* [ Android ] Android HIV:重新打包惡意軟體以逃避機器學習檢測的研究(paper):https://arxiv.org/pdf/1808.04218.pdf
* [ Blockchain ] 區塊鏈剖析:分析以太坊智能合約之死,來自 Blackhat USA 2018:
https://i.blackhat.com/us-18/Wed-August-8/us-18-Little-Blockchain-Autopsies-Analyzing-Ethereum-Smart-Contract-Deaths.pdf
* [ Browser ] Microsoft Edge: JIT InlineArrayPush Opcode 的類型混淆:https://bugs.chromium.org/p/project-zero/issues/detail?id=1578
* [ Browser ] Microsoft Edge: DictionaryPropertyDescriptor::CopyFrom 沒有拷貝所有欄位(CVE-2018-8291):
https://bugs.chromium.org/p/project-zero/issues/detail?id=1576
* [ Browser ] Microsoft Edge: InitializeNumberFormat 和 InitializeDateTimeFormat 中的 Bug(CVE-2018-8298):
https://bugs.chromium.org/p/project-zero/issues/detail?id=1582
* [ Browser ] Structured Threat Information Expression (STIX) 2.0發布,STIX是一種用於交換網絡威脅情報(CTI)的語言和序列化格式:
https://docs.oasis-open.org/cti/stix/v2.0/stix-v2.0-part5-stix-patterning.html
* [ Browser ] JavaScript 引擎基礎:優化 prototypes:https://mathiasbynens.be/notes/prototypes
* [ Browser ] Chrome 導致的詭異系統卡死分析:https://randomascii.wordpress.com/2018/08/16/24-core-cpu-and-i-cant-type-an-email-part-one/
* [ Browser ] 將 PWAs 做為 Chrome 擴展程序發布:
https://dev.to/samthor/shipping-pwas-as-chrome-extensions-3l5c
* [ Browser ] Edge InlineArrayPush OpCode 遠程代碼執行 :https://blogs.projectmoon.pw/2018/08/17/Edge-InlineArrayPush-Remote-Code-Execution/
* [ Detect ] Sigma 規則指南:將 Sigma 集成到 ArcSight ESM、Command Center 和 Logger 中進行威脅狩獵:
https://community.softwaregrp.com/t5/ArcSight-User-Discussions/Sigma-rules-guide-threat-hunting-for-ESM-ArcSight-Command-Center/td-p/1662079
* [ Firmware ] 使用電壓的 glitch 攻擊,提取汽車 ECU 的固件,來自 Blackhat USA 2018:
https://i.blackhat.com/us-18/Wed-August-8/us-18-Milburn-There-Will-Be-Glitches-Extracting-And-Analyzing-Automotive-Firmware-Efficiently.pdf
* [ Industry News ] PHP Phar:// 偽協議反序列漏洞威脅眾多 CMS 安全:
https://threatpost.com/severe-php-exploit-threatens-wordpress-sites-with-remote-code-execution/136649/
* [ Language ] JSON 反序列化利用研究示例腳本:
https://gist.github.com/topolik/a6841296b2d0cb70e1cf940916a203ba#file-json-deserialization-ldap-sh-L5
* [ Linux ] Linux 緩衝區溢出 x86 Part 2 - 覆蓋和操作返回地址:
https://scriptdotsh.com/index.php/2018/08/18/linux-buffer-overflows-x86-part-2-overwriting-and-manipulating-the-return-address/
* [ macOS ] 現代 MacOS 安全,來自 BSidesMCR 2018 (Youtube):https://www.youtube.com/watch?v=nyey11vf2Jo
* [ Malware ] TRICKBOT 添加從受感染客戶端向域控制器傳播的功能:
https://www.malware-traffic-analysis.net/2018/08/17/index.html
* [ MalwareAnalysis ] QakBot 銀行木馬的深度分析報告:
https://twitter.com/i/web/status/1029106590232784896
* [ MalwareAnalysis ] HDRoot MBR Bootkit 惡意軟體分析:
http://williamshowalter.com/a-universal-windows-bootkit/
* [ Mobile ] 使用動態應用程式沙盒緩解行動裝置上的位置隱私洩露攻擊(paper):
https://arxiv.org/pdf/1808.04490.pdf
* [ Others ] HackerOne 平臺漏洞挖掘經驗分享 - 確定優先級並選擇要關注的程序: https://regala.im/2018/08/18/choosing-programs/
* [ Others ] 內核代碼段只讀區域 KTRR 介紹,講解蘋果A10及以上的晶片中內核代碼段只讀區域的實現原理和分析: https://siguza.github.io/KTRR/
* [ Pentest ] 使用 WSHController / WSHRemote 對象進行橫向滲透: http://www.hexacorn.com/blog/2018/08/18/lateral-movement-using-wshcontroller-wshremote-objects-iwshcontroller-and-iwshremote-interfaces/
* [ Popular Software ] XIGNCODE3 的 xhunter1.sys 驅動缺陷, 從洩漏內核模式進程句柄到提權:
https://x86.re/blog/xigncode3-xhunter1.sys-lpe/
* [ Popular Software ] 在Microsoft.Workflow.Compiler.exe中執行任中執行任意未籤名代碼:
https://posts.specterops.io/arbitrary-unsigned-code-execution-vector-in-microsoft-workflow-compiler-exe-3d9294bc5efb
* [ ReverseEngineering ] 硬體逆向和固件提取基礎系列:
1)https://barbieauglend.github.io/2018-07-23-hardware_101/
2) https://barbieauglend.github.io/2018-08-03-firmware_101/
* [ ReverseEngineering ] 用 IDAPython 解密 Gootkit 中的字符串:http://johnpeng47.com/2018/08/14/decrypting-strings-in-the-gootkit-with-idapython/
* [ Tools ] GitMiner - 用於 Github 的高級敏感內容挖掘工具:
https://github.com/UnkL4b/GitMiner
* [ Tools ] massh-enum - OpenSSH 2.3-7.4 版本用戶名枚舉工具:
https://github.com/trimstray/massh-enum
* [ Tools ] hvpp - 一個用 C++ 編寫的輕量級 Intel x64/VT-x 管理程序,用於在已運行系統中的虛擬化:
https://github.com/wbenny/hvpp
* [ Tools ] DbgShell - Windows 調試引擎的 PowerShell 前端:
https://github.com/Microsoft/DbgShell
* [ Tools ] NccGroup 發布 DNS 重綁定攻擊框架 - Singularity :
https://www.nccgroup.trust/us/about-us/newsroom-and-events/blog/2018/august/singularity-of-origin-a-dns-rebinding-attack-framework/
* [ Tools ] Binary Ninja 開始支持 python :
https://insinuator.net/2018/08/ipython-support-for-binary-ninja/
* [ Tools ] DetoursNT - 使 Microsoft Detours 只依賴沒有任何修改的 NTDLL.DLL 原始代碼:https://github.com/wbenny/DetoursNT
* [ Vulnerability ] Easylogin Pro的 Encryptor.php 模塊存在模塊存在反序列化漏洞,可導致遠程代碼執行:
https://srcincite.io/pocs/e.php.txt
* [ Vulnerability ] ADM 3.1.2RHG1 遠程代碼執行漏洞 EXP (CVE-2018-11510)
:https://www.exploit-db.com/exploits/45212/
* [ Vulnerability ] SOLEO IP Relay - 本地文件洩露漏洞披露:https://insecurity.sh/assets/reports/soleo.pdf
* [ WirelessSecurity ] 位於同一終端的惡意應用對由正常應用認證的 BLE 設備的攻擊(paper):
https://arxiv.org/pdf/1808.03778.pdf
* [ Blockchain ] 一種針對類 Fomo3D 遊戲空投的高級攻擊技術剖析:
https://paper.seebug.org/672/
* [ Blockchain ] 一種利用 etherscan.io 缺陷的智能合約蜜罐:
https://paper.seebug.org/671/
* [ Blockchain ] 以太坊合約審計 CheckList 之「以太坊智能合約規範問題」影響分析報告:
https://paper.seebug.org/663/
* [ APT ] 利用CVE-2018-8373 0day漏洞的攻擊與Darkhotel團夥相關的分析:
https://ti.360.net/blog/articles/analyzing-attack-of-cve-2018-8373-and-darkhotel/
* [ WirelessSecurity ] 使用 SDR(軟體定義無線電)黑無線設備:
https://www.youtube.com/watch?v=ZuNOD3XWp4A
* [ WirelessSecurity ] 針對軟體定義網絡(SDN)的滲透測試框架 - DELTA 發布,來自 BlackHat USA 2018:
https://i.blackhat.com/us-18/Thu-August-9/us-18-Lee-The-Finest-Penetration-Testing-Framework-for-Software-Defined-Networks.pdf
* [ Others ] 全球人口不足一部劇點擊量,刷量黑色產業鏈了解一下:
http://www.freebuf.com/articles/network/181017.html