Tencent Security Xuanwu Lab Daily News
• [CTF] Instrumenting binaries using revng and LLVM:
https://layle.me/posts/instrumentation-with-revng/
・ 利用revng和llvm对二进制文件进行插桩
– WireFish
• [Tools] debugHunter – Discover Hidden Debugging Parameters And Uncover Web Application Secrets:
http://www.kitploit.com/2023/04/debughunter-discover-hidden-debugging.html
・ Chrome 扩展程序,可以扫描网站以获取调试参数,该扩展利用二分搜索算法来有效地确定负责响应变化的参数
– SecTodayBot
• [IoT] Now I See You: Uncovering Security Vulnerabilities in Camera Sunglasses:
https://code-byter.com/2023/04/16/rayban-hacking.html
・ Ray-Ban 太阳镜可以录制视频并将媒体文件传输到相应的配套应用程序,配套应用不验证 SSL 证书。这会造成中间人攻击并在下载过程中拦截录制的视频
– SecTodayBot
• [Tools] Azure AD Security Config Analyzer (AADSCA):
https://github.com/Cloud-Architekt/AzureAD-Attack-Defense/blob/main/AADSecurityConfigAnalyzer.md
・ Azure AD 安全配置分析器,用于从选定的 Microsoft 图形 API 端点监视和监视 Azure AD 的安全配置配置,并将数据提取到 Log Analytics。
– SecTodayBot
• [Wireless, Tools] GitHub – mikeryan/ice9-bluetooth-sniffer: Wireshark Bluetooth sniffer for HackRF, BladeRF, and USRP:
https://github.com/mikeryan/ice9-bluetooth-sniffer
・ 用于在 PCAP 文件中捕获和捕获 BLE 数据包的工具
– SecTodayBot
• [Windows] Bypassing Windows Defender (10 Ways):
https://www.fo-sec.com/articles/10-defender-bypass-methods
・ 绕过 Windows Defender 的 10 种方法
– SecTodayBot
• Microsoft Word Remote Code Execution:
https://packetstormsecurity.com/files/171882
・ Word 远程命令执行利用漏洞
– SecTodayBot
• [Vulnerability] QueueJumper: Critical Unauthorized RCE Vulnerability in MSMQ Service:
https://research.checkpoint.com/2023/queuejumper-critical-unauthorized-rce-vulnerability-in-msmq-service/
・ Check Point Research 最近在 Microsoft 消息队列服务(通常称为 MSMQ)中发现了三个漏洞。其中最严重的一个被称为 QueueJumper (CVE-2023-21554) 可能允许未经身份验证的攻击者在 Windows 服务进程 mqsvc.exe 的上下文中远程执行任意代码
– SecTodayBot
• [Vulnerability] CVE-2023-0896: Lenovo Smart Clock Essential’s SSH Hard-Coded Password Vulnerability:
https://securityonline.info/cve-2023-0896-lenovo-smart-clock-essentials-ssh-hard-coded-password-vulnerability/
・ Lenovo Smart Clock Essential (CVE-2023-0896),SSH 和 Telnet 中的硬编码密码漏洞
– SecTodayBot
• Apache Solr 9.1 RCE 分析 CNVD-2023-27598:
https://noahblog.360.cn/apache-solr-rce/
・ 分析 Apache Solr 9.1 的远程命令执行漏洞
– SecTodayBot
* 查看或搜索历史推送内容请访问:
https://sec.today
* 新浪微博账号:腾讯玄武实验室
https://weibo.com/xuanwulab
原文始发于微信公众号(腾讯玄武实验室):每日安全动态推送(4-18)