
腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Android ] On the Usage of the Fingerprint API in Android : https://machiry.github.io/files/fingerpri.pdf
-
[ Browser ] Out-Of-Bounds Read Vulnerability in Skia,Chrome 62 版本修复 CVE-2017-15388 漏洞: https://bugs.chromium.org/p/chromium/issues/detail?id=756563
-
[ Defend ] 从削减攻击界面的角度实现内核的自保护,来自德国布伦瑞克工业大学 2014 年的一篇 Paper: https://publikationsserver.tu-braunschweig.de/servlets/MCRFileNodeServlet/digibib_derivate_00036154/Diss_Kurmus_Anil.pdf
-
[ Linux ] Linux GoAhead web server 3.6.5 之前版本远程代码执行漏洞的分析(CVE-2017-17562),其中涉及到如何通过 HTTP 请求远程设置环境变量 LD_PRELOAD 实现利用: https://www.elttam.com.au/blog/goahead/
-
[ MalwareAnalysis ] Trend Micro 针对新发现的恶意软件家族 GnatSpy 的分析: http://blog.trendmicro.com/trendlabs-security-intelligence/new-gnatspy-mobile-malware-family-discovered/
-
[ MalwareAnalysis ] Kaspersky 对 Android木马 Loapi 的分析: https://securelist.com/jack-of-all-trades/83470/
-
[ Network ] Local IPv6 网络的自动化探测和节点发现: https://secdevops.ai/theres-no-place-like-1-enumerating-local-ipv6-networks-88a6247e3519
-
[ Popular Software ] Adobe Reader integer underflow 漏洞的利用 - READING BACKWARDS,这个漏洞是 CVE-2016-6947 补丁的再次突破,发现者为 Pwn2Own 2014 选手 Sebastian Apelt(ZDI-17-260): https://www.zerodayinitiative.com/blog/2017/12/18/reading-backwards-controlling-an-integer-underflow-in-adobe-reader
-
[ Popular Software ] 通过修改 Office 文档 Frameset 以窃取 NTLM Hash: https://pentestlab.blog/2017/12/18/microsoft-office-ntlm-hashes-via-frameset/
-
[ SecurityReport ] McAfee Labs 发布 12 月份威胁报告: https://www.mcafee.com/us/resources/reports/rp-quarterly-threats-dec-2017.pdf
-
[ Tools ] Ivy for Bitcoin - 比特币智能合约(Bitcoin smart contracts)的编译器,可以生成 Bitcoin Script: https://blog.chain.com/ivy-for-bitcoin-a-smart-contract-language-that-compiles-to-bitcoin-script-bec06377141a
-
[ Tools ] FilzaJailed - 利用 async_wake exploit 实现读写能力进而实现全局文件系统访问的 APP: http://www.3u.com/tutorial/articles/4930/filzajailed-filza-for-ios-11-111-1-2-with-read-write-privileges
-
[ Tools ] Nexus.js - 基于 WebKit/JavaScriptCore 的多线程 JavaScript 运行时: https://dev.to/voodooattack/introducing-nexusjs-a-multi-threaded-javascript-run-time-3g6
-
[ Tools ] SHADOW ON THE WALL - Shadowsocks 流量的检测、解密、与命令执行漏洞: https://x41-dsec.de/security/news/2017/12/18/x41-shadow-on-the-wall/
-
[ Web Security ] 利用 Web 应用程序漏洞窃取 NTLM Hash: https://blog.blazeinfosec.com/leveraging-web-application-vulnerabilities-to-steal-ntlm-hashes-2/
-
[ Windows ] Windows 函数 Inline Hooking 的实现原理: https://blog.nettitude.com/uk/windows-inline-function-hooking
-
[ Windows ] 滥用 Windows SCM 服务管理器为非服务应用保持持久化运行: https://researchcenter.paloaltonetworks.com/2017/12/unit42-abusing-service-control-manager-establish-persistence-non-service-applications/
-
[ Windows ] 结合 JScript.dll 的漏洞和 WPAD 代理发现协议,实现 Exploiting 局域网中的 Windows 10,来自 Project Zero: https://googleprojectzero.blogspot.com/2017/12/apacolypse-now-exploiting-windows-10-in_18.html
-
-
[ Browser ] Mozilla SpiderMonkey JS 引擎介绍: https://www.slideshare.net/ZongShenShen/coscup-2015-a-beginners-journey-to-mozilla-spider-monkey-js-engine?from_action=save
-
[ Browser ] Dolphin Browser for Android 备份及还原功能存在任意文件写漏洞(CVE-2017-17551): https://versprite.com/og/exploiting-dolphin-browser-backup-restore/index.html
-
[ Debug ] Kernel debugging 入门指南: http://www.alexlambert.com/2017/12/18/kernel-debugging-for-newbies.html
-
[ Industry News ] 安全人员发现上千台 Lexmark 打印机存在错误配置问题: https://threatpost.com/user-gross-negligence-leaves-hundreds-of-lexmark-printers-open-to-attack/129187/
-
[ IoTDevice ] Logitech 300 Mbps 无线局域网宽带路由器多款型号被发现 UPnP 漏洞: http://www.logitec.co.jp/info/2017/1219.html
-
[ MalwareAnalysis ] 闷声发大财年度之星:2017挖矿木马的疯狂敛财暗流: https://weibo.com/ttarticle/p/show?id=2309404186375594332080
-
-
-
[ Popular Software ] Shadowsocks 的封装 auto-ss 在处理网络请求响应时校验不完善,通过中间人方式修改域名可以实现远程命令执行: https://www.x41-dsec.de/lab/advisories/x41-2017-007-shadowsocks_auto-ss/
-
[ Popular Software ] ShadowSocks ConnecTion 在解析 Web 页面时缺乏检查,通过中间人方式修改页面内容可以导致命令执行: https://www.x41-dsec.de/lab/advisories/x41-2017-007-shadowsocks_connection/
-
-
[ Windows ] Windows jscript.dll 中存在堆溢出漏洞 (CVE-2017-11907): https://bugs.chromium.org/p/project-zero/issues/detail?id=1383
-
[ Windows ] MSDN 上下载的 Windows 10 虚拟机默认安装的密码管理器 Keeper 存在一个特权页 UI 注入漏洞: https://bugs.chromium.org/p/project-zero/issues/detail?id=1481&desc=3
-
[ Windows ] Windows jscript!NameTbl::GetValDef 中存在 UAF 漏洞(CVE-2017-11903): https://bugs.chromium.org/p/project-zero/issues/detail?id=1376