{"id":17355,"date":"2016-04-12T09:00:40","date_gmt":"2016-04-12T01:00:40","guid":{"rendered":"https:\/\/blog.trendmicro.com.tw\/?p=17355"},"modified":"2016-04-12T17:06:18","modified_gmt":"2016-04-12T09:06:18","slug":"%e8%ae%93%e6%88%91%e5%b9%ab%e4%bd%a0%e9%96%8b%e9%96%80%ef%bc%9ahid%e9%96%80%e7%a6%81%e6%8e%a7%e5%88%b6%e5%99%a8%e5%87%ba%e7%8f%be%e9%81%a0%e7%ab%af%e7%ae%a1%e7%90%86%e6%bc%8f%e6%b4%9e","status":"publish","type":"post","link":"https:\/\/blog.trendmicro.com.tw\/?p=17355","title":{"rendered":"\u8b93\u6211\u5e6b\u4f60\u958b\u9580\uff1aHID\u9580\u7981\u63a7\u5236\u5668\u51fa\u73fe\u9060\u7aef\u7ba1\u7406\u6f0f\u6d1e"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2016\/01\/How-should-CIOs-approach-cyber-security-in-the-new-year_459_40107513_0_14090567_300.jpg\" alt=\"\" width=\"299\" height=\"208\" \/>\u5982\u679c\u4f60\u53bb\u904e\u6a5f\u5834\u3001\u6821\u5712\u3001\u91ab\u9662\u53ca\u653f\u5e9c\u7b49\u51fa\u5165\u8907\u96dc\u7684\u5730\u65b9\u6216\u8fa6\u516c\u5927\u6a13\uff0c\u4f60\u53ef\u80fd\u770b\u904eHID\u9019\u724c\u5b50\u7684\u8b80\u5361\u6a5f\u51fa\u73fe\u5728\u9580\u7981\u5340\u524d\u3002<a href=\"https:\/\/www.hidglobal.com\/\">HID<\/a>\u662f\u4e16\u754c\u4e0a\u6700\u5927\u7684\u9580\u7981\u63a7\u5236\u7cfb\u7d71\u88fd\u9020\u5546\u4e4b\u4e00\uff0c\u6210\u70ba\u8a31\u591a\u5927\u578b\u4f01\u696d\u5be6\u9ad4\u5b89\u5168\u7684\u4e00\u90e8\u5206\u3002\u9019\u4e9b\u8b80\u5361\u6a5f\u6703\u9023\u7d50\u80cc\u5f8c\u7684\u9580\u7981\u63a7\u5236\u5668\uff0c\u9019\u8a2d\u5099\u53ef\u4ee5\u63a7\u5236\u9580\u7981\u76f8\u95dc\u529f\u80fd\uff0c\u5305\u62ec\u4e0a\u9396\u548c\u958b\u9396\u3001\u6392\u7a0b\u548c\u767c\u51fa\u8b66\u5831\u7b49\u3002<\/p>\n<p>\u8fd1\u5e74\u4f86\uff0c\u9019\u4e9b\u9580\u7981\u63a7\u5236\u5668\u4e5f\u6703\u63d0\u4f9b\u7db2\u8def\u9060\u7aef\u7ba1\u7406\u3002\u53ef\u4ee5\u66f4\u52a0\u65b9\u4fbf\u5730\u66f4\u65b0\u9580\u7981\u5361\u8cc7\u6599\u5eab\u548c\u9032\u884c\u6392\u7a0b\u5de5\u4f5c\uff0c\u4f46\u5c31\u8ddf\u5176\u4ed6\u9023\u7db2\u4e8b\u7269\u4e00\u6a23\uff0c\u4e5f\u6703\u9762\u81e8\u9060\u7aef\u6f0f\u6d1e\u653b\u64ca\u7684\u98a8\u96aa\u3002\u800c\u5c0d\u5be6\u9ad4\u5b89\u5168\u4f86\u8aaa\uff0c\u9019\u98a8\u96aa\u6bd4\u5176\u4ed6\u90fd\u66f4\u52a0\u771f\u5be6\u3002<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignright\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2016\/03\/v2000-evo-300x300.jpg\" alt=\"\" width=\"300\" height=\"300\" \/><\/p>\n<p>HID\u7684\u5169\u5927\u9580\u7981\u63a7\u5236\u5668\u7522\u54c1\u7dda\u662f<a href=\"https:\/\/www.hidglobal.com\/products\/controllers\/vertx-evo\">VertX<\/a>\u548c<a href=\"https:\/\/www.hidglobal.com\/products\/controllers\/edge-evo\">Edge<\/a>\u5e73\u53f0\u3002\u70ba\u4e86\u8b93\u9019\u4e9b\u63a7\u5236\u5668\u53ef\u4ee5\u66f4\u52a0\u5bb9\u6613\u6574\u5408\u5230\u73fe\u884c\u7684\u5b58\u53d6\u63a7\u5236\u5efa\u7f6e\uff0c\u5b83\u5011\u63d0\u4f9b\u4e00\u500bdiscoveryd\u670d\u52d9\u4f86\u56de\u61c9\u7279\u5b9aUDP\u5c01\u5305\u3002\u9060\u7aef\u7ba1\u7406\u7cfb\u7d71\u53ef\u4ee5\u5c0d\u7aef\u53e34070\u9032\u884c\u5ee3\u64ad\uff0c\u7db2\u8def\u4e0a\u6240\u6709\u7684\u9580\u7981\u63a7\u5236\u5668\u90fd\u6703\u52a0\u4ee5\u56de\u61c9\uff0c\u4e26\u63d0\u4f9bMAC\u5730\u5740\u3001\u8a2d\u5099\u985e\u578b\u3001\u97cc\u9ad4\u7248\u672c\u3001\u751a\u81f3\u5305\u62ec\u540d\u7a31\uff08\u5982\u300c\u5916\u5317\u9580\u300d\uff09\u7b49\u8cc7\u8a0a\u3002\u9019\u662f\u8a72\u670d\u52d9\u7684\u7528\u9014\u3002\u4f46\u9019\u4e26\u975e\u8a72\u670d\u52d9\u7684\u552f\u4e00\u529f\u80fd\u3002\u51fa\u65bc\u67d0\u7a2e\u539f\u56e0\uff0cdiscoveryd\u9084\u53ef\u4ee5\u8b8a\u66f4\u63a7\u5236\u5668\u4e0aLED\u71c8\u7684\u9583\u720d\u6a21\u5f0f\u3002\u9019\u662f\u900f\u904e\u767c\u9001\u300ccommand_blink_on\u300d\u5c01\u5305\u7d66discoveryd\u670d\u52d9\u4e26\u52a0\u4e0aLED\u71c8\u7684\u9583\u720d\u6b21\u6578\u3002Discoveryd\u670d\u52d9\u6703\u63a5\u8457\u5efa\u7acb\/mnt\/apps\/bin\/blink\uff0c\u4e26\u547c\u53ebsystem()\u4ee5\u4e0a\u8ff0\u6578\u5b57\u505a\u70ba\u53c3\u6578\u4f86\u57f7\u884c\u9583\u720d\u7a0b\u5f0f\u3002<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2016\/03\/Doc1.jpg\" alt=\"\" width=\"1301\" height=\"941\" \/><\/p>\n<p>\u4f60\u53ef\u80fd\u5df2\u7d93\u731c\u5230\u63a5\u4e0b\u4f86\u6703\u767c\u751f\u4ec0\u9ebc\u4e8b\u3002<\/p>\n<p>\u6b64\u529f\u80fd\u5b58\u5728\u4e00\u500b<a href=\"https:\/\/www.zerodayinitiative.com\/advisories\/ZDI-16-223\/\">\u6307\u4ee4\u6ce8\u5165\u6f0f\u6d1e<\/a>\uff0c\u56e0\u70ba\u7f3a\u5c11\u5c0d\u4f7f\u7528\u8005\u6240\u63d0\u4f9b\u8f38\u5165\u7d66system()\u7684\u6aa2\u67e5\u904e\u6ffe\u3002\u5982\u679c\u6211\u5011\u4e26\u975e\u767c\u9001LED\u9583\u720d\u6b21\u6578\uff0c\u800c\u662f\u7528\u53cd\u5f15\u865f\u5305\u4f4f\u7684Linux\u6307\u4ee4\uff0c\u5982`id`\uff0c\u5b83\u5c31\u6703\u88ab\u8a2d\u5099\u4e0a\u7684Linux shell\u6240\u57f7\u884c\u3002\u66f4\u7cdf\u7684\u662f\uff0cdiscoveryd\u670d\u52d9\u662f\u4ee5root\u8eab\u4efd\u57f7\u884c\uff0c\u6240\u4ee5\u6211\u5011\u6240\u9001\u51fa\u7684\u4efb\u4f55\u6307\u4ee4\u4e5f\u90fd\u5c07\u4ee5root\u57f7\u884c\uff0c\u8b93\u6211\u5011\u80fd\u5920\u6709\u6548\u5730\u5b8c\u5168\u63a7\u5236\u8a72\u8a2d\u5099\u3002\u56e0\u70ba\u9019\u88e1\u6240\u8a0e\u8ad6\u7684\u662f\u9580\u7981\u63a7\u5236\u5668\uff0c\u5b8c\u5168\u63a7\u5236\u4e5f\u5305\u62ec\u6240\u6709\u7684\u8b66\u5831\u548c\u4e0a\u9396\u529f\u80fd\u3002\u9019\u4ee3\u8868\u53ea\u8981\u4e00\u4e9b\u7c21\u55ae\u7684UDP\u5c01\u5305\u800c\u7121\u9808\u4efb\u4f55\u8eab\u4efd\u9a57\u8b49\uff0c\u5c31\u53ef\u4ee5\u6c38\u4e45\u89e3\u9396\u9023\u5230\u63a7\u5236\u5668\u4e0a\u7684\u6bcf\u4e00\u6247\u9580\u3002\u800c\u4e14\u4e5f\u53ef\u4ee5\u60f3\u8fa6\u6cd5\u8b93\u9060\u7aef\u7ba1\u7406\u7cfb\u7d71\u518d\u4e5f\u7121\u6cd5\u91cd\u65b0\u4e0a\u9396\u3002\u6700\u91cd\u8981\u7684\u662f\uff0c\u7531\u65bcdiscoveryd\u670d\u52d9\u6703\u56de\u61c9\u5ee3\u64ad\u7684UDP\u5c01\u5305\uff0c\u4f60\u53ef\u4ee5\u5728\u540c\u4e00\u6642\u9593\u5c0d\u7db2\u8def\u4e0a\u7684\u6bcf\u4e00\u9053\u9580\u9019\u6a23\u505a\uff01<\/p>\n<p>&nbsp;<\/p>\n<p>\u4e0d\u7528\u8aaa\uff0c\u9019\u662f\u500b\u5177\u6709\u6f5b\u5728\u6467\u6bc0\u6027\u5f8c\u679c\u7684\u932f\u8aa4\u3002<a href=\"https:\/\/www.zerodayinitiative.com\/advisories\/ZDI-16-223\/\">\u96f6\u6642\u5dee\u8a08\u756b\uff08ZDI\uff09<\/a>\u5718\u968a\u8207HID\u5408\u4f5c\u4f86\u9032\u884c\u4fee\u5fa9\uff0c\u73fe\u5728\u64da\u5831\u5728HID\u7684\u5408\u4f5c\u5925\u4f34\u7db2\u7ad9\u5df2\u7d93\u53ef\u4ee5\u53d6\u5f97\u4fee\u88dc\u7a0b\u5f0f\uff0c\u4f46\u6211\u5c1a\u672a\u80fd\u89aa\u81ea\u9a57\u8b49\u6b64\u4fee\u5fa9\u7a0b\u5f0f\u3002\u800c\u4e14\u4e5f\u5fc5\u9808\u89c0\u5bdf\u4fee\u88dc\u7a0b\u5f0f\u9700\u8981\u82b1\u591a\u4e45\u6642\u9593\u4f48\u7f72\u5230\u5ba2\u6236\u74b0\u5883\u3002\u5728\u4fee\u88dc\u7a0b\u5f0f\u63d0\u4f9b\u524d\uff0cTippingPoint\u5ba2\u6236\u81ea2015\u5e749\u670822\u65e5\u958b\u59cb\u5c31\u53ef\u4ee5\u900f\u904e\u6578\u4f4d\u75ab\u82d7\u7de8\u865f20820\u4f86\u53d6\u5f97\u4fdd\u8b77\u3002<\/p>\n<p>&nbsp;<\/p>\n<p>\uff20\u539f\u6587\u51fa\u8655\uff1a<a href=\"https:\/\/blog.trendmicro.com\/let-get-door-remote-root-vulnerability-hid-door-controllers\/\">Let Me Get That Door for You: Remote Root Vulnerability in HID Door Controllers<\/a>\u4f5c\u8005\uff1aRick Lawshae<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u5982\u679c\u4f60\u53bb\u904e\u6a5f\u5834\u3001\u6821\u5712\u3001\u91ab\u9662\u53ca\u653f\u5e9c\u7b49\u51fa\u5165\u8907\u96dc\u7684\u5730\u65b9\u6216\u8fa6\u516c\u5927\u6a13\uff0c\u4f60\u53ef\u80fd\u770b\u904eHID\u9019\u724c\u5b50\u7684\u8b80\u5361\u6a5f\u51fa\u73fe\u5728\u9580\u7981\u5340\u524d\u3002HI [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","_wpscppro_dont_share_socialmedia":false,"_wpscppro_custom_social_share_image":0,"_facebook_share_type":"","_twitter_share_type":"","_linkedin_share_type":"","_pinterest_share_type":"","_linkedin_share_type_page":"","_instagram_share_type":"","_medium_share_type":"","_threads_share_type":"","_google_business_share_type":"","_selected_social_profile":[],"_wpsp_enable_custom_social_template":false,"_wpsp_social_scheduling":{"enabled":false,"datetime":null,"platforms":[],"status":"template_only","dateOption":"today","timeOption":"now","customDays":"","customHours":"","customDate":"","customTime":"","schedulingType":"absolute"},"_wpsp_active_default_template":true},"categories":[1723,1335,156],"tags":[2707,2292],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/17355"}],"collection":[{"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=17355"}],"version-history":[{"count":0,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/17355\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=17355"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=17355"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=17355"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}