每日安全动态推送(02-16)

渗透技巧 2年前 (2022) admin
683 0 0
Tencent Security Xuanwu Lab Daily News


• AD CS: from ManageCA to RCE – BlackArrow:
https://www.blackarrow.net/ad-cs-from-manageca-to-rce/

   ・ AD CS: from ManageCA to RCE – BlackArrow – Jett


• Athena:
https://github.com/MythicAgents/Athena

   ・ 基于 .NET 6 写的跨平台 Mythic Agent – Jett


• Hunting for bugs in VMware: View Planner and vRealize Business for Cloud:
https://swarm.ptsecurity.com/hunting-for-bugs-in-vmware-view-planner-and-vrealize-business-for-cloud/

   ・ VMware View Planner、vRealize Business for Cloud unauth RCE – Jett


• CVE-2021-44521: RCE Vulnerability in Apache Cassandra:
https://jfrog.com/blog/cve-2021-44521-exploiting-apache-cassandra-user-defined-functions-for-remote-code-execution/

   ・ CVE-2021-44521: RCE Vulnerability in Apache Cassandra – Jett


• [Browser] Chrome Zero-Day Under Active Attack: Patch ASAP:
https://threatpost.com/google-chrome-zero-day-under-attack/178428/

   ・ Chrome 发布版本更新,本次更新修复了一个野外被攻击的漏洞 – Jett


• [Tools] Static Taint Analysis using Binary Ninja: A Case Study of MySQL Cluster Vulnerabilities:
https://www.zerodayinitiative.com/blog/2022/2/14/static-taint-analysis-using-binary-ninja-a-case-study-of-mysql-cluster-vulnerabilities

   ・ 利用 Binary Ninja 的静态污点分析功能挖掘 MySQL Cluster 的漏洞 – Jett


• Object Overloading:
https://blog.xpnsec.com/object-overloading/

   ・ 利用 Object Overloading 技术,向 Windows Built-in 进程注入代码绕过 EDR 的检测 – Jett


• [Tools] ?? Gaining the upper hand(le):
https://aptw.tf/2022/02/10/leaked-handle-hunting.html

   ・ Gaining the upper hand(le) – 利用 Low-IL 进程中残留的敏感 handle 提权或 Bypass UAC – Jett


• RedLine Stealer 伪装成 Windows 11 更新程序,窃取用户信息:
http://paper.seebug.org/1831/

   ・ RedLine Stealer 伪装成 Windows 11 更新程序,窃取用户信息. – lanying37


* 查看或搜索历史推送内容请访问:
https://sec.today

* 新浪微博账号:腾讯玄武实验室
https://weibo.com/xuanwulab


原文始发于微信公众号(腾讯玄武实验室):每日安全动态推送(02-16)

版权声明:admin 发表于 2022年2月16日 上午4:15。
转载请注明:每日安全动态推送(02-16) | CTF导航

相关文章

暂无评论

您必须登录才能参与评论!
立即登录
暂无评论...