每日安全动态推送(02-08)

渗透技巧 3年前 (2022) admin
601 0 0
Tencent Security Xuanwu Lab Daily News


• 如何对ARM架构下的VxWorks系统固件进行修复?:
https://tttang.com/archive/1418/

   ・ 如何对ARM架构下的VxWorks系统固件进行修复? – lanying37


• 服务器端模版注入SSTI分析与归纳:
https://tttang.com/archive/1412/

   ・ 服务器端模版注入SSTI分析与归纳. – lanying37


• [Android] Smali the Parseltongue Language:
http://blog.quarkslab.com/smali-the-parseltongue-language.html

   ・ 修改 Smali 代码,重打包 Android APK – Jett


• [Browser] [PDF] https://saelo.github.io/presentations/offensivecon_22_attacking_javascript_engines.pdf:
https://saelo.github.io/presentations/offensivecon_22_attacking_javascript_engines.pdf

   ・ Attacking JavaScript Engines in 2022,来自 OffensiveCon 2022 会议 – Jett


• CodeQL 提升篇:
https://tttang.com/archive/1415/

   ・ CodeQL 学习提升篇. – lanying37


• [Tools] Invisible Sandbox Evasion – Check Point Research:
https://research.checkpoint.com/2022/invisible-cuckoo-cape-sandbox-evasion

   ・ 利用 Cuckoo Sandbox 处理不当的 Windows API Hook 函数逃逸沙箱检测 – Jett


• SIM Hijacking:
https://sensepost.com/blog/2022/sim-hijacking/

   ・ SIM卡劫持分析研究. – lanying37


• infosec-presentations/OffensiveCon/2022/This are my principals.pdf:
https://github.com/tyranid/infosec-presentations/blob/master/OffensiveCon/2022/This%20are%20my%20principals.pdf

   ・ James Forshaw 在 OffensiveCon 2022 会议关于 Kerberos Authentication Relaying 研究的分享 – Jett


• [Pentest] Attacks on JSON Web Token (JWT):
https://infosecwriteups.com/attacks-on-json-web-token-jwt-278a49a1ad2e

   ・ 对 JSON Web Token (JWT) 的攻击方法总结. – lanying37


• 从 0 开始学 V8 漏洞利用之 CVE-2021-30517(七):
http://paper.seebug.org/1826/

   ・ 从 0 开始学 V8 漏洞利用之 CVE-2021-30517(七) – lanying37


• Exploring UNIX pipes for iOS kernel exploit primitives, and introducing kalloc_data_require:
https://tfp0labs.com/blog/unix-pipes-exploitation

   ・ Exploring UNIX pipes for iOS kernel exploit primitives, and introducing kalloc_data_require  – Jett


• Java反序列化漏洞研究前序: Transformer、动态代理与注解:
http://terenceli.github.io/%E6%8A%80%E6%9C%AF/2022/01/30/java-dynamic-proxy-and-annotation

   ・ Java 反序列化漏洞研究前序: Transformer、动态代理与注解 – Jett


• A story of leaking uninitialized memory from Fastly:
https://medium.com/@emil.lerner/leaking-uninitialized-memory-from-fastly-83327bcbee1f

   ・ A story of leaking uninitialized memory from Fastly – Jett


• [Fuzzing] [PDF] https://fuzzinglabs.com/wp-content/uploads/2022/02/Beaconfuzz_OffensiveCon2022_patrick_ventuzelo.pdf:
https://fuzzinglabs.com/wp-content/uploads/2022/02/Beaconfuzz_OffensiveCon2022_patrick_ventuzelo.pdf

   ・ BeaconFuzz – Ethereum 2.0 区块链 Fuzz,来自 OffensiveCon 2022 会议 – Jett


• CVE-2021-44142: Details on a Samba Code Execution Bug Demonstrated at Pwn2Own Austin:
https://www.thezdi.com/blog/2022/2/1/cve-2021-44142-details-on-a-samba-code-execution-bug-demonstrated-at-pwn2own-austin

   ・ Pwn2Own Austin 2021 Samba 堆内存越界读写 RCE 漏洞的分析(CVE-2021-44142) – Jett


* 查看或搜索历史推送内容请访问:
https://sec.today

* 新浪微博账号:腾讯玄武实验室
https://weibo.com/xuanwulab


原文始发于微信公众号(腾讯玄武实验室):每日安全动态推送(02-08)

版权声明:admin 发表于 2022年2月8日 上午3:51。
转载请注明:每日安全动态推送(02-08) | CTF导航

相关文章

暂无评论

您必须登录才能参与评论!
立即登录
暂无评论...