每日安全动态推送(03-18)

渗透技巧 2年前 (2022) admin
761 0 0
Tencent Security Xuanwu Lab Daily News


• Abusing Azure Hybrid Workers for Privilege Escalation | Azure Penetration Testing:
https://www.netspi.com/blog/technical/cloud-penetration-testing/abusing-azure-hybrid-workers-for-privilege-escalation/

   ・ Abusing Azure Hybrid Workers for Privilege Escalation – Jett


• Checking your browser before accessing www.bleepingcomputer.com.:
https://www.bleepingcomputer.com/news/security/big-sabotage-famous-npm-package-deletes-files-to-protest-ukraine-war/

   ・ npm “node-ipc” 包开发者发布特殊版本,针对特定地区开发者,删除所有数据文件 – Jett


• [Mitigation] Why is memory safety still a concern?:
https://docs.google.com/presentation/d/1EscMOcMNOwi-bCgOthjiwIXE30w_SeHk3ahjyY0pX10/edit#slide=id.p

   ・ Why is memory safety still a concern – Jett


• [Windows] Windows exploitation:
https://web.archive.org/web/20200510110201/https://fullpwnops.com/windows-exploitation-pathway.html

   ・ Windows 漏洞利用学习系列教程. – lanying37


• Unraveling Assets from Android Apps at Scale:
https://bevigil.com/blog/unraveling-assets-from-android-apps-at-scale/

   ・ 批量探测 Android App 内的数据资产 – Jett


• Analyzing Malware with Hooks, Stomps, and Return-addresses:
https://www.arashparsa.com/catching-a-malware-with-no-name/

   ・ Analyzing Malware with Hooks, Stomps, and Return-addresses – Jett


• Docker又爆出高危逃逸漏洞了?仔细研究下事情没那么简单:
https://tttang.com/archive/1484/

   ・ Docker又爆出高危逃逸漏洞了?仔细研究下事情没那么简单. – lanying37


• ByPassBehinder4J / 冰蝎Java WebShell免杀生成:
https://github.com/Tas9er/ByPassBehinder4J

   ・ 冰蝎Java WebShell免杀生成工具. – lanying37


• [macOS] Jamf Threat Labs identifies Safari vulnerability (CVE-2022-22616) allowing for Gatekeeper bypass:
https://www.jamf.com/blog/jamf-threat-labs-safari-vuln-gatekeeper-bypass/

   ・ Jamf 对前两天修复的 macOS Gatekeeper Bypass(CVE-2022-22616)漏洞的分析 – Jett


• Abusing Arbitrary File Deletes to Escalate Privilege and Other Great Tricks:
https://www.thezdi.com/blog/2022/3/16/abusing-arbitrary-file-deletes-to-escalate-privilege-and-other-great-tricks

   ・ Windows 系统任意文件、目录删除漏洞如何实现 SYSTEM 提权 – Jett


• Application Security Cheat Sheet – cheat-sheets:
https://0xn3va.gitbook.io/cheat-sheets/

   ・ Android 应用开发安全手册 – Jett


• [PDF] https://degrigis.github.io/bins/heapster.pdf:
https://degrigis.github.io/bins/heapster.pdf

   ・ HEAPSTER: Analyzing the Security of Dynamic Allocators for Monolithic Firmware Images(Paper) – Jett


* 查看或搜索历史推送内容请访问:
https://sec.today

* 新浪微博账号:腾讯玄武实验室
https://weibo.com/xuanwulab


原文始发于微信公众号(腾讯玄武实验室):每日安全动态推送(03-18)

版权声明:admin 发表于 2022年3月18日 下午12:33。
转载请注明:每日安全动态推送(03-18) | CTF导航

相关文章

暂无评论

您必须登录才能参与评论!
立即登录
暂无评论...