
腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ iOS ] 如何为指定的 iOS 版本找内核调试符号(Kernel Symbols): https://medium.com/@cji_/hunting-for-ios-kernel-symbols-e48a446bb00
-
[ iOS ] iOS 11.2.1 安全更新内容: https://support.apple.com/en-us/HT208357
-
[ IoTDevice ] Zivif 网络摄像机中的三个漏洞披露(CVE-2017-17105, CVE-2017-17106, CVE-2017-17107): http://seclists.org/fulldisclosure/2017/Dec/42?utm_source=feedburner&utm_medium=twitter&utm_campaign=Feed%3A+seclists%2FFullDisclosure+%28Full+Disclosure%29
-
[ IoTDevice ] 远程 Root DirecTV 的无线视频桥接(WVBT)(CVE-2017-17411): https://www.zerodayinitiative.com/blog/2017/12/13/remote-root-in-directvs-wireless-video-bridge-a-tale-of-rage-and-despair
-
[ MalwareAnalysis ] 针对 POS 恶意软件 GratefulPOS 的分析: http://www.vkremez.com/2017/12/lets-learn-reversing-grateful-point-of.html
-
[ MalwareAnalysis ] nccgroup 对朝鲜 HIDDEN COBRA 行动中使用的 Volgmer 木马的技术分析报告: https://www.nccgroup.trust/uk/about-us/newsroom-and-events/blogs/2017/december/hidden-cobra-volgmer-a-technical-analysis/
-
[ MalwareAnalysis ] FortiGuard Lab 针对先发现的 Okiru botnet 的分析: https://blog.fortinet.com/2017/12/12/rise-of-one-more-mirai-worm-variant
-
[ Pentest ] SCF 文件攻击方式介绍: https://pentestlab.blog/2017/12/13/smb-share-scf-file-attacks/
-
[ Protocol ] SSL/TLS 证书信息中的 XSS: https://binaryfigments.com/2017/12/11/dont-trust-all-ssl-tls-certificates/
-
[ SecurityProduct ] Palo Alto 网络防火墙远程 root 权限代码执行漏洞(CVE-2017-15944): http://seclists.org/fulldisclosure/2017/Dec/38
-
[ Tools ] CryptSky - 一个简单的,完全由 python 编写的勒索软件样本: https://github.com/deadPix3l/CryptSky/
-
-
[ Tools ] mssql-cli - 一款 SQL Server 交互式命令行工具发布: https://blogs.technet.microsoft.com/dataplatforminsider/2017/12/12/try-mssql-cli-a-new-interactive-command-line-tool-for-sql-server/
-
-
[ Tools ] Goohak - 自动化针对目标域名进行 Google Hacking 的工具: https://github.com/1N3/Goohak
-
[ Tools ] NIST(美国国家标准技术研究所) 发布的物业管理系统安全加固手册: https://nccoe.nist.gov/sites/default/files/library/project-descriptions/hosp-pms-project-description-final.pdf
-
[ Vulnerability ] Fortinet FortiClient 的 VPN 凭证泄漏漏洞披露: http://seclists.org/fulldisclosure/2017/Dec/43?utm_source=feedburner&;utm_medium=twitter&utm_campaign=Feed%3A+seclists%2FFullDisclosure+%28Full+Disclosure%29
-
[ Vulnerability ] vBulletin routestring 未授权远程代码执行漏洞披露: https://blogs.securiteam.com/index.php/archives/3569
-
[ Windows ] 利用 AppLocker 加固 Windows: https://oddvar.moe/2017/12/13/harden-windows-with-applocker-based-on-case-study-part-1/
-
[ Browser ] V8 从 5.9 版本开始原生支持函数级 Code Coverage 的统计,6.1 版本进一步增加对块级别统计的支持。通过 Chrome DevTools 的 Coverage tab 就可以查看: http://v8project.blogspot.com/2017/12/javascript-code-coverage.html
-
-
[ Industry News ] Mirai botnet 的三位攻击者近日认罪: http://www.zdnet.com/article/justice-dept-indicts-mirai-botnet-attackers/
-
-
[ MalwareAnalysis ] Sneaky *.BAT File Leads to Spoofed Banking Page:https://www.trustwave.com/Resources/SpiderLabs-Blog/Sneaky--BAT-File-Leads-to-Spoofed-Banking-Page/
-
-
-
-
[ Windows ] Windows Kernel pool overflow 漏洞分析以及如何通过改写 Heap Spray 后的 TypeIndex 实现利用: https://srcincite.io/blog/2017/09/06/sharks-in-the-pool-mixed-object-exploitation-in-the-windows-kernel-pool.html
-
[ Windows ] 启用审计模式来评估 Windows Defender Exploit Guard: https://docs.microsoft.com/en-us/windows/threat-protection/windows-defender-exploit-guard/audit-windows-defender-exploit-guard