每周蓝军技术推送(2021.1.29-2.11)

渗透技巧 3年前 (2022) admin
784 0 0
每周蓝军技术推送(2021.1.29-2.11)


Web安全


Top 10 Web攻击技术

https://portswigger.net/research/top-10-web-hacking-techniques-of-2021

服务器端模版注入SSTI分析与归纳

https://tttang.com/archive/1412/

Java反序列化漏洞研究前序:Transformer、动态代理与注解

http://terenceli.github.io/技术/2022/01/30/java-dynamic-proxy-and-annotation

Java加载动态链接库

https://tttang.com/archive/1436/

ASP.NET下的内存马(1) filter内存马

https://tttang.com/archive/1408/

ASP.NET下的内存马(2) Route内存马

https://tttang.com/archive/1420/

OffensiveCon 2022 会议议题:攻击Javascript引擎

https://saelo.github.io/presentations/offensivecon_22_attacking_javascript_engines.pdf


内网渗透


OffensiveCon 2022 会议议题:Kerberos认证中继攻击研究

https://github.com/tyranid/infosec-presentations/blob/master/OffensiveCon/2022/This%20are%20my%20principals.pdf

Shadow Credentials攻击详解

https://pentestlab.blog/2022/02/07/shadow-credentials/


终端对抗


在Lnk中嵌入EXE并自动执行

https://www.x86matthew.com/view_post?id=embed_exe_lnk

利用 Cuckoo Sandbox 处理不当的 Windows API Hook 函数逃逸沙箱检测

https://research.checkpoint.com/2022/invisible-cuckoo-cape-sandbox-evasion

SnapLoader:利用 PssCaptureSnapshot 和 PssWalkSnapshot 实现的 Shellcode 注入和线程劫持

https://gitlab.com/ORCA666/snaploader

UAC绕过技术与检测

https://elastic.github.io/security-research/whitepapers/2022/02/03.exploring-windows-uac-bypass-techniques-detection-strategies/article/

微软计划默认禁用带有MOTW(Mark of the Web)标记的宏文档

https://www.theverge.com/2022/2/7/22922032/microsoft-block-office-vba-macros-default-change

PackMyPayload:利用容器文件打包载荷规避MOTW标记的武器化项目

https://github.com/mgeeky/PackMyPayload

利用NtCreateThreadEx函数,对远程进程数据进行读写(不依赖ReadProcessMemory / WriteProcessMemory)

https://www.x86matthew.com/view_post?id=read_write_proc_memory

Object Overloading:在进程初始运行时,加载任意DLL

https://www.trustedsec.com/blog/object-overloading/

利用Windows沙箱token机制禁用安全产品

https://elastic.github.io/security-research/whitepapers/2022/02/02.sandboxing-antimalware-products-for-fun-and-profit/article/#

https://twitter.com/Flangvik/status/1490365835449360387

https://github.com/MartinIngesen/TokenStomp

自定义RPC客户端以SYSTEM权限执行命令

https://github.com/freingruber/JavaScript-Raider

利用Systemd Generators实现Linux持久化

https://pberba.github.io/security/2022/02/07/linux-threat-hunting-for-persistence-systemd-generators/


漏洞相关


OffensiveCon2022:2021年野外利用漏洞披露总结

https://github.com/maddiestone/ConPresentations/blob/master/OffensiveCon2022.RealWorld0days.pdf

SpoolFool(CVE-2022–21999):Windows Print Spooler 权限提升漏洞

https://research.ifcr.dk/spoolfool-windows-print-spooler-privilege-escalation-cve-2022-22718-bf7752b68d81

CVE-2022-21877:Windows Storage Spaces Controller 信息泄露漏洞分析

https://big5-sec.github.io/posts/an-analysis-of-cve-2022-21877/

CVE-2021-44142:Pwn2Own Austin 2021 Samba 堆内存越界读写 RCE 漏洞

https://www.thezdi.com/blog/2022/2/1/cve-2021-44142-details-on-a-samba-code-execution-bug-demonstrated-at-pwn2own-austin

CVE-2021-41091:Docker引擎Moby目录遍历漏洞可导致逃逸

https://www.cyberark.com/resources/threat-research-blog/how-docker-made-me-more-capable-and-the-host-less-secure

CVE-2022-20700:思科精睿(Cisco Small Business)RCE漏洞

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D

SoK:浏览器安全分析 

https://paper.seebug.org/1818/


云安全


CI/CD Pipeline的攻击:通过污染Pipeline在CI中执行命令

https://medium.com/cider-sec/ppe-poisoned-pipeline-execution-34f4e8d0d4e9

Microsoft 365攻击:利用Power Automate,创建工作流进行数据渗出、C2通信、横向移动等

https://www.varonis.com/blog/power-automate-data-exfiltration


其他


Advanced-Process-Injection-Workshop:Windows 进程注入实验环境

https://github.com/RedTeamOperations/Advanced-Process-Injection-Workshop

Offensive WebDAV:利用WebDAV服务为C2 Agent提供库支撑

https://www.bc-security.org/post/weaponizing-webdav-for-offensive-security/

邮件伪造:攻击没有配置DMARC的邮件域名

https://www.redteam.cafe/phishing/long-live-dmarc-email-spoof-issues

npm package中的供应链安全薄弱点研究

https://arxiv.org/pdf/2112.10165.pdf

区块链 Hacking 终极指南

https://medium.com/immunefi/hacking-the-blockchain-an-ultimate-guide-4f34b33c6e8b

每周蓝军技术推送(2021.1.29-2.11)

M01N Team

聚焦高级攻防对抗热点技术

绿盟科技蓝军技术研究战队



原文始发于微信公众号(M01N Team):每周蓝军技术推送(2021.1.29-2.11)

版权声明:admin 发表于 2022年2月11日 上午10:00。
转载请注明:每周蓝军技术推送(2021.1.29-2.11) | CTF导航

相关文章

暂无评论

您必须登录才能参与评论!
立即登录
暂无评论...