
腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Crypto ] 针对加密货币自动化挖矿的威胁分析: https://www.icebrg.io/blog/coin-mining-by-opportunistic-and-automated-threats
-
[ Malware ] 攻击者使用虚假的 Spectre 和 Meltdown 补丁传播 Smoke Loader 恶意软件: https://blog.malwarebytes.com/cybercrime/2018/01/fake-spectre-and-meltdown-patch-pushes-smoke-loader/
-
[ Pentest ] 通过劫持远程桌面服务(RDS) 实现在企业内网的横向渗透: https://medium.com/@networksecurity/rdp-hijacking-how-to-hijack-rds-and-remoteapp-sessions-transparently-to-move-through-an-da2a1e73a5f6
-
[ Popular Software ] Office 内嵌公式编辑器 EQNEDT32.EXE 0day 漏洞(CVE-2018-0802)的野外样本出现了: https://twitter.com/i/web/status/952206579373432832https://github.com/rxwx/CVE-2018-0802/blob/master/packager_exec_CVE-2018-0802.py
-
[ Tools ] Electra iOS 11.0 - 11.1.2 jailbreak toolkit based on async_awake : https://github.com/coolstar/electra
-
[ Tools ] 用于实践 ARM 路由器漏洞利用的实验环境 - DVAR: http://blog.exploitlab.net/2018/01/dvar-damn-vulnerable-arm-router.html
-
[ Tools ] cSploit - 一款开源的 Android 网络分析及渗透测试套件: https://github.com/cSploit/android
-
[ Tools ] CALDERA - 自动化网络攻击仿真系统: https://github.com/mitre/caldera
-
[ Tools ] 安装配置 MITRE Caldera 自动化网络攻击仿真系统的教程: https://holdmybeersecurity.com/2018/01/13/install-setup-mitre-caldera-the-automated-cyber-adversary-emulation-system/
-
[ Vulnerability ] OpenSSL SSL Handshake 错误状态安全绕过分析(CVE-2017-3737): https://blog.fortinet.com/2018/01/12/an-analysis-of-the-openssl-ssl-handshake-error-state-security-bypass-cve-2017-3737