
腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Backdoor ] 卡巴斯基对使用 DNS 隧道通信的后门的分析报告: https://securelist.com/denis-and-company/83671/
-
[ Browser ] Chrome 64 中修复的漏洞一览: https://chromereleases.googleblog.com/2018/01/stable-channel-update-for-desktop_24.html
-
[ Challenges ] Pwn2Own 2018 比赛的目标和规则公布了,今年新增了企业应用程序(Adobe Reader/MS Office 365/Outlook)和 Windows Insider Preview 版本作为目标: https://www.zerodayinitiative.com/blog/2018/1/25/pwn2own-returns-for-2018-partners-with-microsoft-and-sponsored-by-vmware
-
[ Cloud ] 云安全与 Azure,Azure CSV Injection Vulnerability: https://rhinosecuritylabs.com/azure/cloud-security-risks-part-1-azure-csv-injection-vulnerability/
-
[ Debug ] 使用 native method 调试 Android 第三方 Java 应用程序: https://kov4l3nko.github.io/blog/2018-01-25-debugging-mixed-android-code/
-
[ MalwareAnalysis ] 针对中东政府的 RGDoor IIS 后门分析: https://researchcenter.paloaltonetworks.com/2018/01/unit42-oilrig-uses-rgdoor-iis-backdoor-targets-middle-east/
-
[ MalwareAnalysis ] 针对跨平台后门 CrossRAT 的分析: https://objective-see.com/blog/blog_0x28.html
-
[ Mitigation ] Exploit Mitigation Techniques - Stack Canaries: https://0x00sec.org/t/exploit-mitigation-techniques-stack-canaries/5085
-
-
[ Others ] Abusing GIFs、tags 和 MIME types,在 GIF 图片中内嵌 JS 执行: https://0x00sec.org/t/gif-javascript-polyglots-abusing-gifs-tags-and-mime-types-for-evil/5088
-
[ Pentest ] 滥用 DCOM 技术实现横向渗透: https://www.cybereason.com/blog/new-lateral-movement-techniques-abuse-dcom-technology
-
[ Pentest ] SAP 渗透测试文档: https://www.exploit-db.com/docs/english/43859-hardcore-sap-penetration-testing.pdf
-
[ Popular Software ] GCC 7.3 发布,这个版本新增了用于缓解“幽灵” Spectre CPU 漏洞的编译选项(CVE 2017-5715): https://gcc.gnu.org/ml/gcc/2018-01/msg00197.html
-
[ Tools ] ketshash - 基于 Windows 事件日志检测 Hash 传递攻击的工具: https://github.com/cyberark/ketshash
-
[ Tools ] vss_carver - 提取和修改 Windows 磁盘镜像 VSS catalog 的工具: https://github.com/mnrkbys/vss_carver
-
[ Tools ] 通过 TLS 证书信息动态传递 C&C 命令的工具: https://twitter.com/i/web/status/956588212683550720https://gist.github.com/caseysmithrc/a4c4748160ff9c782d8a86723dbc7334
-
[ Tools ] nullinux - Linux 上的内网渗透测试工具,用于通过 SMB 枚举操作系统信息、域信息、共享目录以及用户: https://github.com/m8r0wn/nullinux
-
[ Tools ] Exploit 编写方面的资料整理: https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/Exploit%20Development.md
-
[ Tools ] Cheatsheets - 渗透测试以及网络安全相关的秘籍收集: https://github.com/rmusser01/Cheatsheets
-
[ Windows ] 用 LogonTracer 工具记录下 Windows 系统未授权的登陆行为: https://github.com/JPCERTCC/LogonTracerhttp://blog.jpcert.or.jp/2018/01/investigate-unauthorised-logon-attempts-using-logontracer.html
-
-
-
-
-
[ SecurityReport ] 2017 年度安全报告——数据泄密: https://cert.360.cn/static/files/2017%E5%B9%B4%E5%BA%A6%E5%AE%89%E5%85%A8%E6%8A%A5%E5%91%8A--%E6%95%B0%E6%8D%AE%E6%B3%84%E5%AF%86.pdf
-
-
-
[ Tools ] Burp Suite Pro Loader&Keygen By surferxyz(附带v1.7.31原版): https://www.52pojie.cn/thread-691448-1-1.html
-