
腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Industry News ] Zealot 活动利用 NSA exploits 向 Windows 和 Linux 服务器植入 Monero 挖矿程序: http://securityaffairs.co/wordpress/66829/cyber-crime/zealot-campaign-nsa-exploits.html
-
[ Mobile ] Huawei P8 wkupccpu debugfs 内核缓冲区溢出漏洞披露: https://blogs.securiteam.com/index.php/archives/3580
-
[ Pentest ] 使用 MySQL Bit 函数和操作符高效的进行基于时间的盲注: https://stealingthe.network/efficient-time-based-blind-sql-injection-using-mysql-bit-functions-and-operators/
-
[ SecurityReport ] 趋势科技 2018 安全预测报告: https://www.trendmicro.com/vinfo/us/security/research-and-analysis/predictions/2018
-
[ Tools ] net-creds - 一款从网络嗅探或从 Pcap 文件提取敏感数据的工具: https://github.com/DanMcInerney/net-creds
-
[ Tools ] AndroTickler - 针对 Android App 的渗透测试及审计工具: https://github.com/ernw/AndroTickler
-
[ Tools ] async_awake-fun - 在 Ian Beer 上周公开的 async_awake Exploit 的基础上写的一个更完善的 Exploit: https://github.com/ninjaprawn/async_awake-fun
-
[ Tools ] Invoke-PSImage - 在 PNG 图片中藏一个 PowerShell 脚本: https://github.com/peewpw/Invoke-PSImage
-
-
-
-
-
[ MalwareAnalysis ] 地下暗流系列 |“免费雇佣”数十万用户,TigerEyeing病毒云控推广上千应用: http://www.freebuf.com/articles/terminal/156877.html
-
[ MalwareAnalysis ] Microsoft Office VBA Macro Obfuscation via Metadata: https://isc.sans.edu/forums/diary/Microsoft+Office+VBA+Macro+Obfuscation+via+Metadata/23139/
-
[ Popular Software ] CVE–2017–16943 Exim–UAF漏洞分析: https://cert.360.cn/report/detail?id=9efc77a68170170bc490e876d4087fb2
-
[ Tools ] GraalVM - Oracle Labs 开发的一个 JVM JIT 编译器最近开源了,其中包含一个支持 Java 应用 AOT 的编译器 - Substrate VM: https://github.com/graalvm/graal
-
-
-
[ Tools ] 基于多态引擎实现的自定义 x64 指令编码器: https://pentesterslife.blog/2017/12/18/custom-x64-encoder-with-a-basic-polymorphic-engine-implementation/
-
[ Web Security ] Exploiting a tricky XSS in Zendesk: https://medium.com/@shinkurt/exploiting-a-tricky-xss-in-zendesk-80bdeaea4dad
-
[ Windows ] 利用微软签名的 MavInject32.exe 可以向任意进程注入 DLL: https://reaqta.com/2017/12/mavinject-microsoft-injector/