Tencent Security Xuanwu Lab Daily News
• Open source solution replicates ChatGPT training process! Ready to go with only 1.6GB GPU memory and gives you 7.73 times faster training!:
https://www.hpc-ai.tech/blog/colossal-ai-chatgpt
・ Colossal-AI,开源语言模型,与ChatGPT使用相同的实现,使用个人可以负担得起的资源即可训练
– WireFish
• GitHub – zblurx/dploot: DPAPI looting remotely in Python : netsec:
https://www.reddit.com/r/netsec/comments/1179msr/github_zblurxdploot_dpapi_looting_remotely_in/
・ python重写的DPAPI渗透工具
– WireFish
• [Tools] TrueBot Analysis Part II – Static unpacker:
https://malware.love/malware_analysis/reverse_engineering/2023/02/18/analyzing-truebot-static-unpacking.html
・ TrueBot Analysis Part II – Static unpacker
– lanying37
• CVE-2022-24942 Heap-based buffer overflow in Silicon Labs Gecko SDK:
https://bugprove.com/knowledge-hub/cve-2022-24942-heap-based-buffer-overflow-in-silicon-labs-gecko-sdk/
・ CVE-2022-24942 的 WP。HTTPsReq_HdrParse 函数在拷贝字符串时,没有考虑到长度是否超过了 buffer 的最大可用长度,导致堆溢出。
– keenan
• [Tools, Web] RFC: Override HTTP response headers locally with DevTools · Discussion #4 · ChromeDevTools/rfcs:
https://github.com/ChromeDevTools/rfcs/discussions/4
・ Chrome Devtools的RFC,将允许用户本地覆写http reponse的header。
– Atum
• [Vulnerability] CVE-2022-27677: AMD Ryzen Master Privilege Escalation Vulnerability:
https://securityonline.info/cve-2022-27677-amd-ryzen-master-privilege-escalation-vulnerability/
・ AMD Ryzen Master存在提权漏洞。看描述像installer中的文件提权。
– Atum
• [Tools] Low-Level Software Security for Compiler Developers:
https://llsoftsec.github.io/llsoftsecbook/
・ 面向编译器开发者的安全知识库,包括内存破坏类攻击,侧信道攻击,物理攻击等
– xmzyshypnc
• [CTF] Cyber Challenges for Students!:
https://316ctf.com/
・ Anderson University搭建的CTF平台。
– Atum
• LaMDA: Towards Safe, Grounded, and High-Quality Dialog Models for Everything:
https://ai.googleblog.com/2022/01/lamda-towards-safe-grounded-and-high.html
・ 谷歌版ChatGPT LaMDA的部分细节。
– Atum
* 查看或搜索历史推送内容请访问:
https://sec.today
* 新浪微博账号:腾讯玄武实验室
https://weibo.com/xuanwulab
原文始发于微信公众号(腾讯玄武实验室):每日安全动态推送(2-22)