
腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Android ] Pixel 远程代码执行攻击链的技术细节(CVE-2017-5116、CVE-2017-14904),来自 Android Security Rewards 项目获得者 Alpha Team 龚广: https://android-developers.googleblog.com/2018/01/android-security-ecosystem-investments.html
-
[ IoTDevice ] 针对医疗设备 Smiths Medical Medfusion 4000 的远程代码执行漏洞分析: https://github.com/sgayou/medfusion-4000-research/blob/master/doc/README.md
-
[ Linux ] Linux 堆溢出漏洞利用系列之 libc 2.23/2.24 vfprintf 的 Double Free 漏洞分析: https://sensepost.com/blog/2018/linux-heap-exploitation-intro-series-bonus-printf-might-be-leaking/
-
[ macOS ] 由于 AppleIntelCapriController :: getDisplayPipeCapability 中缺少边界检查导致 MacOS 内核内存泄漏(CVE-2017-13878): https://bugs.chromium.org/p/project-zero/issues/detail?id=1374
-
[ Malware ] RubyMiner 恶意软件家族在全球范围内发起了针对Web服务器的大规模攻击: http://securityaffairs.co/wordpress/67865/malware/rubyminer-monero-cryptominer.html
-
[ MalwareAnalysis ] LookOut 对超级间谍监控框架 Dark Caracal 的分析,Dark Caracal 曾被黎巴嫩驻贝鲁特总安全理事会用于监控成千上万的 Android 手机和 PC 设备: http://blog.ioactive.com/2018/01/easy-ssl-certificate-testing.html
-
[ MalwareAnalysis ] TG Soft 研究团队发现 Pitou Bootkit 恶意软件的最新变种: https://www.tgsoft.it/english/news_archivio_eng.asp?id=884
-
[ MalwareAnalysis ] 垃圾邮件过滤器审查:恶意邮件推送 Gozi-ISFB: https://isc.sans.edu/forums/diary/Reviewing+the+spam+filters+Malspam+pushing+GoziISFB/23245/
-
[ MalwareAnalysis ] 针对利用 “Heaven’s Gate” 技术矿工的分析 : https://blog.malwarebytes.com/threat-analysis/2018/01/a-coin-miner-with-a-heavens-gate/
-
[ MalwareAnalysis ] 趋势科技发现 GhostTeam 广告软件可窃取 Facebook 用户凭证: https://blog.trendmicro.com/trendlabs-security-intelligence/ghostteam-adware-can-steal-facebook-credentials/
-
[ Popular Software ] MailChimp 在处理邮件外部链接时不严格,导致用户邮件链接通过 Referer 泄漏: https://shkspr.mobi/blog/2018/01/mailchimp-leaks-your-email-address/
-
[ Tools ] net_guard - 使用 ARP 协议探测网络中未知设备的工具: https://github.com/joarleymoraes/net_guard
-
[ Tools ] ProcMonX - 一个基于 Windows 事件日志追踪实现的类似于 Process Monitor 的工具: https://github.com/zodiacon/ProcMonX
-
[ Web Security ] 通过印象笔记的 WebClipper 浏览器扩展实现对任意网站的 XSS 攻击: https://blog.xpnsec.com/evernote-webclipper-uxss/
-
[ Web Security ] 检测 Chrome Headless 模式的新方式: https://antoinevastel.github.io/bot%20detection/2018/01/17/detect-chrome-headless-v2.html
-
[ Windows ] SEC Consult 团队对 Windows 操作系统安全性的总结:包括内存破坏漏洞到各项 Mitigations、窃取系统密码、UAC Bypass,PowerShell、AMSI、应用白名单等等: https://secenv.seclab.tuwien.ac.at/static/slides/inetsec2/13_windows_security.pdf
-
[ Windows ] 《Win32k Dark Composition》中整数溢出漏洞的利用实战: https://whereisk0shl.top/post/2018-01-17
-
[ WirelessSecurity ] Hackmelock - 用于实践蓝牙 BLE hacking 的一套漏洞模拟环境,由漏洞 BLE 模拟器以及一个 APP 构成: https://smartlockpicking.com/hackmelock/