund
-
[ Others ] Hunting ThunderShell C2: https://bitrot.sh/post/11-12-2017-hunting-thundershell/
-
[ Others ] 设备电源管理中的安全问题以及 CLKSCREW 攻击,来自 BlackHat Europe 2017 会议: https://www.blackhat.com/docs/eu-17/materials/eu-17-Tang-Clkscrew-Exposing-The-Perils-Of-Security-Oblivious-Energy-Management.pdf
-
[ SecurityAdvisory ] Adobe 发布 12月安全公告: https://helpx.adobe.com/security/products/flash-player/apsb17-42.html
-
-
[ Tools ] Syntia - 利用蒙特卡洛树搜索技术实现混淆代码的自动化反混淆,自动化合成原始代码语意: https://www.usenix.org/system/files/conference/usenixsecurity17/sec17-blazytko.pdf https://github.com/RUB-SysSec/syntia
-
[ Tools ] TFGAN - 用于方便训练和生成 GANs(Generative Adversarial Networks)的轻量级库: https://research.googleblog.com/2017/12/tfgan-lightweight-library-for.html
-
[ Tools ] makin - 用于探测恶意样本反调试技术的工具: https://github.com/secrary/makin
-
[ Tools ] ADRecon - 活动目录信息收集工具: https://github.com/sense-of-security/ADRecon
-
[ Tools ] retdec - Avast 团队开源的用于分析 ELF/PE/Mach-O 的静态分析工具: https://github.com/avast-tl/retdec
-
[ Windows ] Securing Windows Defender Application Guard,来自微软研究员在 BlueHat 2017 会议上关于基于虚拟化的 WDAG 方案的介绍: https://www.slideshare.net/MSbluehat/securing-windows-defender-application-guard
-
[ Windows ] Windows Credential Manager 是怎么保存密码的: https://github.com/gentilkiwi/mimikatz/wiki/howto-~-credential-manager-saved-credentials
-
[ Browser ] Chrome 61 修复的一个 V8 Web Assembly 的类型混淆漏洞(CVE-2017-5116): https://bugs.chromium.org/p/chromium/issues/detail?id=759624
-
[ Crypto ] Decrypt php VoiceStar encryption extension: http://blog.th3s3v3n.xyz/2017/12/12/web/Decrypt_php_VoiceStar_encryption_extension/
-
[ iOS ] 研究员 progmboy 公开了昨天推送的 iOS/macOS IOSurfaceRootUserClient Double Free 漏洞的 PoC: https://github.com/progmboy/kernel_vul_poc/tree/master/mac https://bugs.chromium.org/p/project-zero/issues/detail?id=1417#c
-
-
[ MalwareAnalysis ] OSX.Pirrit 恶意广告分析 Part 3: https://www.cybereason.com/blog/targetingedge-mac-os-x-pirrit-malware-adware-still-active
-
-
-