每日安全动态推送(3-1)

渗透技巧 1年前 (2023) admin
228 0 0
Tencent Security Xuanwu Lab Daily News

• ? CVE-2022-24942 Heap-based buffer overflow in Silicon Labs Gecko SDK (found via automated binary analysis?️) : ReverseEngineering:
https://www.reddit.com/r/ReverseEngineering/comments/11ddyvz/cve202224942_heapbased_buffer_overflow_in_silicon/

   ・ 通过自动化分析发现了Gecko SDK的溢出漏洞。 – Atum


• [Tools, Malware] eBPF: A new frontier for malware:
https://redcanary.com/blog/ebpf-malware/

   ・ 恶意软件开始利用eBPF的一些特性来辅助攻击 – WireFish


• [Report, Malware] The mobile malware threat landscape in 2022:
https://securelist.com/mobile-threat-report-2022/108844/?reseller=usa_regular-sm_acq_ona_smm__onl_b2c_twi_post_sm-team______&utm_source=twitter&utm_medium=social&utm_campaign=us_regular-sm_en0177&utm_content=sm-post&utm_term=us_twitter_organic_1770xhjtaes6ymu

   ・ 卡巴斯基发布了移动平台下的恶意软件全方位的统计报告 – Atum


• [Wireless] Using HDMI radio interference for high-speed data transfer:
https://www.windytan.com/2023/02/using-hdmi-radio-interference-for-high.html

   ・ hdmi的干涉可以被用作侧信道进行数据传输。这个技术可以用于在物理隔离的机器中偷数据。 – Atum


• [Reverse Engineering] Reverse-engineering the ModR/M addressing microcode in the Intel 8086 processor:
http://www.righto.com/2023/02/8086-modrm-addressing.html

   ・ 逆向分析 Intel 8086 处理器的 ModR/M 寻址微码 – WireFish


• 2373 – Arm Mali CSF: kbase_kcpu_command_queue UAF in kbase_csf_kcpu_queue_enqueue() – project-zero:
https://bugs.chromium.org/p/project-zero/issues/detail?id=2373

   ・ 由google project zero研究员发现的Arm Mali CSF UAF漏洞细节。 – P4nda


• [Windows] What is privilege escalation?:
https://blog.securelayer7.net/how-to-exploit-the-windows-wmi-service-isolation-vulnerability/

   ・ 利用 Windows WMI 服务隔离漏洞实现本地权限提升 – keenan


* 查看或搜索历史推送内容请访问:
https://sec.today

* 新浪微博账号:腾讯玄武实验室
https://weibo.com/xuanwulab


原文始发于微信公众号(腾讯玄武实验室):每日安全动态推送(3-1)

版权声明:admin 发表于 2023年3月1日 上午11:13。
转载请注明:每日安全动态推送(3-1) | CTF导航

相关文章

暂无评论

您必须登录才能参与评论!
立即登录
暂无评论...