每日安全动态推送(4-4)

渗透技巧 2年前 (2023) admin
387 0 0
Tencent Security Xuanwu Lab Daily News

• Secure File Paths in Python:
https://raisistance.com/secure-file-paths-in-python/

   ・ 为 Python 中的文件路径清理不受信任的用户输入,转义文件路径以防止恶意攻击。 – SecTodayBot


• [Tools] README.md:
https://github.com/binsync/binsync

   ・ BinSync 是一个基于 Git 版本控制系统构建的反编译器协作工具,可实现与反编译器无关的细粒度逆向工程协作。  – SecTodayBot


• [Tools] GitHub – 0xPugazh/fuzz4bounty: Awesome wordlists for Bug Bounty Hunting:
https://github.com/0xPugazh/fuzz4bounty

   ・ 包含多种不同应用的fuzz字典汇总 – WireFish


• [Tools] A dive into the PE file format – LAB 1: Writing a PE Parser:
https://0xrick.github.io/win-internals/pe8/

   ・ 介绍PE文件格式 – WireFish


• [Tools] Noseyparker – A Command-Line Program That Finds Secrets And Sensitive Information In Textual Data And Git History:
https://ift.tt/9yOt51C

   ・ 从文本数据和git历史中搜索敏感数据的工具 – WireFish


• mast1c0re: Hacking the PS4 / PS5 through the PS2 Emulator – Part 2 – Compiler Attack:
https://cturt.github.io/mast1c0re-2.html

   ・ 攻击现在PS4/PS5游戏机中的PS2模拟器,穿越模拟环境,并通过攻击编译进程来获得PS4/PS5中的任意代码执行能力 – WireFish


• GitLab v15.3 – Remote Code Execution (RCE) (Authenticated):
http://dlvr.it/SlqgWj

   ・ GitLab v15.3认证后远程代码执行 – WireFish


• Vim: help.txt:
https://vimhelp.org/

   ・ Vim使用指导手册 – lanying37


• The Case For Improving Crypto Wallet Security:
https://blog.doyensec.com/2023/03/28/wallet-info.html

   ・ 安全研究员为目前加密货币钱包提供了几点安全加固建议 – WireFish


• parse-server 从原型污染到 RCE 漏洞(CVE-2022-39396) 分析:
https://paper.seebug.org/2059/

   ・ parse-server 从原型污染到 RCE 漏洞(CVE-2022-39396) 分析 – WireFish


• Dissecting redis CVE-2023-28425 with chatGPT as assistant:
https://tin-z.github.io/redis/cve/chatgpt/2023/04/02/redis-cve2023.html

   ・ 以 ChatGPT 为助手剖析 Redis CVE-2023-28425 – SecTodayBot


* 查看或搜索历史推送内容请访问:
https://sec.today

* 新浪微博账号:腾讯玄武实验室
https://weibo.com/xuanwulab


原文始发于微信公众号(腾讯玄武实验室):每日安全动态推送(4-4)

版权声明:admin 发表于 2023年4月4日 上午10:56。
转载请注明:每日安全动态推送(4-4) | CTF导航

相关文章

暂无评论

您必须登录才能参与评论!
立即登录
暂无评论...