Tencent Security Xuanwu Lab Daily News
• Never, Ever, Ever Use Pixelation for Redacting Text:
https://bishopfox.com/blog/unredacter-tool-never-pixelation
・ 利用 Unredacter 工具还原被马赛克打码的文字
– Jett
• Bypassing software update package encryption – extracting the Lexmark MC3224i printer firmware (part 1):
https://research.nccgroup.com/2022/02/17/bypassing-software-update-package-encryption-extracting-the-lexmark-mc3224i-printer-firmware-part-1/
・ 绕过安装包更新机制,提取 Lexmark MC3224i 打印机的固件
– Jett
• JAVA 协议安全笔记-JNDI篇:
https://tttang.com/archive/1441/
・ JAVA 协议安全笔记-JNDI篇.
– lanying37
• [Attack] APT组织Lorec53(洛瑞熊)近期针对乌克兰的大规模网络攻击活动:
http://blog.nsfocus.net/apt-lorec53-20220216/
・ APT组织Lorec53(洛瑞熊)近期针对乌克兰的大规模网络攻击活动.
– lanying37
• [Pentest] A primer on DCSync attack and detection:
https://www.alteredsecurity.com/post/a-primer-on-dcsync-attack-and-detection
・ DCSync 攻击与检测方法入门介绍.
– lanying37
• exploiting CVE-2019-2215 | cutesmilee’s blog:
https://cutesmilee.github.io/kernel/linux/android/2022/02/17/cve-2019-2215_writeup.html
・ Android Binder CVE-2019-2215 漏洞的利用
– Jett
• HyperGuard – Secure Kernel Patch Guard: Part 2 – SKPG Extents – Winsider Seminars & Solutions Inc.:
https://windows-internals.com/hyperguard-secure-kernel-patch-guard-part-2-skpg-extents/?utm_source=rss&utm_medium=rss&utm_campaign=hyperguard-secure-kernel-patch-guard-part-2-skpg-extents
・ Windows 内核保护机制 HyperGuard 的实现研究
– Jett
• The Most Memory Safe Buffer Overflow in Rust!:
https://gist.github.com/rexim/38c176fe4669ef83db69aca9909d7b7f
・ Rust 语言的 Buffer Overflow 漏洞代码实例
– Jett
• [Vulnerability] Zabbix – A Case Study of Unsafe Session Storage:
https://blog.sonarsource.com/zabbix-case-study-of-unsafe-session-storage
・ Zabbix – A Case Study of Unsafe Session Storage
– Jett
• Attack Surface Monitoring using Open-Source Intelligence:
https://infosecwriteups.com/attack-surface-monitoring-using-open-source-intelligence-90415e863e93?source=rss—-7b722bfd1b8d—4
・ Attack Surface Monitoring using Open-Source Intelligence.
– lanying37
• Exploiting Jenkins build authorization:
https://medium.com/cider-sec/exploiting-jenkins-build-authorization-22bf72926072
・ Jenkins 默认的 Build Authorization 配置存在缺陷
– Jett
• Tutorial: Kubernetes Vulnerability Scanning & Testing With Open Source:
https://www.conjur.org/blog/tutorial-kubernetes-vulnerability-scanning-testing-with-open-source/
・ 利用 Kubesploit & KubiScan 开源工具扫描 Kubernetes 的漏洞
– Jett
* 查看或搜索历史推送内容请访问:
https://sec.today
* 新浪微博账号:腾讯玄武实验室
https://weibo.com/xuanwulab
原文始发于微信公众号(腾讯玄武实验室):每日安全动态推送(02-18)