首页
社区
课程
招聘
[分享]国外最新安全推文整理(第0xff期)
发表于: 2018-9-8 10:03 8070

[分享]国外最新安全推文整理(第0xff期)

2018-9-8 10:03
8070

Read, write, and execute kernel-mode code from the command prompt(对 ring0 读写执行的工具)

https://github.com/ionescu007/r0ak


Kernel memory taint tracking to detect disclosure of uninitialized memory(内核信息泄露检测)

https://github.com/google/bochspwn-reloaded


TrueType and OpenType font fuzzing toolset(字体 fuzzing)

https://github.com/google/BrokenType


Monitoring and instrumenting API calls on Windows(hook 库更新,支持 ARM64)

https://github.com/Microsoft/Detours


HyperPlatform is an Intel VT-x based hypervisor(基于 Intel VT-x 的 hypervisor)

https://github.com/tandasat/HyperPlatform


Hardware backdoors in some x86 CPUs(硬件后门)

https://github.com/xoreaxeaxeax/rosenbridge


Resources related to Industrial Control System (ICS) security(工控安全)

https://github.com/hslatman/awesome-industrial-control-system-security


Original and decompiled files of TRISIS/TRITON/HATMAN malware(工控恶意样本)

https://github.com/ICSrepo/TRISIS-TRITON-HATMAN


HITB GSEC 2018 Slides

https://gsec.hitb.org/materials/sg2018/


Linux Security Summit North America 2018 Slides

https://events.linuxfoundation.org/events/linux-security-summit-north-america-2018/program/slides/


From Compiler Optimization to Code Execution - VirtualBox VM Escape(VBox CVE-2018-2844 漏洞)

https://www.voidsecurity.in/2018/08/from-compiler-optimization-to-code.html


Hyper-V HyperClear Mitigation for L1 Terminal Fault(L1TF 漏洞防护措施)

https://blogs.technet.microsoft.com/virtualization/2018/08/14/hyper-v-hyperclear/


Hypervisor From Scratch – Part 1: Basic Concepts & Configure Testing Environment(基于硬件的虚拟化)

https://rayanfam.com/topics/hypervisor-from-scratch-part-1/


Floating-Poison Math in Chakra(Chakra CVE-2018-0953 漏洞)

https://www.zerodayinitiative.com/blog/2018/8/22/floating-poison-math-in-chakra


The Problems and Promise of WebAssembly(WebAssembly 的特性及攻击面)

https://googleprojectzero.blogspot.com/2018/08/the-problems-and-promise-of-webassembly.html


A Modern History of Offensive Security Research, Slides(漏洞利用技术的发展)

https://docs.google.com/presentation/d/19HfkIojyLE8L8X8aZT-lJont96JqIg4PqEhb2juIK2c/


Block Oriented Programming: Automating Data-Only Attacks(CFI 保护绕过)

http://nebelwelt.net/publications/files/18CCS.pdf


Find which process is using the microphone, from a kernel-mode driver(查找使用麦克风的进程)

https://gracefulbits.com/2018/08/13/find-which-process-is-using-the-microphone-from-a-kernel-mode-driver/


The 35th International Conference on Machine Learning, papers(ICML 2018 的论文)

https://icml.cc/Conferences/2018/Schedule?type=Poster


Active Directory Security Presentations(有关 Active Directory 的资料)

https://adsecurity.org/?page_id=1352


Bokbot: The (re)birth of a banker(Bokbot 溯源)

https://blog.fox-it.com/2018/08/09/bokbot-the-rebirth-of-a-banker/


Analysis of an unusual Turla backdoor(Turla Outlook 后门分析)

https://www.welivesecurity.com/wp-content/uploads/2018/08/Eset-Turla-Outlook-Backdoor.pdf


BIOS Boots What? Finding Evil in Boot Code at Scale(Bootkit 检测)

https://www.fireeye.com/blog/threat-research/2018/08/bios-boots-what-finding-evil-in-boot-code-at-scale.html


Remote UEFI Firmware Attacks(UEFI 固件安全)

https://blog.eclypsium.com/2018/08/27/uefi-remote-attacks


算上这期恰好两年,当然,整理的内容并不全面,希望能有帮助。

Everything that is great starts small.



[注意]传递专业知识、拓宽行业人脉——看雪讲师团队等你加入!

最后于 2018-9-8 10:07 被BDomne编辑 ,原因:
收藏
免费 1
支持
分享
打赏 + 5.00雪花
打赏次数 1 雪花 + 5.00
 
赞赏  orz1ruo   +5.00 2018/09/10
最新回复 (11)
雪    币: 47147
活跃值: (20380)
能力值: (RANK:350 )
在线值:
发帖
回帖
粉丝
2
感谢分享!
2018-9-8 10:37
0
雪    币: 3229
活跃值: (3281)
能力值: ( LV4,RANK:40 )
在线值:
发帖
回帖
粉丝
3
感谢分享啊,确实厉害
2018-9-8 11:03
0
雪    币: 11007
活跃值: (17509)
能力值: ( LV2,RANK:10 )
在线值:
发帖
回帖
粉丝
4
整理了这么多的内容,楼主辛苦了
2018-9-8 16:50
0
雪    币: 6
活跃值: (19)
能力值: ( LV2,RANK:10 )
在线值:
发帖
回帖
粉丝
5
支持楼主。
2018-9-25 12:44
0
雪    币: 3935
活跃值: (187)
能力值: ( LV2,RANK:10 )
在线值:
发帖
回帖
粉丝
6
感谢分享
2018-9-25 15:01
0
雪    币: 8835
活跃值: (2404)
能力值: ( LV12,RANK:760 )
在线值:
发帖
回帖
粉丝
7
是0x1A吧,不是0xFF吓得的我以为自己错过了230篇
最后于 2018-9-25 15:15 被cvcvxk编辑 ,原因:
2018-9-25 15:15
0
雪    币: 4230
活跃值: (1435)
能力值: (RANK:270 )
在线值:
发帖
回帖
粉丝
8
cvcvxk 是0x1A吧,不是0xFF吓得的我以为自己错过了230篇
这里是表意最后一期,初衷是想记录些有用的内容,两年小目标也算实现了
2018-9-25 22:27
0
雪    币: 8835
活跃值: (2404)
能力值: ( LV12,RANK:760 )
在线值:
发帖
回帖
粉丝
9
BDomne 这里是表意最后一期,初衷是想记录些有用的内容,两年小目标也算实现了
不应该是\0\0结尾吗?
2018-9-26 09:08
0
雪    币: 4230
活跃值: (1435)
能力值: (RANK:270 )
在线值:
发帖
回帖
粉丝
10
cvcvxk 不应该是\0\0结尾吗?
哈 文末小标题编号也有这么用的
2018-9-26 09:34
0
雪    币: 357
活跃值: (3378)
能力值: ( LV3,RANK:25 )
在线值:
发帖
回帖
粉丝
11
不继续更新有点可惜
2018-9-26 19:29
0
雪    币: 419
活跃值: (96)
能力值: ( LV2,RANK:10 )
在线值:
发帖
回帖
粉丝
12
mark 感谢分享
2018-12-30 23:35
0
游客
登录 | 注册 方可回帖
返回
//