Xuanwu Lab Security Daily News
*[ Attack ]使用 qemu 和 volatility 攻击加密系统:https://diablohorn.com/2017/12/12/attacking-encrypted-systems-with-qemu-and-volatility/
*[ Browser ]Dolphin Browser for Android 不安全的 URI Scheme 解析漏洞披露 (CVE-2017-17553):
https://github.com/VerSprite/research/blob/master/advisories/VS-2017-002.md
*[ Crypto ]19 年前,研究员 Daniel Bleichenbacher 公开了一种利用 PKCS #1 1.5 错误信息实现的自适应 RSA/TLS 攻击方法,成功利用可以解密 RSA 密文。今天另外一位研究员称发现了这种攻击的变种,可以攻击大量 HTTPS 服务器:
https://robotattack.org/;
https://web-in-security.blogspot.de/2017/12/tls-attacker-v22-and-robot-attack.html
*[ Forensics ]SANS 内存取证分析秘籍:
http://forensicmethods.com/sans-memory-forensics
*[ iOS ]基于 ian beer 昨天公开的 iOS 11 Exploit,获取 uid0 ROOT 权限:
https://gist.github.com/iabem97/d11e61afa7a0d0a9f2b5a1e42ee505d8
*[ Malware ]卡巴斯基调查发现窃取VK.Com信息的恶意应用在 Google Play 商店被大量安装:
https://securelist.com/still-stealing/83343/
*[ Malware ]基于P2P网络的网络犯罪调查研究之僵尸网络技术的应用(Paper):https://arxiv.org/pdf/1712.03455.pdf
*[ Malware ]ProcessRefund - 前两天推送了一种新的无文件恶意软件杀软逃逸技术 - Process Doppelgänging,今天研究员在 GitHub 上分享了一个 PoC 代码:https://github.com/Spajed/processrefund
*[ Others ]Hunting ThunderShell C2:
https://bitrot.sh/post/11-12-2017-hunting-thundershell/
*[ Others ]设备电源管理中的安全问题以及 CLKSCREW 攻击,来自 BlackHat Europe 2017 会议:
https://www.blackhat.com/docs/eu-17/materials/eu-17-Tang-Clkscrew-Exposing-The-Perils-Of-Security-Oblivious-Energy-Management.pdf
*[ SecurityAdvisory ]Adobe 发布 12月安全公告:https://helpx.adobe.com/security/products/flash-player/apsb17-42.html
*[ Tools ]QuasarRAT - Windows 远程控制软件:
https://github.com/quasar/QuasarRAT
*[ Tools ]Syntia - 利用蒙特卡洛树搜索技术实现混淆代码的自动化反混淆,自动化合成原始代码语意:
https://www.usenix.org/system/files/conference/usenixsecurity17/sec17-blazytko.pdfhttps://github.com/RUB-SysSec/syntia
*[ Tools ]TFGAN - 用于方便训练和生成 GANs(Generative Adversarial Networks)的轻量级库:
https://research.googleblog.com/2017/12/tfgan-lightweight-library-for.html
*[ Tools ]makin - 用于探测恶意样本反调试技术的工具:
https://github.com/secrary/makin
*[ Tools ]ADRecon - 活动目录信息收集工具:
https://github.com/sense-of-security/ADRecon
*[ Tools ]retdec - Avast 团队开源的用于分析 ELF/PE/Mach-O 的静态分析工具:https://github.com/avast-tl/retdec
*[ Windows ]Windows Credential Manager 是怎么保存密码的:https://github.com/gentilkiwi/mimikatz/wiki/howto-~-credential-manager-saved-credentials
*[ iOS ]研究员 progmboy 公开了昨天推送的 iOS/macOS IOSurfaceRootUserClient Double Free 漏洞的 PoC:
https://github.com/progmboy/kernel_vul_poc/tree/master/machttps://bugs.chromium.org/p/project-zero/issues/detail?id=1417#c
*[ Browser ]Chrome 61 修复的一个 V8 Web Assembly 的类型混淆漏洞(CVE-2017-5116):
https://bugs.chromium.org/p/chromium/issues/detail?id=759624
*[ Others ]TensorFlow自动识别验证码(二):
https://mp.weixin.qq.com/s/sbB-gllD_iAzxPGJEETVuQ
*[ Malware ]新型浏览器挖矿技术可在浏览器窗口关闭的情况下持续挖矿:
http://www.freebuf.com/articles/web/156486.html
*[ Web Security ]机器学习和web安全交叉的一些脑洞:
https://zhuanlan.zhihu.com/p/31963829
*[ Crypto ]Decrypt php VoiceStar encryption extension:
http://blog.th3s3v3n.xyz/2017/12/12/web/Decrypt_php_VoiceStar_encryption_extension/
*[ SecurityReport ]Gartner报告:2018年全球安全支出将达到960亿美元:
http://www.freebuf.com/news/156859.html
*[ MalwareAnalysis ]OSX.Pirrit 恶意广告分析 Part 3:
https://www.cybereason.com/blog/targetingedge-mac-os-x-pirrit-malware-adware-still-active
*[ SecurityAdvisory ]微软发布 12 月份漏洞公告:1)https://portal.msrc.microsoft.com/en-us/security-guidance
2)https://threatpost.com/microsoft-december-patch-tuesday-update-fixes-34-bugs/129154/
3)http://blog.talosintelligence.com/2017/12/ms-tuesday.html
* 按天查看历史推送内容:https://xuanwulab.github.io/cn/secnews/2017/12/13/index.html
* 新浪微博账号: 腾讯玄武实验室(http://weibo.com/xuanwulab)
领取专属 10元无门槛券
私享最新 技术干货