
腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Browser ] Samsung Internet Browser 5.4.02.3 允许远程攻击者绕过 SOP 限制窃取用户敏感信息(CVE-2017-17692): http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17692
-
[ iOS ] Ian Beer 公开 iOS async_wake 越狱核心利用代码之后,有研究员开始测试代码并建立了一个 FAQ 讨论帖: http://newosxbook.com/forum/viewtopic.php?f=11&;t=17390
-
[ Linux ] Linux 内核 4.9 以上版本 eBPF 全内核任意地址空间任意读写漏洞(含 PoC)(CVE-2017-16995): https://bugs.chromium.org/p/project-zero/issues/detail?id=1454&desc=3 http://seclists.org/oss-sec/2017/q4/429
-
[ Linux ] 如何在 Linux 系统中安装 PowerShell: https://github.com/PowerShell/PowerShell/blob/master/docs/installation/linux.md
-
[ MalwareAnalysis ] TrendLab 发现恶意挖矿软件 Digmine 通过 Facebook Messenger 传播: http://blog.trendmicro.com/trendlabs-security-intelligence/digmine-cryptocurrency-miner-spreading-via-facebook-messenger/
-
[ Pentest ] SQL Injection Wiki: https://sqlwiki.netspi.com/
-
[ Protocol ] 网络安全分析之 SMB 协议: https://401trg.pw/an-introduction-to-smb-for-network-security-analysts/
-
[ Tools ] Nosql-Exploitation-Framework - 基于 Python 编写的 NoSQL 扫描与利用框架: https://github.com/torque59/Nosql-Exploitation-Framework
-
[ Tools ] domato - Google DOM fuzzer: https://github.com/google/domato
-
[ Tools ] Ada 语言的 Runtime-Checks 可以帮助 AFL 工具 Fuzz Ada 程序: http://blog.adacore.com/running-american-fuzzy-lop-on-your-ada-code
-
[ Windows ] Harden Windows with AppLocker part 2: https://oddvar.moe/2017/12/21/harden-windows-with-applocker-based-on-case-study-part-2/
-
-
[ Android ] 解决 Android 的自定义权限困境(Paper): http://seclab.illinois.edu/wp-content/uploads/2017/12/tuncay2018resolving.pdf
-
-
-
[ Programming ] Predicting the next Math.random() in Java: https://franklinta.com/2014/08/31/predicting-the-next-math-random-in-java/
-
-
[ Virtualization ] ZDI 分析 2017 Top 5 漏洞案例的第四篇:利用 VMware NAT Service (vmnat.exe) 服务实现虚拟机逃逸,在 HOST 机上以 SYSTEM 权限执行代码(ZDI-17-921/CVE-2017-4934): https://www.zerodayinitiative.com/blog/2017/12/21/vmwares-launch-escape-system
-
[ Virtualization ] 虚拟化漏洞专题之寻找VMware Workstation渲染器中的漏洞: https://mp.weixin.qq.com/s/jo_-o7S2gmdXLDXcO5dmWw
-