每日安全动态推送

Xuanwu Lab Security Daily News

*[ Attack ]使用 qemu 和 volatility 攻击加密系统:https://diablohorn.com/2017/12/12/attacking-encrypted-systems-with-qemu-and-volatility/

*[ Browser ]Dolphin Browser for Android 不安全的 URI Scheme 解析漏洞披露 (CVE-2017-17553):

https://github.com/VerSprite/research/blob/master/advisories/VS-2017-002.md

*[ Crypto ]19 年前,研究员 Daniel Bleichenbacher 公开了一种利用 PKCS #1 1.5 错误信息实现的自适应 RSA/TLS 攻击方法,成功利用可以解密 RSA 密文。今天另外一位研究员称发现了这种攻击的变种,可以攻击大量 HTTPS 服务器:

https://robotattack.org/;

https://web-in-security.blogspot.de/2017/12/tls-attacker-v22-and-robot-attack.html

*[ Forensics ]SANS 内存取证分析秘籍:

http://forensicmethods.com/sans-memory-forensics

*[ iOS ]基于 ian beer 昨天公开的 iOS 11 Exploit,获取 uid0 ROOT 权限:

https://gist.github.com/iabem97/d11e61afa7a0d0a9f2b5a1e42ee505d8

*[ Malware ]卡巴斯基调查发现窃取VK.Com信息的恶意应用在 Google Play 商店被大量安装:

https://securelist.com/still-stealing/83343/

*[ Malware ]基于P2P网络的网络犯罪调查研究之僵尸网络技术的应用(Paper):https://arxiv.org/pdf/1712.03455.pdf

*[ Malware ]ProcessRefund - 前两天推送了一种新的无文件恶意软件杀软逃逸技术 - Process Doppelgänging,今天研究员在 GitHub 上分享了一个 PoC 代码:https://github.com/Spajed/processrefund

*[ Others ]Hunting ThunderShell C2:

https://bitrot.sh/post/11-12-2017-hunting-thundershell/

*[ Others ]设备电源管理中的安全问题以及 CLKSCREW 攻击,来自 BlackHat Europe 2017 会议:

https://www.blackhat.com/docs/eu-17/materials/eu-17-Tang-Clkscrew-Exposing-The-Perils-Of-Security-Oblivious-Energy-Management.pdf

*[ SecurityAdvisory ]Adobe 发布 12月安全公告:https://helpx.adobe.com/security/products/flash-player/apsb17-42.html

*[ Tools ]QuasarRAT - Windows 远程控制软件:

https://github.com/quasar/QuasarRAT

*[ Tools ]Syntia - 利用蒙特卡洛树搜索技术实现混淆代码的自动化反混淆,自动化合成原始代码语意:

https://www.usenix.org/system/files/conference/usenixsecurity17/sec17-blazytko.pdfhttps://github.com/RUB-SysSec/syntia

*[ Tools ]TFGAN - 用于方便训练和生成 GANs(Generative Adversarial Networks)的轻量级库:

https://research.googleblog.com/2017/12/tfgan-lightweight-library-for.html

*[ Tools ]makin - 用于探测恶意样本反调试技术的工具:

https://github.com/secrary/makin

*[ Tools ]ADRecon - 活动目录信息收集工具:

https://github.com/sense-of-security/ADRecon

*[ Tools ]retdec - Avast 团队开源的用于分析 ELF/PE/Mach-O 的静态分析工具:https://github.com/avast-tl/retdec

*[ Windows ]Windows Credential Manager 是怎么保存密码的:https://github.com/gentilkiwi/mimikatz/wiki/howto-~-credential-manager-saved-credentials

*[ iOS ]研究员 progmboy 公开了昨天推送的 iOS/macOS IOSurfaceRootUserClient Double Free 漏洞的 PoC:

https://github.com/progmboy/kernel_vul_poc/tree/master/machttps://bugs.chromium.org/p/project-zero/issues/detail?id=1417#c

*[ Browser ]Chrome 61 修复的一个 V8 Web Assembly 的类型混淆漏洞(CVE-2017-5116):

https://bugs.chromium.org/p/chromium/issues/detail?id=759624

*[ Others ]TensorFlow自动识别验证码(二):

https://mp.weixin.qq.com/s/sbB-gllD_iAzxPGJEETVuQ

*[ Malware ]新型浏览器挖矿技术可在浏览器窗口关闭的情况下持续挖矿:

http://www.freebuf.com/articles/web/156486.html

*[ Web Security ]机器学习和web安全交叉的一些脑洞:

https://zhuanlan.zhihu.com/p/31963829

*[ Crypto ]Decrypt php VoiceStar encryption extension:

http://blog.th3s3v3n.xyz/2017/12/12/web/Decrypt_php_VoiceStar_encryption_extension/

*[ SecurityReport ]Gartner报告:2018年全球安全支出将达到960亿美元:

http://www.freebuf.com/news/156859.html

*[ MalwareAnalysis ]OSX.Pirrit 恶意广告分析 Part 3:

https://www.cybereason.com/blog/targetingedge-mac-os-x-pirrit-malware-adware-still-active

*[ SecurityAdvisory ]微软发布 12 月份漏洞公告:1)https://portal.msrc.microsoft.com/en-us/security-guidance

2)https://threatpost.com/microsoft-december-patch-tuesday-update-fixes-34-bugs/129154/

3)http://blog.talosintelligence.com/2017/12/ms-tuesday.html

* 按天查看历史推送内容:https://xuanwulab.github.io/cn/secnews/2017/12/13/index.html

* 新浪微博账号: 腾讯玄武实验室(http://weibo.com/xuanwulab)

  • 发表于:
  • 原文链接:http://kuaibao.qq.com/s/20171213B0BR8700?refer=cp_1026

扫码关注云+社区