
腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Android ] 在 Android N 中安装 root CA 实现用 Burp 抓取 https 流量的方法: https://blog.nviso.be/2018/01/31/using-a-custom-root-ca-with-burp-for-inspecting-android-n-traffic/
-
[ APT ] Lotus Blossom 团伙对东南亚国家联盟的攻击的分析: https://community.rsa.com/community/products/netwitness/blog/2018/01/30/apt32-continues-asean-targeting
-
[ Debug ] AFL Fuzzer 的编译时插桩过程分析: https://tunnelshade.in/blog/2018/01/afl-internals-compile-time-instrumentation/
-
[ Linux ] UEFI 被认为是运行在 Ring -2 层的底层操作系统,该系统几乎和 Linux 内核的体量一样,在其中藏 Exploits 非常隐蔽。为了降低这种风险,Google 开发了一个精简版固件 NERF,用精简版 Linux 内核和 initramfs 替换 UEFI: https://schd.ws/hosted_files/osseu17/84/Replace%20UEFI%20with%20Linux.pdf
-
[ MalwareAnalysis ] Comnie 恶意软件家族继续瞄准东亚的组织: https://researchcenter.paloaltonetworks.com/2018/01/unit42-comnie-continues-target-organizations-east-asia/
-
[ MalwareAnalysis ] 通过恶意网页中的 JavaScript 代码窃取计算机内存中的敏感信息(Paper): https://eprint.iacr.org/2018/119.pdf
-
[ MalwareAnalysis ] 针对成人类网站与应用的用户发起的网络威胁分析,来自 Kaspersky: https://www.kaspersky.com/blog/porn-themed-threats-report/20891/
-
[ Others ] 用 ABI Filters 和 APK split 精简 APK 包的大小: https://proandroiddev.com/reducing-apk-size-by-using-abi-filters-and-apk-split-74a68a885f4e
-
[ Pentest ] 渗透测试时,Windows 本地提权该从哪些点上找方法: http://www.sploitspren.com/2018-01-26-Windows-Privilege-Escalation-Guide/
-
[ Popular Software ] ManageEngine 中被发现多个安全漏洞: https://threatpost.com/multiple-critical-flaws-found-in-zohos-manageengine/129709/
-
[ Popular Software ] Kaseya 的虚拟系统管理员(VSA)Agent 被攻击者用于渗透用户,部署门罗币挖矿工具: https://www.esentire.com/news-and-events/security-advisories/kaseya-virtual-system-administrator/ https://medium.com/huntresslabs/deep-dive-kaseya-vsa-mining-payload-c0ac839a0e88
-
[ Tools ] prospector - 类似 Pylint 的 Python 代码分析工具: https://github.com/landscapeio/prospector
-
[ Tools ] 在 Win10 上内存执行最新版 mimikatz: https://astr0baby.wordpress.com/2018/01/30/running-latest-x64-mimikatz-on-windows-10/
-
[ Tools ] AutoSploit - 从 Shodan.io 收集信息并自动化地大规模攻击远程主机的工具: https://github.com/NullArray/AutoSploit
-
-
[ Tools ] DROP-IDA-plugin - 利用符号执行引擎 angr 检测不透明谓词(Opaque Predicate)的 IDA Pro 插件: https://github.com/Riscure/DROP-IDA-pluginhttp://www.arocmag.com/article/01-2017-08-042.html
-
[ Tools ] phpbash - 模拟 PHP 半交互式终端的 webshell: https://github.com/Arrexel/phpbash
-
[ Web Security ] 结合 Flash 和 307 跳转实现对 JSON 端的 CSRF 漏洞利用: https://blog.appsecco.com/exploiting-csrf-on-json-endpoints-with-flash-and-redirects-681d4ad6b31b
-
[ Windows ] Windows 10 RS3 EMET(WDEG)的 Attack Surface Reduction (ASR) 防护特性的优缺点分析: https://posts.specterops.io/the-emet-attack-surface-reduction-replacement-in-windows-10-rs3-the-good-the-bad-and-the-ugly-34d5a253f3df