Security News | 安全資訊 (2015-12-21)
Android
- POC for CVE-2015-6620: AMessage unmarshal arbitrary write
- Attacking Bound Services on Android
- Re: CVE-2015-8088: Heap Overflow Vulnerability in the HIFI Driver of Huawei Smart Phone (previous report)
iOS
- iOS Trojan "TinyV" Attacks Jailbroken Devices, writeup, samples
- ios-kerneldocs: Various files helping to better understand the iOS / WatchOS / tvOS kernels
- jtool
Linux
- Back to 28: Grub2 Authentication 0-Day
- A Moose Once Bit My Honeypot A Story of an Embedded Linux Botnet
- How to emulate executable with Medusa and python (part 0)
Web
Network
- Another “critical” “VPN” “vulnerability” and why Port Fail is bullshit
- How Tor Works: part 1, part 2, part 3
- t50: mixed packet injector tool
Windows
- Internet Explorer 11 MSHTML!CObjectElement Use-After-Free Vulnerability (MS15-124)
- Exploit upgrade for Microsoft Word Intruder crimeware kit
- Bypassing Windows ASLR in Microsoft Office using ActiveX controls
- MS15-010 / CVE-2015-0057 Exploitation
- Sexrets of LoadLibrary
- The EPS Awakens: part 1, part 2
- Microsoft OneNote 2013 DOS (NULL POINTER READ) and Possible RCE
Flash
- Adobe Flash TextField.antiAliasType Setter Use-After-Free
- Angler EK最新CVE-2015-8446 Flash Exploit分析 (Chinese)
Tool
- Mosca: Static analysis tool to find bugs like a grep unix command
- Maltrail: Malicious traffic detection system
- Bytecode viewer
- chw00t: chroot escape too
- Ares: Ares is a Python Remote Access Tool.
- Awesome Honeypots: A curated list of awesome honeypots, tools, components and much more. The list is divided into categories such as web, services, and others, focusing on open source projects.
- fREedom: fREedom is a primitive attempt to provide an IDA Pro independent means of extracting disassembly information from executables for use with binnavi (https://github.com/google/binnavi).
Misc
- Jenkins CLI RMI Java Deserialization
- The Beginner's Guide to IDAPython
- The Apple threat landscape
- Avast: stack buffer overflow, strncpy length discarded
- PS4 kernel exploit tease (root FS dump, and list of PIDs) Raw
- Runtime DirectX Hooking
- PS4 security article follow up
- DeepSec
- File Format Fuzzing in Android
- Not so Smart On Smart TV Apps
- ZigBee SmartHomes A Hackers Open House
- FireEye Exploitation: Project Zero’s Vulnerability of the Beast
- Unicorn VS. Malware
- Files Are Hard
- Hacking the PS4, part 3, Kernel exploitation
- CVE-2015-7755: Juniper ScreenOS Authentication Backdoor
- Better visualization of data formats using assembly POC's to better implement them in C
- Securing Application Software in Modern Adversarial Settings
- Mac-SE Easter Egg
CTF
Conference
Source
The resources are collected in various sources such as blog feeds, Twitter and Weibo. Here, I list some of my personally favorite sources.
- Security feeds in my subscriptions, download OPML
- Security guys in my Twitter following.
- Security guys in my Weibo following.
- 每日安全动态推送 from Weibo @腾讯玄武实验室 (Chinese)