每日安全动态推送(08-27)

  • A+
所属分类:安全新闻
Tencent Security Xuanwu Lab Daily News


• [Web] Content-Type that can be used for XSS:
https://bit.ly/2Ek4wYq

   ・ XSS研究 – Schwarrzz


• [Report] Threat Landscape Trends – Q2 2020:
http://bit.ly/TLT-Q2-2020

   ・ 赛门铁克发布2020年第二季度安全威胁报告 – Schwarrzz


• Increasing Enterprise Visibility: Integrated Defense with Mitre ATT&CK:
https://pentestmag.com/increasing-enterprise-visibility-integrated-defense-with-mitre-attck/

   ・ 提高企业可视性:Mitre ATT&CK的集成防御部署。 – lanying37


• Malicious Apps Could Take Over Samsung Devices | Char49:
https://char49.com/articles/malicious-apps-could-take-over-samsung-devices

   ・ 三星设备的FMM(查找我的设备)功能可能导致手机被恶意应用程序接管 – Schwarrzz


• Avoiding detection via DHCP options:
https://sensepost.com/blog/2020/avoiding-detection-via-dhcp-options/

   ・ 避免通过DHCP选项进行渗透检测。 – lanying37


• Getting MD5 with certain character pattern:
https://stackoverflow.com/questions/21636042/getting-md5-with-certain-character-pattern

   ・ 使用特定字符模式获取MD5研究。 – lanying37


• CVE-2020-10611: Achieving Code Execution on the Triangle MicroWorks SCADA Data Gateway:
https://www.thezdi.com/blog/2020/8/24/cve-2020-10611-achieving-code-execution-on-the-triangle-microworks-scada-data-gateway

   ・ Pwn2Own 迈阿密比赛中 Triangle MicroWorks SCADA Data Gateway 工控漏洞及利用的细节分析 – Jett


• [Linux] Linux Privilege Escalation : Restricted Shell:
https://bit.ly/2PGBci5

   ・ Linux权限提升演示视频:受限制的Shell。 – lanying37


• Transparent Tribe: Evolution analysis,part 2:
https://securelist.com/transparent-tribe-part-2/98233/

   ・ 针对透明部落APT报告:进化分析,第2部分。 – lanying37


• [iOS, macOS] Stealing local files using Safari Web Share API:
https://blog.redteam.pl/2020/08/stealing-local-files-using-safari-web.html

   ・ 使用Web Share API从macOS / iOS中窃取文件 – Schwarrzz


• [Linux] LPC 2020 - Kernel Dependability & Assurance MC:
https://www.youtube.com/watch?v=4c01jjbQmBc&feature=youtu.be&t=8555

   ・ LPC 2020 在线会议- Kernel Dependability & Assurance MC。 – lanying37


• [Tools] dnSpy v6.1.7 releases: .NET assembly editor, decompiler, and debugger:
https://securityonline.info/dnspy-net-assembly-editor-decompiler-debugger/

   ・ dnSpy v6.1.7发行版:.NET程序集编辑器,逆向调试工具。 – lanying37


• [Malware, Report, Attack] Threat Intelligence Report: Lazarus Group Campaign Targeting the Cryptocurrency Vertical:
https://labs.f-secure.com/publications/ti-report-lazarus-group-cryptocurrency-vertical/

   ・ F-Secure发布Lazarus Group在加密货币方向的分析报告 – Schwarrzz


• Exploiting Intel’s Management Engine – Part 3: USB hijacking (INTEL-SA-00086) | KaKaRoTo's Blog:
https://kakaroto.ca/2020/08/exploiting-intels-management-engine-part-3-usb-hijacking-intel-sa-00086/

   ・ Exploiting Intel ME - USB 劫持 – Jett


• Lifting the veil on DeathStalker, a mercenary triumvirate:
https://securelist.com/deathstalker-mercenary-triumvirate/98177/

   ・ 卡巴斯基对 DeathStalker 恶意样本的分析 – Jett


• maltrail v0.23.9 releases: Malicious traffic detection system:
https://securityonline.info/maltrail-malicious-traffic-detection-system/

   ・ 开源恶意流量检测系统Maltrail更新 – Schwarrzz


• WebSphere 远程命令执行漏洞(CVE-2020-4450)分析:
https://paper.seebug.org/1315/

   ・ WebSphere 远程命令执行漏洞(CVE-2020-4450)分析。  – lanying37


• [Pentest] Pentesters Guide to Oracle Hacking:
https://medium.com/@netscylla/pentesters-guide-to-oracle-hacking-1dcf7068d573

   ・ Oracle渗透测试者指南。 – lanying37


• [Malware] Top exploits used by ransomware gangs are VPN bugs, but RDP still reigns supreme | ZDNet:
https://www.zdnet.com/article/top-exploits-used-by-ransomware-gangs-are-vpn-bugs-but-rdp-still-reigns-supreme/

   ・ RDP漏洞仍然占据勒索软件的主导地位 – Schwarrzz


• [iOS] Part 2: Step-by-step iPhone Setup for iOS Research (via @bizzybarney):
https://www.mac4n6.com/blog/2020/8/23/step-by-step-iphone-setup-for-ios-research-via-bizzybarney

   ・ 第2部分:针对iOS平台研究的分步iPhone设置。 – lanying37


• [Malware] [PDF] https://mcafee.ly/32oVBwZ:
https://mcafee.ly/32oVBwZ

   ・ Mcafee发布关于COVID-19相关的专项威胁分析报告 – Schwarrzz


• 代码审计从0到1 —— Centreon One-click To RCE:
https://paper.seebug.org/1313/

   ・ 代码审计从0到1 —— Centreon One-click To RCE  – Jett


• [Browser] Vulnerability Spotlight: Use-after-free vulnerability in Google Chrome WebGL could lead to code execution:
http://feedproxy.google.com/~r/feedburner/Talos/~3/gRPXTTT07es/vuln-spotlight-chrome-use-free-aug-2020.html

   ・ Google Chrome WebGL UAF 漏洞 (CVE-2020-8620)的分析 – Jett


• A Tale of Escaping a Hardened Docker container - Red Timmy Security:
https://packetstormsecurity.com/news/view/31515

   ・ A Tale of Escaping a Hardened Docker container – Jett


• [Tools] Ettercap and middle-attacks tutorial:
https://pentestmag.com/ettercap-tutorial-for-windows/

   ・ Ettercap与攻击技术研究教程。 – lanying37


* 查看或搜索历史推送内容请访问:
https://sec.today

* 新浪微博账号:腾讯玄武实验室
https://weibo.com/xuanwulab


发表评论

:?: :razz: :sad: :evil: :!: :smile: :oops: :grin: :eek: :shock: :???: :cool: :lol: :mad: :twisted: :roll: :wink: :idea: :arrow: :neutral: :cry: :mrgreen: