每日安全动态推送(02-18)

渗透技巧 3年前 (2022) admin
734 0 0
Tencent Security Xuanwu Lab Daily News


• Never, Ever, Ever Use Pixelation for Redacting Text:
https://bishopfox.com/blog/unredacter-tool-never-pixelation

   ・ 利用 Unredacter 工具还原被马赛克打码的文字 – Jett


• Bypassing software update package encryption – extracting the Lexmark MC3224i printer firmware (part 1):
https://research.nccgroup.com/2022/02/17/bypassing-software-update-package-encryption-extracting-the-lexmark-mc3224i-printer-firmware-part-1/

   ・ 绕过安装包更新机制,提取 Lexmark MC3224i 打印机的固件 – Jett


• JAVA 协议安全笔记-JNDI篇:
https://tttang.com/archive/1441/

   ・ JAVA 协议安全笔记-JNDI篇. – lanying37


• [Attack] APT组织Lorec53(洛瑞熊)近期针对乌克兰的大规模网络攻击活动:
http://blog.nsfocus.net/apt-lorec53-20220216/

   ・ APT组织Lorec53(洛瑞熊)近期针对乌克兰的大规模网络攻击活动. – lanying37


• [Pentest] A primer on DCSync attack and detection:
https://www.alteredsecurity.com/post/a-primer-on-dcsync-attack-and-detection

   ・ DCSync 攻击与检测方法入门介绍. – lanying37


• exploiting CVE-2019-2215 | cutesmilee’s blog:
https://cutesmilee.github.io/kernel/linux/android/2022/02/17/cve-2019-2215_writeup.html

   ・ Android Binder CVE-2019-2215 漏洞的利用 – Jett


• HyperGuard – Secure Kernel Patch Guard: Part 2 – SKPG Extents – Winsider Seminars & Solutions Inc.:
https://windows-internals.com/hyperguard-secure-kernel-patch-guard-part-2-skpg-extents/?utm_source=rss&utm_medium=rss&utm_campaign=hyperguard-secure-kernel-patch-guard-part-2-skpg-extents

   ・ Windows 内核保护机制 HyperGuard 的实现研究 – Jett


• The Most Memory Safe Buffer Overflow in Rust!:
https://gist.github.com/rexim/38c176fe4669ef83db69aca9909d7b7f

   ・ Rust 语言的 Buffer Overflow 漏洞代码实例 – Jett


• [Vulnerability] Zabbix – A Case Study of Unsafe Session Storage:
https://blog.sonarsource.com/zabbix-case-study-of-unsafe-session-storage

   ・ Zabbix – A Case Study of Unsafe Session Storage – Jett


• Attack Surface Monitoring using Open-Source Intelligence:
https://infosecwriteups.com/attack-surface-monitoring-using-open-source-intelligence-90415e863e93?source=rss—-7b722bfd1b8d—4

   ・ Attack Surface Monitoring using Open-Source Intelligence. – lanying37


• Exploiting Jenkins build authorization:
https://medium.com/cider-sec/exploiting-jenkins-build-authorization-22bf72926072

   ・ Jenkins 默认的 Build Authorization 配置存在缺陷 – Jett


• Tutorial: Kubernetes Vulnerability Scanning & Testing With Open Source:
https://www.conjur.org/blog/tutorial-kubernetes-vulnerability-scanning-testing-with-open-source/

   ・ 利用 Kubesploit & KubiScan 开源工具扫描 Kubernetes 的漏洞 – Jett


* 查看或搜索历史推送内容请访问:
https://sec.today

* 新浪微博账号:腾讯玄武实验室
https://weibo.com/xuanwulab


原文始发于微信公众号(腾讯玄武实验室):每日安全动态推送(02-18)

版权声明:admin 发表于 2022年2月18日 上午4:18。
转载请注明:每日安全动态推送(02-18) | CTF导航

相关文章

暂无评论

您必须登录才能参与评论!
立即登录
暂无评论...