每日安全动态推送(04-18)

渗透技巧 2年前 (2022) admin
617 0 0
Tencent Security Xuanwu Lab Daily News


• [Android] Bypassing SSL pinning on Android Flutter Apps with Ghidra:
https://link.medium.com/Zavg7E0Oapb

   ・ 利用 Ghidra 分析 Android Flutter 实现 SSL pinning 的过程以及绕过方法 – Jett


• [iOS] Demystifying iOS Code Signature:
https://medium.com/csit-tech-blog/demystifying-ios-code-signature-309d52c2ff1d

   ・ iOS Mach-O 文件的代码签名实现研究 – Jett


• About 7-zip:
https://github.com/kagancapar/CVE-2022-29072

   ・ 7-Zip 应用被发现一个帮助文档查看相关的本地 SYSTEM 提权漏洞 – Jett


• Are We There Yet? Timing and Floating-Point Attacks on Differential Privacy Systems:
https://arxiv.org/abs/2112.05307

   ・ 差分隐私系统实现中的侧信道攻击(Paper) – Jett


• In-Process Patchless AMSI Bypass:
https://ethicalchaos.dev/2022/04/17/in-process-patchless-amsi-bypass/

   ・ In-Process Patchless AMSI Bypass – Jett


• Use-After-Free Exploit in HackSysExtremeVulnerableDriver:
https://sophieboyle.github.io/2022/04/09/HEVD-UAF-Exploit.html

   ・ Windows HEVD 驱动 UAF 漏洞利用的 Writeup – Jett


• [Tools] Abusing LargePageDrivers to copy shellcode into valid kernel modules:
https://vollragm.github.io/posts/abusing-large-page-drivers/

   ・ Abusing LargePageDrivers to copy shellcode into valid kernel modules  – Jett


• Reversing an RPC Vulnerability – CVE-2022-26809 | Patch Analysis:
https://www.youtube.com/watch?v=GGlwy3_jVYE

   ・ Windows RPC 远程代码执行漏洞(CVE-2022-26809)分析视频. – lanying37


• Symbolic Execution For Deobfuscation The Basics:
https://research.openanalysis.net/angr/symbolic%20execution/deobfuscation/research/2022/04/13/symbolic_execution_basics.html

   ・ 基于符号执行技术的代码反混淆 – Jett


• Frida Internal – Part 3: Java Bridge 与 ART hook:
https://evilpan.com/2022/04/17/frida-java/

   ・ Frida Internal – Part 3: Java Bridge 与 ART hook – Jett


* 查看或搜索历史推送内容请访问:
https://sec.today

* 新浪微博账号:腾讯玄武实验室
https://weibo.com/xuanwulab


原文始发于微信公众号(腾讯玄武实验室):每日安全动态推送(04-18)

版权声明:admin 发表于 2022年4月18日 下午12:30。
转载请注明:每日安全动态推送(04-18) | CTF导航

相关文章

暂无评论

您必须登录才能参与评论!
立即登录
暂无评论...