
腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Crypto ] 2017 年加密方向相关的出色文章集合 : https://www.cryptologie.net/article/435/best-crypto-blog-posts-of-2017
-
[ Data Breach ] Rootsweb 服务器泄漏了部分 Ancestry.com 的用户数据: https://threatpost.com/leaky-rootsweb-server-exposes-some-ancestry-com-user-data/129248/
-
[ Industry News ] 安全人员发出警告称被用来攻击 Huawei 路由器的 Mirai 恶意软件变种 Satori ,或将被用于更大规模的攻击: https://threatpost.com/code-used-in-zero-day-huawei-router-attack-made-public/129260/
-
[ Industry News ] Metasploit 将支持使用 Python 编写模块: https://blog.rapid7.com/2017/12/28/regifting-python-in-metasploit/
-
[ iOS ] iOS 内核漏洞利用技术的考古研究,来自德国 CCC 会议的演讲视频: https://media.ccc.de/v/34c3-8720-ios_kernel_exploitation_archaeology
-
[ IoTDevice ] Spy vs Spy: A modern study of mic bugs operation and detection,针对麦克风问题的研究与检测,来自德国 CCC 大会: https://media.ccc.de/v/34c3-8735-spy_vs_spy_a_modern_study_of_microphone_bugs_operation_and_detection
-
[ Linux ] 利用 Intel 的动态指令翻译库 Houdini 实现在 Linux x86 上运行 ARM 二进制程序: https://v-e-o.blogspot.com/2017/12/run-arm-executables-on-linux-x86-with.html
-
[ MalwareAnalysis ] 从 Loki 恶意样本入手利用 Maltego 工具发现 550 个 C&C 域名: https://benkowlab.blogspot.com/2017/12/another-normal-day-in-cybercrime-from.html
-
[ Others ] 将一个(有限制的)内核内存写漏洞转换成一个任意内存写: https://theevilbit.blogspot.com/2017/12/convert-write-where-kernel-exploits.html
-
[ Others ] HTTP/2 客户端被动指纹收集: https://www.blackhat.com/docs/eu-17/materials/eu-17-Shuster-Passive-Fingerprinting-Of-HTTP2-Clients-wp.pdf
-
[ Others ] 32 位 ARM 平台的 TCP Bind Shell Shellcode 的编写: https://azeria-labs.com/tcp-bind-shell-in-assembly-arm-32-bit/
-
[ Programming ] 使用 GO 语言在 100 行代码内实现 HTTP(S) 代理: https://medium.com/@mlowicki/http-s-proxy-in-golang-in-less-than-100-lines-of-code-6a51c2f2c38c
-
[ Protocol ] SSL Labs Grading 2018,关于 SSL 协议安全性定级标准的文档: https://docs.google.com/document/d/13o_iRZ5-Lv8VTDULUmpUu0XgHWCXDUbYia1vPagMBKE/edit#
-
[ Tools ] wphardening -WordPress 安全加固工具: https://github.com/elcodigok/wphardening
-
[ Tools ] 卡巴斯基分享了一个用于在企业内部采集每台员工电脑日志的脚本: https://securelist.com/happy-ir-in-the-new-year/83557/
-
-
[ Tools ] pdbparse - 用于解析 PDB 文件的 Python 库: https://github.com/moyix/pdbparse
-
[ Tools ] btlejuice - 针对智能蓝牙设备的中间人攻击框架: https://github.com/DigitalSecurity/btlejuice
-
[ Tools ] NativeLeakDetector - 调用 ETW 检测 Windows 内存泄漏: https://github.com/AviAvni/NativeLeakDetector
-
[ Tools ] QiLin - 基于 Ian Beer Exploit 的另一款越狱工具集(10.1.1, 10.2, 11.1.2),QiLin 将沙箱逃逸、ROOT 文件系统重挂载、二进制文件 Unpacking 封装成一个稳定的库: http://newosxbook.com/QiLin/
-
-
[ Windows ] 减轻和消除企业网络中的 Qakbot 和 Emotet 信息窃取后门: https://blogs.technet.microsoft.com/mmpc/2017/11/06/mitigating-and-eliminating-info-stealing-qakbot-and-emotet-in-corporate-networks
-
[ WirelessSecurity ] 基于软件无线电(SDR)对无线领域进行探索,来自 DefconGroup010 大会雪碧 0xroot: https://drive.google.com/file/d/1vB2AWF_wtGm9YPy9SCkddUqmWDjXHQ2k/view
-
[ Android ] Android Tethering Provisioning Check Bypass (CVE-2017-0554): https://github.com/lanrat/tethr
-
-
[ Firmware ] 争夺保护内存之战-使用高级纯数据利用技术攻击只读内存,来自 Bing Sun: https://sites.google.com/site/bingsunsec/the-battle-for-protected-memory
-
-
-
-
[ Tools ] BootStomp - Android bootloader 漏洞发现工具: https://media.ccc.de/v/34c3-9205-bootstomp_on_the_security_of_bootloaders_in_mobile_devices GitHub: https://github.com/ucsb-seclab/BootStomp
-
-
[ Windows ] 基于生物识别技术的 Windows Hello 的介绍 : https://www.computerworld.com/article/3244347/microsoft-windows/what-is-windows-hello-microsofts-biometrics-security-system-explained.html
-
[ Windows ] 近期的漏洞利用趋势及缓解、检测策略,来自 zeronights 2017 大会 Matt Oh: https://2017.zeronights.org/wp-content/uploads/materials/ZN17_Matt_Recent%20Exploit%20Trend%20and%20Mitigation,%20Detection%20Tactics-Current.pdf
-
[ WirelessSecurity ] KRACKing WPA2 by Forcing Nonce Reuse,来自德国 CCC 大会: https://media.ccc.de/v/34c3-9273-kracking_wpa2_by_forcing_nonce_reuse