Tencent Security Xuanwu Lab Daily News
• AD CS: from ManageCA to RCE – BlackArrow:
https://www.blackarrow.net/ad-cs-from-manageca-to-rce/
・ AD CS: from ManageCA to RCE – BlackArrow
– Jett
• Athena:
https://github.com/MythicAgents/Athena
・ 基于 .NET 6 写的跨平台 Mythic Agent
– Jett
• Hunting for bugs in VMware: View Planner and vRealize Business for Cloud:
https://swarm.ptsecurity.com/hunting-for-bugs-in-vmware-view-planner-and-vrealize-business-for-cloud/
・ VMware View Planner、vRealize Business for Cloud unauth RCE
– Jett
• CVE-2021-44521: RCE Vulnerability in Apache Cassandra:
https://jfrog.com/blog/cve-2021-44521-exploiting-apache-cassandra-user-defined-functions-for-remote-code-execution/
・ CVE-2021-44521: RCE Vulnerability in Apache Cassandra
– Jett
• [Browser] Chrome Zero-Day Under Active Attack: Patch ASAP:
https://threatpost.com/google-chrome-zero-day-under-attack/178428/
・ Chrome 发布版本更新,本次更新修复了一个野外被攻击的漏洞
– Jett
• [Tools] Static Taint Analysis using Binary Ninja: A Case Study of MySQL Cluster Vulnerabilities:
https://www.zerodayinitiative.com/blog/2022/2/14/static-taint-analysis-using-binary-ninja-a-case-study-of-mysql-cluster-vulnerabilities
・ 利用 Binary Ninja 的静态污点分析功能挖掘 MySQL Cluster 的漏洞
– Jett
• Object Overloading:
https://blog.xpnsec.com/object-overloading/
・ 利用 Object Overloading 技术,向 Windows Built-in 进程注入代码绕过 EDR 的检测
– Jett
• [Tools] ?? Gaining the upper hand(le):
https://aptw.tf/2022/02/10/leaked-handle-hunting.html
・ Gaining the upper hand(le) – 利用 Low-IL 进程中残留的敏感 handle 提权或 Bypass UAC
– Jett
• RedLine Stealer 伪装成 Windows 11 更新程序,窃取用户信息:
http://paper.seebug.org/1831/
・ RedLine Stealer 伪装成 Windows 11 更新程序,窃取用户信息.
– lanying37
* 查看或搜索历史推送内容请访问:
https://sec.today
* 新浪微博账号:腾讯玄武实验室
https://weibo.com/xuanwulab
原文始发于微信公众号(腾讯玄武实验室):每日安全动态推送(02-16)