每日安全动态推送(2-8)

渗透技巧 2年前 (2023) admin
387 0 0
Tencent Security Xuanwu Lab Daily News

• [Wireless] A Survey of Bluetooth Vulnerabilities Trends (2023 Edition):
https://i5c.us/d29522

   ・ 蓝牙漏洞趋势预测。近几年蓝牙漏洞的数量呈上升趋势。 – keenan


• [Tools] BypassAV:
https://github.com/CMEPW/BypassAV

   ・ 一个如何绕过Antivirus的知识思维导图。 – Atum


• [Tools] Attacking and securing Docker containers:
https://infosecwriteups.com/attacking-and-securing-docker-containers-cc8c80f05b5b?source=rss—-7b722bfd1b8d—4

   ・ 常见的 Docker 攻防策略,通俗易懂。 – ThomasonZhao


• Discovering a weakness leading to a partial bypass of the login rate limiting in the AWS Console : netsec:
https://www.reddit.com/r/netsec/comments/10w5prw/discovering_a_weakness_leading_to_a_partial/

   ・ AWS Console的身份认证次数限制存在缺陷,通过多线程即可提升密码爆破速度。 – keenan


• [Network] Cloudflare’s handling of a bug in interpreting IPv4-mapped IPv6 addresses:
https://blog.cloudflare.com/cloudflare-handling-bug-interpreting-ipv4-mapped-ipv6-addresses/

   ・ 一个很有趣的漏洞,由于golang库和cloudflare黑名单机制的共同问题,导致了cloudflare的worker可以通过构造一个由IPv4扩展而来的IPv6地址来进行SSRF。 – Atum


• r/netsec – NETGEAR Nighthawk upnpd Pre-authentication Buffer Overflow:
https://www.reddit.com/r/netsec/comments/10vy3iq/netgear_nighthawk_upnpd_preauthentication_buffer/

   ・ Netgear R7000P router的upnpd server存在栈溢出漏洞,原因是sprintf的输出buffer长度没有检查。 – keenan


• [Android] Converting Your Android Smartphone into Penetration Testing Device:
https://gbhackers.com/use-android-penetration-testing/

   ・ 讲了如何将Android手机打造成渗透测试的实验设备,并在上面安装nmap,bettercap等工具。 – Atum


• I Built a Self-Destructing USB Drive Part 3:
https://interruptlabs.ca/2023/02/06/I-Built-a-Self-Destructing-USB-Drive-Part-3/

   ・ 讲述如何构建一个自毁的USB设备 – Atum


* 查看或搜索历史推送内容请访问:
https://sec.today

* 新浪微博账号:腾讯玄武实验室
https://weibo.com/xuanwulab


原文始发于微信公众号(腾讯玄武实验室):每日安全动态推送(2-8)

版权声明:admin 发表于 2023年2月8日 下午12:08。
转载请注明:每日安全动态推送(2-8) | CTF导航

相关文章

暂无评论

您必须登录才能参与评论!
立即登录
暂无评论...