腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
[ Firmware ] 使用 IDA 分析 ARM 固件的视频教程: https://twitter.com/LiveOverflow/status/1088857398415106048
[ Fuzzing ] 如何通过 IOCTL Fuzzing 发现内核漏洞: https://trapmine.com/blog/from-0-to-ring0day-sifirdan-ioctl-fuzzing-ve-kernel-zafiyet-kesfi/
[ macOS ] 针对 macOS/iOS CVE-2019-6231 漏洞的详细分析: https://www.fortinet.com/blog/threat-research/detailed-analysis-of-macos-ios-vulnerability-cve-2019-6231.html
[ Pentest ] 从打印机到 Parent 域控制器的攻击记录: http://niiconsulting.com/checkmate/2019/01/intrusion-testing-from-evil-printers-to-parent-domain-controllers/
[ Pentest ] 使用 SystemPropertiesAdvanced.exe 以及 DLL 劫持绕过 UAC: https://egre55.github.io/system-properties-uac-bypass/
[ ReverseEngineering ] 适用于 Windows crash 分析的符号服务器(AMD、NVIDIA、Intel、Microsoft、Chrome): https://twitter.com/i/web/status/1088913344378023936
[ Tools ] Xendbg 适用于 Xen Hypervisor 的调试器: https://www.nccgroup.trust/us/about-us/newsroom-and-events/blog/2019/january/xendbg-a-full-featured-debugger-for-the-xen-hypervisor/
[ Tools ] 隐写术相关工具和资源收集列表: https://0xrick.github.io/lists/stego/
[ Vulnerability ] Cisco RV320 的 Dump 配置和远程 RCE 的漏洞利用: https://github.com/0x27/CiscoRV320Dump