Tencent Security Xuanwu Lab Daily News
• Follina Microsoft Office RCE with MS-MSDT Protoco:
https://paper.seebug.org/1911/
・ Follina Microsoft Office RCE with MS-MSDT Protoco
– lanying37
• [Windows] Defeating Windows ASLR via low-entropy shared libraries in 2 hours:
https://link.medium.com/PgyApAujDqb
・ Defeating Windows ASLR via 32-bit Share Library
– Jett
• 5.2. Connection Shutdown:
https://www.rfc-editor.org/rfc/rfc9114.html
・ HTTP/3 协议 RFC 9114 发布
– Jett
• Shining the Light on Black Basta – NCC Group Research:
https://research.nccgroup.com/2022/06/06/shining-the-light-on-black-basta/
・ NCC Group 对 Black Basta 勒索软件背后攻击者使用的一些技术(TTP)
– Jett
• Exploiting the Wii U’s USB Descriptor parsing:
https://garyodernichts.blogspot.com/2022/06/exploiting-wii-us-usb-descriptor-parsing.html
・ Exploiting the Wii U’s USB Descriptor parsing
– Jett
• 域内特权提升 – 将 Certifried 与 KrbRelay 结合利用:
https://tttang.com/archive/1605/
・ 域内特权提升 – 将 Certifried 与 KrbRelay 结合利用
– lanying37
• [Machine Learning] PopSkipJump: Decision-Based Attack for Probabilistic Classifiers:
https://arxiv.org/abs/2106.07445
・ PopSkipJump: Decision-Based Attack for Probabilistic Classifiers(Paper)
– Jett
• GitHub – Idov31/FunctionStomping: A new shellcode injection technique. Given as C++ header or standalone Rust program.:
https://github.com/Idov31/FunctionStomping
・ FunctionStomping – 类似 Module Stomping 的 Shellcode 注入技术,用于逃逸反病毒软件的检测
– Jett
• CVE-2022-26134 Confluence OGNL RCE 漏洞深入分析和高版本绕过沙箱实现命令回显:
https://mp.weixin.qq.com/s/nCMtSD7QH8ai6fpurJBXTg
・ CVE-2022-26134 Confluence OGNL RCE 漏洞深入分析和高版本绕过沙箱实现命令回显
– Jett
• [Windows] README.md:
https://github.com/mattifestation/AntimalwareBlight
・ AntimalwareBlight – 滥用 Windows Early Launch Antimalware (ELAM) 的防护功能
– Jett
* 查看或搜索历史推送内容请访问:
https://sec.today
* 新浪微博账号:腾讯玄武实验室
https://weibo.com/xuanwulab
原文始发于微信公众号(腾讯玄武实验室):每日安全动态推送(06-07)