
腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Browser ] Chrome 62 修复的 Heap overflow in WebGL 漏洞的详情(CVE-2017-5128): https://bugs.chromium.org/p/chromium/issues/detail?id=765469
-
[ Detect ] 使用 Sysmon 和 ELK 检测 mimikatz 的执行: https://jordanpotti.com/2018/01/03/automating-the-detection-of-mimikatz-with-elk/
-
[ Hardware ] 利用 CPU 数据缓存侧信道漏洞实现任意虚拟内存读,这篇 Blog 来自 Project Zero,介绍的正是这两天爆出的 CPU 缓存侧信道漏洞的细节,受此漏洞影响的 CPU 包括 Intel、AMD 和 ARM: 1) https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html 2) https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html 3) https://meltdownattack.com/ CPU 缓存侧信道漏洞 Meltdown/Spectre 的 PoC 代码: https://github.com/turbo/KPTI-PoC-Collection 漏洞的背景资料 - KPTI 是为了解决 KASLR bypass 问题而生基本上是个幌子,来自 hardenedlinux weibo: https://weibo.com/5654890146/FCIlssrxM?type=comment
-
[ Hardware ] 这两天 CPU 处理器被发现了一个缓存侧信道漏洞,部分型号的 ARM 处理器也受此漏洞影响,来自 ARM 官方的公告: https://developer.arm.com/support/security-update
-
[ MalwareAnalysis ] 趋势科技发现在 Google Play 商店中的多款恶意应用伪装成安全工具,向用户发送大量广告并跟踪用户的位置 : http://blog.trendmicro.com/trendlabs-security-intelligence/apps-disguised-security-tools-bombard-users-ads-track-users-location/
-
[ Mobile ] 利用三星 USB MTP(媒体传输协议)任意读写三星手机存储设备 Exploit,同时可以 Bypass 锁屏和只充电模式(SVE-2017-10086): https://github.com/smeso/MTPwn
-
[ Others ] 针对 SAT/SMT 求解器与符号执行的介绍: https://yurichev.com/writings/SAT_SMT_draft-EN.pdf
-
[ SecurityAdvisory ] Xen 发布安全公告(CVE-2017-5753,CVE-2017-5715,CVE-2017-5754): https://xenbits.xen.org/xsa/advisory-254.html
-
[ Tools ] 基于 Web 控制的 C&C 后门 - Ares 的介绍: https://pentestlab.blog/2018/01/03/command-and-control-web-interface/
-
-
[ Tools ] Cr3dOv3r - 根据邮箱自动搜索泄漏的密码信息,也可测试账户密码在各大网站能否登录的工具: https://github.com/D4Vinci/Cr3dOv3r
-
[ Tools ] tensorflow-1.4-billion-password-analysis - 使用深度学习和NLP分析14亿明文密码: https://github.com/philipperemy/tensorflow-1.4-billion-password-analysis
-
[ Vulnerability ] 多个 GPS 位置跟踪设备的在线服务存在漏洞,未授权第三方可以获得其他人的位置信息: https://0x0.li/trackmageddon/
-
[ Windows ] explodingcan - IIS WebDav 远程溢出漏洞利用程序(CVE-2017-7269): https://github.com/danigargu/explodingcan
-
[ Fuzzing ] 机器学习与人工智能时代下的应用 fuzzing: https://cloudblogs.microsoft.com/microsoftsecure/2018/01/03/application-fuzzing-in-the-era-of-machine-learning-and-ai/
-
-
[ SecurityAdvisory ] 微软关于 CPU 缓存侧信道漏洞的缓解补丁及公告: https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/adv180002
-
[ Tools ] Cisco Talos 团队公开了其 Mutiny Fuzzing Framework 与 Decept Proxy 两款工具: http://blog.talosintelligence.com/2018/01/tutorial-mutiny-fuzzing-framework-and.html
-
[ Vulnerability ] Python http.server 任意跳转漏洞浅析: https://blog.trustlook.com/2018/01/02/trojan-utilizes-customized-communication-packets-to-target-korean-speaking-users/
-
[ Windows ] Process Doppelganging利用介绍: https://3gstudent.github.io/3gstudent.github.io/Process-Doppelganging%E5%88%A9%E7%94%A8%E4%BB%8B%E7%BB%8D/