每日安全动态推送(8-2)

渗透技巧 1年前 (2023) admin
177 0 0
Tencent Security Xuanwu Lab Daily News

• GitHub – wh0amitz/S4UTomato: Escalate Service Account To LocalSystem via Kerberos:
https://github.com/wh0amitz/S4UTomato

   ・ 利用Kerberos讲本地权限提升至system的工具 – SecTodayBot


• Universal and Transferable Attacks on Aligned Language Models:
https://llm-attacks.org/

   ・ 论文研究针对语言大模型的越狱攻击 – SecTodayBot


• Uvdesk v1.1.3 – File Upload Remote Code Execution (RCE) (Authenticated):
http://dlvr.it/St0XTp

   ・ Uvdesk v1.1.3 文件上传RCE漏洞 – SecTodayBot


• Bug Bounty: How I gained over 1000 REPUTATION on HackerOne in 3 Months:
https://kongwenbin.com/how-i-gained-over-1000-reputation-on-hackerone-in-3-months/

   ・ 3个月在HackerOne上获得1000多分,作者分享了一些技巧 – SecTodayBot


• Out of the Sandbox: WikiLoader Digs Sophisticated Evasion   | Proofpoint UK:
https://www.proofpoint.com/uk/blog/threat-insight/out-sandbox-wikiloader-digs-sophisticated-evasion

   ・ 发现新型恶意软件WikiLoader在攻击意大利组织,详细分析了该恶意软件的行为 – SecTodayBot


• Get to Know Your Decompiler:
https://jonpalmisc.com/2023/07/31/get-to-know-your-decompiler

   ・ 介绍反编译器工作原理 – SecTodayBot


• Detecting DPAPI Backup Key Theft:
https://www.dsinternals.com/en/dpapi-backup-key-theft-auditing/

   ・ 检测 DPAPI 备份密钥盗窃:使用远程域控制器检索备份密钥的端点上的恶意命令、IPSec 隧道和 RPC/TCP 绑定检测 – SecTodayBot


• Analyzing the Vulnerability in ASUS Router (maybe) from TFC2021:
https://paper.seebug.org/2098/

   ・ 天府杯华硕路由器漏洞分析 – SecTodayBot


• MITM attack over HTTPS connection with SSLStrip:
https://gbhackers.com/mitm-attack-https-connection-ssl-strip/

   ・ 使用 SSLStrip 通过 HTTPS 连接进行 MITM 攻击,透明地劫持网络上的 HTTP 流量 – SecTodayBot


* 查看或搜索历史推送内容请访问:
https://sec.today

* 新浪微博账号:腾讯玄武实验室
https://weibo.com/xuanwulab


原文始发于微信公众号(腾讯玄武实验室):每日安全动态推送(8-2)

版权声明:admin 发表于 2023年8月2日 上午10:55。
转载请注明:每日安全动态推送(8-2) | CTF导航

相关文章

暂无评论

您必须登录才能参与评论!
立即登录
暂无评论...