每日安全动态推送(09-01)

  • A+
所属分类:安全新闻
Tencent Security Xuanwu Lab Daily News


• [Tools] synacktiv/vmx_intrinsics:
https://github.com/synacktiv/vmx_intrinsics

   ・ 用于优化 IDA Hex-Rays 反编译器处理 VMX 指令的插件 – Jett


• [Tools, macOS, iOS] GitHub - ChiChou/IDA-ObjCExplorer:
https://github.com/ChiChou/IDA-ObjCExplorer

   ・ IDA-ObjCExplorer - 用于实现 Objective C classdump 的 IDA Pro 插件 – Jett


• Get Shodan FAVICON Hash · GitHub:
https://gist.github.com/yehgdotnet/b9dfc618108d2f05845c4d8e28c5fc6a

   ・ 通过 Shodan 搜索网站图标 Hash, 用这种方法可以发现 Cloudflare 背后的真实 IP, 视频: https://www.youtube.com/watch?v=JrWlUI8mVJg&feature=youtu.be – Jett


• [Tools] Iblessing - An iOS Security Exploiting Toolkit, It Mainly Includes Application Information Collection, Static Analysis And Dynamic Analysis:
https://www.kitploit.com/2020/08/iblessing-ios-security-exploiting.html

   ・ Iblessing - An iOS Security Exploiting Toolkit – Jett


• QNAP NAS在野漏洞攻击事件:
https://blog.netlab.360.com/in-the-wild-qnap-nas-attacks/

   ・ QNAP NAS 在野漏洞攻击事件分析 – Jett


• [Malware] [SANS ISC] Example of Malicious DLL Injected in PowerShell:
https://blog.rootshell.be/2020/08/28/sans-isc-example-of-malicious-dll-injected-in-powershell/

   ・ [SANS ISC]在PowerShell语言中注入恶意DLL的示例分析。 – lanying37


• [Windows] A Voyage to Uncovering Telemetry: Identifying RPC Telemetry for Detection Engineers — IPC Research 1.0 documentation:
https://ipc-research.readthedocs.io/en/latest/subpages/RPC.html

   ・ Identifying RPC Telemetry for Detection Engineers  – Jett


• [Browser] r4j0x00/exploits:
https://bit.ly/34GwYyg

   ・ 为 v8 FixedArray 85bc1b0cab31cc064efc65e05adb81fee814261b 编写的 Exploit – Jett


• [Malware] The Anatomy of a Malicious Package (Part 2):
https://blog.phylum.io/nodejs-npm-malicious-javascript-package/

   ・ 恶意程序软件包剖析(第2部分) – lanying37


• Malware Development Pt. 1: Dynamic Module Loading in Go:
https://posts.specterops.io/malware-development-pt-1-dynamic-module-loading-in-go-1121f07f3a5a

   ・ 恶意软件开发之 Go 语言中的模块动态加载 – Jett


• 使用 CodeQL 分析闭源 Java 程序:
https://paper.seebug.org/1324/

   ・ 使用 CodeQL 分析闭源 Java 程序 – Jett


• [Tools] gokulsan/awesome-blockchain-security-platforms:
https://github.com/gokulsan/awesome-blockchain-security-platforms

   ・ 区块链相关的工具和技术资料整理 – Jett


• [macOS] Waiting for the redirectiron...:
https://objective-see.com/blog/blog_0x4E.html

   ・ Apple 错误地将 Shlayer 恶意软件标记为 "notarized",导致 Shlayer 成功在最新版 macOS 执行 – Jett


* 查看或搜索历史推送内容请访问:
https://sec.today

* 新浪微博账号:腾讯玄武实验室
https://weibo.com/xuanwulab


发表评论

:?: :razz: :sad: :evil: :!: :smile: :oops: :grin: :eek: :shock: :???: :cool: :lol: :mad: :twisted: :roll: :wink: :idea: :arrow: :neutral: :cry: :mrgreen: