腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Browser ] Google Chrome V8 - Object Allocation Size Integer Overflow POC (CVE-2018-6065): https://www.exploit-db.com/exploits/44584/
-
[ Browser ] V8 JS 引擎 v6.7 发布: https://v8project.blogspot.com/2018/05/v8-release-v67.html
-
[ Crypto ] 如何构建自己的便携式 Lightning node : https://hackernoon.com/how-to-build-your-own-portable-plug-in-lightning-node-c4093a4b10fb
-
[ iOS ] iOS 上的渐进式 Web 应用(PWA)的介绍: https://medium.com/@firt/progressive-web-apps-on-ios-are-here-d00430dee3a7
-
[ IoTDevice ] D-Link DIR-601 A1 1.02NA 设备密码更改时不需要旧密码并且以明文形式传输(CVE-2018-10641): http://seclists.org/fulldisclosure/2018/May/17
-
[ MalwareAnalysis ] NPM 官方对恶意模块 getcookies 的分析与处理: https://blog.npmjs.org/post/173526807575/reported-malicious-module-getcookies
-
[ MalwareAnalysis ] 推广成人约会网站的 Twitter 机器人账户分析: https://labsblog.f-secure.com/2018/05/04/pr0nbots2-revenge-of-the-pr0nbots/https://threatpost.com/pr0nbot-is-back-and-evading-twitter-censors/131720/
-
[ OpenSourceProject ] Secure Pods - Sandboxing workloads in Kubernetes,来自 KubeCon EU 2018: https://docs.google.com/presentation/d/1jDzuZbV3UWmRHvkekYWoL26f1Nis_MSqa9UUCb_kJ8I/edit#slide=id.g368510ee22_0_74
-
[ Others ] How to write ARM shellcode in six minutes ,使用 ARM 汇编编写反向 Shell 并转换成相应的 Yara 规则: https://twitter.com/Fox0x01/status/992414684883095553
-
[ Others ] 非接触支付中的中继攻击与基于距离的攻击的新观点(Paper): https://eprint.iacr.org/2018/402.pdf
-
[ Others ] Alex 整理公开了自己过去 12 个月的议题材料,Part 1: https://twitter.com/i/web/status/992416475431358464 Part 2: https://twitter.com/aionescu/status/992416476245123072
-
[ Pentest ] 使用 SYSTEM 权限下的 RDP 劫持监视管理员操作的方法: https://gist.github.com/bohops/f722f1a54d9ac1070350bdcaf2da618b
-
[ Tools ] Google 开源了一个用于为容器环境(Docker)运行提供沙箱环境的工具 - gVisor,为不可信容器和主机之间提供了安全隔离的能力: https://cloudplatform.googleblog.com/2018/05/Open-sourcing-gVisor-a-sandboxed-container-runtime.html
-
[ Tools ] DanderSpritz: How the Equation Group's 2013 tools pwn in 2018,方程式组织泄露的 DanderSpritz 后渗透框架中的内置工具,方法和功能介绍: https://speakerdeck.com/francisck/thotcon-9-danderspritz-how-the-equation-groups-2013-tools-pwn-in-2018
-
[ Tools ] watchdog - 一款全面的安全扫描和漏洞管理工具: https://github.com/flipkart-incubator/watchdog
-
[ Tools ] awesome-vmp - 虚拟机分析相关资料收集: https://github.com/lmy375/awesome-vmp
-
[ Tools ] reflective-unloader - 将 ReflectiveDLLInjection 注入的 DLL 还原的工具: https://github.com/zeroSteiner/reflective-unloader
-
[ Tools ] kurukshetra - 学习安全编码的 Web 框架: https://github.com/a0xnirudh/kurukshetra
-
[ Tools ] WSSAT - 一款 Web 服务安全评估工具: https://github.com/YalcinYolalan/WSSAT
-
[ Vulnerability ] quasselcore 堆内存破坏导致的远程代码执行漏洞(CVE-2018-1000178)以及空指针引用导致的拒绝服务漏洞(CVE-2018-1000179)披露: http://www.openwall.com/lists/oss-security/2018/05/01/1
-
[ Windows ] Windows WMI - Recieve Notification Exploit (Metasploit)(CVE-2016-0040): https://www.exploit-db.com/exploits/44586
-
[ WirelessSecurity ] 嵌入式平台上的开源 SDR 介绍: https://www.researchgate.net/publication/304346578_Open-Source_SDR_on_Embedded_Platforms