每日安全动态推送(08-26)

渗透技巧 2年前 (2022) admin
609 0 0
Tencent Security Xuanwu Lab Daily News


• psexec原理分析和实现:
https://tttang.com/archive/1710/

   ・ psexec原理分析和实现 – lanying37


• Magnifier: An Experiment with Interactive Decompilation:
https://blog.trailofbits.com/2022/08/25/magnifier-an-experiment-with-interactive-decompilation/

   ・ Magnifier – 交互式反编译工具 – Jett


• Announcing the Open Sourcing of Paranoid’s Library:
http://security.googleblog.com/2022/08/announcing-open-sourcing-of-paranoids.html

   ・ Paranoid – 在项目中检测加密、签名组件是否存在已知漏洞的工具库 – Jett


• Windows System Calls For Hunters:
https://marcoramilli.com/2022/08/23/windows-system-calls-for-hunters/

   ・ 基于 Windows System Calls Trace 的威胁检测 – Jett


• Celer Network cBridge 跨链桥事故真相:BGP 劫持:
https://paper.seebug.org/1948/

   ・ Celer Network cBridge 跨链桥事故真相:BGP 劫持 – lanying37


• Bypassing AppLocker by abusing HashInfo:
https://shells.systems/post-bypassing-applocker-by-abusing-hashinfo/

   ・ Bypassing AppLocker by abusing HashInfo – Jett


• [Tools] 0xrawsec/whids:
https://github.com/0xrawsec/whids

   ・ 为 Windows 开发的开源版本 EDR – Jett


• 2-byte DoS in freebsd-telnetd / netbsd-telnetd / netkit-telnetd / inetutils-telnetd / telnetd in Kerberos Version 5 Applications – Binary Golf Grand Prix 3 – IT Security Research by Pierre:
https://pierrekim.github.io/blog/2022-08-24-2-byte-dos-freebsd-netbsd-telnetd-netkit-telnetd-inetutils-telnetd-kerberos-telnetd.html

   ・ FreeBSD-telnetd, NetBSD-telnetd 等相关组件被发现多个漏洞 – Jett


• 利用 PHP-FPM 做内存马的方法:
https://tttang.com/archive/1720/

   ・ 利用 PHP-FPM 做内存马的方法 – lanying37


• Root Cause of Windows Dirty Pipe:
http://whereisk0shl.top/post/break-me-out-of-sandbox-in-old-pipe-cve-2022-22715-windows-dirty-pipe

   ・ Windows Dirty Pipe CVE-2022-22715 命名管道驱动沙箱逃逸漏洞分析 – Jett


• But You Told Me You Were Safe: Attacking the Mozilla Firefox Sandbox (Part 2):
https://www.zerodayinitiative.com/blog/2022/8/23/but-you-told-me-you-were-safe-attacking-the-mozilla-firefox-renderer-part-2

   ・ Pwn2Own 比赛利用第二个 Prototype Pollution 实现 Render 进程的逃逸 – Jett


• [PDF] https://conference.hitb.org/hitbsecconf2022sin/materials/D1T1%20-%20Erybody%20Gettin%20TIPC%20-%20Demystifying%20Remote%20Linux%20Kernel%20Exploitation%20-%20Sam%20Page.pdf:
https://conference.hitb.org/hitbsecconf2022sin/materials/D1T1%20-%20Erybody%20Gettin%20TIPC%20-%20Demystifying%20Remote%20Linux%20Kernel%20Exploitation%20-%20Sam%20Page.pdf

   ・ Linux 内核远程利用方法和技巧,来自 HITB 会议 – Jett


• [Linux] The linux kernel modules programming:
https://0x00sec.org/t/the-linux-kernel-modules-programming/30639

   ・ linux内核模块编程教程 – lanying37


• Ghidrathon: Snaking Ghidra with Python 3 Scripting:
https://www.mandiant.com/resources/blog/ghidrathon-snaking-ghidra-python-3-scripting

   ・ Ghidrathon – 为 Ghidra 提供 Python3 扩展支持 – Jett


* 查看或搜索历史推送内容请访问:
https://sec.today

* 新浪微博账号:腾讯玄武实验室
https://weibo.com/xuanwulab


原文始发于微信公众号(腾讯玄武实验室):每日安全动态推送(08-26)

版权声明:admin 发表于 2022年8月26日 下午12:45。
转载请注明:每日安全动态推送(08-26) | CTF导航

相关文章

暂无评论

您必须登录才能参与评论!
立即登录
暂无评论...