每日安全动态推送(07-10)
Xuanwu Lab Security Daily News
* [ Browser ] Safari-iOS10.3.2-macOS-10.12.4-exploit-Bugs,利用以下几个漏洞穿越 Safari 的沙箱(TOCTOU in diskarbitrationd/PID reuse logic bug in authd/Arbitrary dylib loading in speechsynthesisd/NULL ptr dereference in nsurlstoraged):https://github.com/maximehip/Safari-iOS10.3.2-macOS-10.12.4-exploit-Bugs
* [ Browser ] Windows 10 Insider Preview Build 16237 版本中的 IE 11 已经默认禁用了 VBScript: https://blogs.windows.com/msedgedev/2017/07/07/update-disabling-vbscript-internet-explorer-11/
* [ Browser ] Firefox 54.0.1 - 拒绝服务漏洞POC: https://www.exploit-db.com/exploits/42302/
* [ MalwareAnalysis ] 原 Petya 勒索软件的解密密钥发布,已有安全研究员据此写出了解密工具: https://threatpost.com/decryption-key-to-original-petya-ransomware-released/126705/
* [ Others ] MSRC-Security-Research - 微软 MSRC 团队近几年演讲资料的汇总:https://github.com/Microsoft/MSRC-Security-Research
* [ Pentest ] 利用 CreateRestrictedToken API Bypass AppLocker:https://pentestlab.blog/2017/07/07/applocker-bypass-createrestrictedtoken/
* [ Pentest ] Cisco Talos 团队对利用 Word 模板注入攻击基础设施的分析:http://blog.talosintelligence.com/2017/07/template-injection.html
* [ Tools ] SwishDbgExt - WinDbg 的事件响应和数字取证调试扩展:https://github.com/comaeio/SwishDbgExt
* [ Tools ] LuaQEMU - 基于 QEMU,将 QEMU 的内部 API 暴露给 LuaJIT 使用:https://github.com/comsecuris/luaqemu
* [ Tools ] libFuzzer-gv - 更快的 libFuzzer:https://guidovranken.wordpress.com/2017/07/08/libfuzzer-gv-new-techniques-for-dramatically-faster-fuzzing/
* [ Tools ] xray - 从公共网络中侦听,映射与 OSINT 情报收集的工具:https://github.com/evilsocket/xray
* [ Tools ] CANAPE.Core - 跨平台的网络协议测试库,来自 James Forshaw:https://github.com/tyranid/CANAPE.Core
* [ Tools ] API-Security-Checklist - 开发者的 API 安全检测清单:https://github.com/shieldfy/API-Security-Checklist
* [ Tools ] salt-scanner - 基于 Salt Open 和 Vulners audit API 的 Linux 漏洞扫描器: Zhttps://github.com/0x4D31/salt-scanner
* [ Vulnerability ] Poppler PDF 存在多个 RCE 漏洞,成功利用可以完全控制用户计算机:http://blog.talosintelligence.com/2017/07/vulnerability-spotlight-talos-2017.html?utm_source=dlvr.it&utm;_medium=twitter&utm;_campaign=Feed%3A+feedburner%2FTalos+%28Talos+Blog%29
* [ Vulnerability ] GPU 中的溢出漏洞研究 Paper:https://www.aimlab.org/haochen/papers/npc16-overflow.pdf
* [ Windows ] windows_kernel_address_leaks - 从用户态泄露 Windows 内核地址的方法汇总: https://github.com/sam-b/windows_kernel_address_leaks
* [ Android ] 阿里手淘团队公开的一本电子书《深入理解Android热修复技术原理》:https://m.aliyun.com/yunqi/articles/115122
* [ Vulnerability ] Apache Structs2 S2-048 漏洞动态分析: http://xxlegend.com/2017/07/08/S2-048%20%E5%8A%A8%E6%80%81%E5%88%86%E6%9E%90/
* [ Android ] Android 7 月份修复漏洞 CVE-2017-8260/0705/8259 的 PoC:https://github.com/ScottyBauer/Android_Kernel_CVE_POCs/commit/0b4721f4c9061f2de2222bff50f6f719864b6a10
* [ Windows ] 利用MS17-010补丁对比发现的九个漏洞:http://www.freebuf.com/articles/system/139481.html
* 搜索历史推送,请用 Google 以 site 关键词限定搜索,如: site:xuanwulab.github.io android fuzz
* 按天查看历史推送内容: https://xuanwulab.github.io/cn/secnews/2017/07/10/index.html
* 新浪微博账号: 腾讯玄武实验室(http://weibo.com/xuanwulab)
如若侵权,请联系本站删除