Tencent Security Xuanwu Lab Daily News
• Abusing Azure Hybrid Workers for Privilege Escalation | Azure Penetration Testing:
https://www.netspi.com/blog/technical/cloud-penetration-testing/abusing-azure-hybrid-workers-for-privilege-escalation/
・ Abusing Azure Hybrid Workers for Privilege Escalation
– Jett
• Checking your browser before accessing www.bleepingcomputer.com.:
https://www.bleepingcomputer.com/news/security/big-sabotage-famous-npm-package-deletes-files-to-protest-ukraine-war/
・ npm “node-ipc” 包开发者发布特殊版本,针对特定地区开发者,删除所有数据文件
– Jett
• [Mitigation] Why is memory safety still a concern?:
https://docs.google.com/presentation/d/1EscMOcMNOwi-bCgOthjiwIXE30w_SeHk3ahjyY0pX10/edit#slide=id.p
・ Why is memory safety still a concern
– Jett
• [Windows] Windows exploitation:
https://web.archive.org/web/20200510110201/https://fullpwnops.com/windows-exploitation-pathway.html
・ Windows 漏洞利用学习系列教程.
– lanying37
• Unraveling Assets from Android Apps at Scale:
https://bevigil.com/blog/unraveling-assets-from-android-apps-at-scale/
・ 批量探测 Android App 内的数据资产
– Jett
• Analyzing Malware with Hooks, Stomps, and Return-addresses:
https://www.arashparsa.com/catching-a-malware-with-no-name/
・ Analyzing Malware with Hooks, Stomps, and Return-addresses
– Jett
• Docker又爆出高危逃逸漏洞了?仔细研究下事情没那么简单:
https://tttang.com/archive/1484/
・ Docker又爆出高危逃逸漏洞了?仔细研究下事情没那么简单.
– lanying37
• ByPassBehinder4J / 冰蝎Java WebShell免杀生成:
https://github.com/Tas9er/ByPassBehinder4J
・ 冰蝎Java WebShell免杀生成工具.
– lanying37
• [macOS] Jamf Threat Labs identifies Safari vulnerability (CVE-2022-22616) allowing for Gatekeeper bypass:
https://www.jamf.com/blog/jamf-threat-labs-safari-vuln-gatekeeper-bypass/
・ Jamf 对前两天修复的 macOS Gatekeeper Bypass(CVE-2022-22616)漏洞的分析
– Jett
• Abusing Arbitrary File Deletes to Escalate Privilege and Other Great Tricks:
https://www.thezdi.com/blog/2022/3/16/abusing-arbitrary-file-deletes-to-escalate-privilege-and-other-great-tricks
・ Windows 系统任意文件、目录删除漏洞如何实现 SYSTEM 提权
– Jett
• Application Security Cheat Sheet – cheat-sheets:
https://0xn3va.gitbook.io/cheat-sheets/
・ Android 应用开发安全手册
– Jett
• [PDF] https://degrigis.github.io/bins/heapster.pdf:
https://degrigis.github.io/bins/heapster.pdf
・ HEAPSTER: Analyzing the Security of Dynamic Allocators for Monolithic Firmware Images(Paper)
– Jett
* 查看或搜索历史推送内容请访问:
https://sec.today
* 新浪微博账号:腾讯玄武实验室
https://weibo.com/xuanwulab
原文始发于微信公众号(腾讯玄武实验室):每日安全动态推送(03-18)