每日安全动态推送(01-25)

渗透技巧 2年前 (2022) admin
656 0 0
Tencent Security Xuanwu Lab Daily News


• 复现基于eBPF实现的Docker逃逸:
https://drivertom.blogspot.com/2022/01/ebpfdocker.html

   ・ 复现基于 eBPF 实现的 Docker 逃逸 – Jett


• Paranoids’ Vulnerability Research: PrinterLogic Issues Security Alert:
https://www.yahooinc.com/paranoids/paranoids-vulnerability-research-printerlogic-issues-security-alert/

   ・ 企业打印机管理软件 PrinterLogic 被发现多个 RCE 高危漏洞 – Jett


• [Tools] How to Read Source and Fuzzing:
https://github.com/hardik05/Source-and-Fuzzing

   ・ 如何阅读源码与模糊测试方法学习资料。 – lanying37


• CVE-2021-33742:Internet Explorer MSHTML 堆越界写漏洞分析:
http://paper.seebug.org/1819/

   ・ CVE-2021-33742:Internet Explorer MSHTML 堆越界写漏洞分析. – lanying37


• JavaScript Raider::
https://github.com/freingruber/JavaScript-Raider

   ・ JavaScript Raider – JavaScript Fuzzing framework for v8 – Jett


• Scammers are creating new fraudulent Crypto Tokens and misconfiguring smart contract’s to steal funds:
https://research.checkpoint.com/2022/scammers-are-creating-new-fraudulent-crypto-tokens-and-misconfiguring-smart-contracts-to-steal-funds/

   ・ Check Point 发现,近期有网络诈骗人员利用假 Token 从受害者智能合约中窃取钱财 – Jett


• Qiling Sandbox Escape:
https://www.kalmarunionen.dk/writeups/2022/rwctf/qlaas/

   ・ Realworld CTF 比赛中 Qiling Sandbox Escape 题的 writeup – Jett


• RealWorld CTF 4th Writeup by r3kapig:
https://mp.weixin.qq.com/s?__biz=MzI2MDE4MzkzMQ==&mid=2247483688&idx=1&sn=06d1bbdeb3d86ec548358dacfa0cce7f

   ・ r3kapig 战队写的 RealWorld CTF 比赛 writeup – Jett


• Cobalt Strike, a Defender’s Guide – Part 2:
https://thedfirreport.com/2022/01/24/cobalt-strike-a-defenders-guide-part-2/

   ・ Cobalt Strike, a Defender’s Guide – Part 2 – lanying37


• [Tools] Release v1.4.9 · BishopFox/sliver:
https://github.com/BishopFox/sliver/releases/tag/v1.4.9

   ・ Sliver – 攻击行为模拟框架 – Jett


• ASP.NET下的内存马(1) filter内存马:
https://tttang.com/archive/1408/

   ・ ASP.NET下的内存马(1) filter内存马分析. – lanying37


• CVE-2021-33742:Internet Explorer MSHTML堆越界写漏洞分析:
http://blog.topsec.com.cn/cve-2021-33742-analysis_of_internet_explorer_mshtml_heap_out-of-bounds_write_vulnerability/

   ・ CVE-2021-33742:Internet Explorer MSHTML堆越界写漏洞分析 – Jett


* 查看或搜索历史推送内容请访问:
https://sec.today

* 新浪微博账号:腾讯玄武实验室
https://weibo.com/xuanwulab


原文始发于微信公众号(腾讯玄武实验室):每日安全动态推送(01-25)

版权声明:admin 发表于 2022年1月25日 上午4:15。
转载请注明:每日安全动态推送(01-25) | CTF导航

相关文章

暂无评论

您必须登录才能参与评论!
立即登录
暂无评论...