
腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Fuzzing ] 为二进制程序构建一个覆盖率导向的高级 Fuzzer,来自 ZeroNights 2017 会议: http://groundx.io/docs/ZeroNights2017-darko-fuzzer.pdf
-
[ Malware ] 将恶意代码隐藏在 Office 文档属性中以绕过杀软对宏的查杀: https://pentestlab.blog/2017/12/15/microsoft-office-payloads-in-document-properties/
-
[ Popular Software ] Android 版 Outlook 下载附件时存在目录穿越漏洞: https://bugs.chromium.org/p/project-zero/issues/detail?id=1356
-
-
[ Tools ] Binary Ninja 二进制分析框架的核心优势是 API 和支持插件扩展: https://binary.ninja/2017/12/15/change-is-in-the-air.html
-
[ Tools ] Droidefense - 高级安卓恶意软件分析框架: https://github.com/droidefense/engine
-
[ Tools ] ShellcodeToAssembly - shellcode 转汇编代码的工具: https://github.com/blacknbunny/ShellcodeToAssembly
-
[ Vulnerability ] Ruby Net::FTP 库刚刚修复了一个命令执行漏洞(CVE-2017-17405): https://www.ruby-lang.org/en/news/2017/12/14/net-ftp-command-injection-cve-2017-17405/
-
[ Windows ] GDI 不可用之后,利用 X64 内核分页机制中的 PTE Space 实现虚拟地址的稳定控制,进一步实现 NVIDIA DxgDdiEscape Handler 漏洞的利用,来自 CoreSecurity: https://www.coresecurity.com/blog/making-something-out-zeros-alternative-primitive-windows-kernel-exploitation