
腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Debug ] Cisco IOS MIPS 设备系统的调试脚本: https://github.com/artkond/ios_mips_gdb
-
[ Fuzzing ] 利用 libFuzzer Fuzz TCP Server: http://blog.swiecki.net/2018/01/fuzzing-tcp-servers.html
-
[ Hardware ] Fortinet 团队对"幽灵" Spectre CPU 漏洞的分析: https://blog.fortinet.com/2018/01/17/into-the-implementation-of-spectre如果想快速检测自己是否受该漏洞影响,可以试试腾讯安全玄武实验室发布的在线检测工具: http://xlab.tencent.com/special/spectre/spectre_check.html
-
[ macOS ] MWR Labs 发布了三个关于 Apple macOS/ios 权限提升漏洞的公告(CVE-2017-13848、CVE-2017-7114、CVE-2017-13858): 1): https://labs.mwrinfosecurity.com/advisories/com-apple-avebridgequerycompletion/ 2): https://labs.mwrinfosecurity.com/advisories/containerextendedinfo-invalid-write/ 3): https://labs.mwrinfosecurity.com/advisories/com-apple-avebridgesubmitdata-kernel-null-pointer-derefence/
-
[ macOS ] 利用 macOS 的事件监控 Demon 服务 emond 实现稳定控制(Persistence): https://posts.specterops.io/leveraging-emond-on-macos-for-persistence-a040a2785124
-
[ Malware ] SamSam 勒索软件席卷多家医院、工控公司: https://www.bleepingcomputer.com/news/security/samsam-ransomware-hits-hospitals-city-councils-ics-firms/
-
[ Malware ] 趋势科技发现用于挖掘加密货币的 Struts 和 DotNetNuke 服务端漏洞利用: https://blog.trendmicro.com/trendlabs-security-intelligence/struts-dotnetnuke-server-exploits-used-cryptocurrency-mining/
-
[ Others ] 反病毒厂商对恶意软件(家族)的命名规范问题: http://struppigel.blogspot.com/2018/01/interpreting-antivirus-detection-names.html
-
[ Others ] Expiring Payloads in the Metasploit Framework: https://www.gironsec.com/blog/2018/01/expiring-payloads-in-the-metasploit-framework/
-
[ Popular Software ] Oracle WebLogic 远程诊断助手rda_tfa_hrs 命令注入远程执行代码漏洞披露(CVE-2018-2616): http://www.zerodayinitiative.com/advisories/ZDI-18-116/
-
[ Popular Software ] Oracle VM VirtualBox VBVA 图形组件被发现了一个越界读写漏洞(CVE-2018-2698),可以被用于实现虚拟机逃逸和 SYSTEM 提权: https://twitter.com/_niklasb/status/953604276726718465/photo/1
-
[ Protocol ] 编写 PyKD 调试脚本,自动化地 Sniffer VMware 的 RPC 请求,来自 ZDI: https://www.zerodayinitiative.com/blog/2018/1/19/automating-vmware-rpc-request-sniffing
-
[ Tools ] 一份关于 OSX 和 iOS 的安全资源集合: https://github.com/kai5263499/osx-security-awesome
-
[ Tools ] CloudFlair - 利用 Censys 的扫描数据发现被 Cloudflare 服务保护的背后的真实主机: https://blog.christophetd.fr/bypassing-cloudflare-using-internet-wide-scan-data/