
腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Android ] 提高 Google Play 上的应用安全性: https://android-developers.googleblog.com/2017/12/improving-app-security-and-performance.html
-
[ Data Breach ] 最近暗网发生的最大规模密码泄露事件的 14亿密码的下载链接: https://gist.github.com/scottlinux/9a3b11257ac575e4f71de811322ce6b3
-
[ IoTDevice ] Ichano AtHome IP 摄像头三处安全漏洞披露: https://blogs.securiteam.com/index.php/archives/3576
-
[ MachineLearning ] 利用 Raspberry Pi 和 YOLO 打造基于深度学习的摄像头: https://www.makeartwithpython.com/blog/poor-mans-deep-learning-camera/
-
[ MachineLearning ] 机器学习速查表: https://ml-cheatsheet.readthedocs.io/en/latest/index.html
-
[ macOS ] iOS / macOS 的 VPN Client 可以帮用户实现在公用 WiFi 中匿名安全的通信,然而 Apple SDK 的 NetworkExtension 存在安全问题,攻击者可以自己写一个 APP,绑定物理接口 IP 上,可以导致所有的 VPN 流量都不从 VPN 安全信道传输了: https://www.symantec.com/blogs/threat-intelligence/security-vpn-ios-macos
-
[ MalwareAnalysis ] TrendLabs 针对恶意软件 AnubisSpy 的分析: http://blog.trendmicro.com/trendlabs-security-intelligence/cyberespionage-campaign-sphinx-goes-mobile-anubisspy/
-
[ MalwareAnalysis ] 针对 Travle 的恶意软件分析: https://securelist.com/travle-aka-pylot-backdoor-hits-russian-speaking-targets/83455/
-
[ Popular Software ] 超过 30 万安装量的 WordPress 插件被爆存在后门: https://www.bleepingcomputer.com/news/security/backdoor-found-in-wordpress-plugin-with-more-than-300-000-installations/
-
[ Programming ] 自己动手写一个 C++ 游戏引擎: http://preshing.com/20171218/how-to-write-your-own-cpp-game-engine/
-
[ Tools ] 编写一个 C 编译器 Part 3: https://norasandler.com/2017/12/15/Write-a-Compiler-3.html Part 2: https://norasandler.com/2017/12/05/Write-a-Compiler-2.html Part 1: https://norasandler.com/2017/11/29/Write-a-Compiler.html
-
[ Tools ] fuzzotron - 一个基于 TCP/UDP 的 fuzz 工具: https://github.com/denandz/fuzzotron
-
[ Tools ] Invoke-Obfuscation 用例指南 Part 2: http://www.danielbohannon.com/blog-1/2017/12/2/the-invoke-obfuscation-usage-guide-part-2
-
[ Tools ] merlin - 使用 HTTP 通信的跨平台后渗透测试工具,介绍: https://medium.com/@Ne0nd0g/introducing-merlin-645da3c635a GitHub: https://github.com/Ne0nd0g/merlin ;
-
-
[ Tools ] ropa - 基于 Ropper 实现的一个 GUI 版本的 ROP 链构造工具: https://github.com/orppra/ropa
-
[ Tools ] Palantir 开源了他们的一个应急预警与检测策略框架: https://medium.com/@palantir/alerting-and-detection-strategy-framework-52dc33722df2 https://github.com/palantir/alerting-detection-strategy-framework
-
[ Tools ] PowerShellScripts - PowerShell 编写的集成化磁盘数字取证平台: https://github.com/Invoke-IR/PowerForensics
-
[ Tools ] Kansa - 一个基于 Powershell 的事件响应框架: https://github.com/davehull/Kansa
-
[ Tools ] Empire 攻击框架内置了一个利用 Edge/IE 实现 C&C 命令控制的 COM 对象(InternetExplorer.Application): https://adapt-and-attack.com/
-
[ Vulnerability ] Intel 内容保护 HECI 服务类型混淆本地提权漏洞(CVE-2017-5717),来自 Project Zero: https://bugs.chromium.org/p/project-zero/issues/detail?id=1358
-
[ Vulnerability ] Python 刚刚修复了 webbrowser.py 的一个命令参数注入漏洞,攻击者可以通过 URL 向 BROWSER 环境变量注入命令参数(CVE-2017-17522): https://bugs.python.org/issue32367
-
[ Web Security ] Safari 客户端反射型 XSS 攻击: https://lab.wallarm.com/the-good-the-bad-and-the-ugly-of-safari-in-client-side-attacks-56d0cb61275a?nocache=122124543
-
-
-
-
[ Industry News ] 微软宣布 Windows Insider 版中的 Edge 浏览器 将默认启用 Service Workers : https://blogs.windows.com/msedgedev/2017/12/19/service-workers-going-beyond-page/#7EbThle0TrsYvSJ1.97
-
[ Industry News ] 美国政府称朝鲜是 WannaCry 事件的幕后主使:https://techcrunch.com/2017/12/18/us-government-north-korea-wannacry/
-
-
[ Popular Software ] Cure53 发布的 Enigmail 渗透测试报告: https://enigmail.net/download/other/Enigmail%20Pentest%20Report%20by%20Cure53%20-%20Excerpt.pdf
-
[ Vulnerability ] VMWare VNC 漏洞披露(CVE-2017-4933): http://blog.talosintelligence.com/2017/12/vulnerability-spotlight-vmware-vnc.html
-
[ Vulnerability ] NET::Ftp allows command injection in filenames(CVE-2017-17405): https://hackerone.com/reports/294462
-
[ Vulnerability ] Apache Groovy 远程代码执行漏洞详情: https://www.zerodayinitiative.com/blog/2017/12/19/apache-groovy-deserialization-a-cunning-exploit-chain-to-bypass-a-patch
-
[ Windows ] 利用 Visual Studio 中携带微软签名的 tracker.exe 可以加载 DLL 实现代码执行: https://twitter.com/Sudhanshu_C/status/943011972261412864