Tencent Security Xuanwu Lab Daily News
• [Web] Abusing HTTP hop-by-hop request headers – My Blog:
https://nathandavison.com/blog/abusing-http-hop-by-hop-request-headers
・ HTTP/1.1 协议中的 hop-by-hop 类型 Header 及相关的安全问题
– Jett
• F5 iControl REST Endpoint Authentication Bypass Technical Deep Dive:
https://www.horizon3.ai/f5-icontrol-rest-endpoint-authentication-bypass-technical-deep-dive/
・ BIG-IP iControl REST 认证绕过 RCE 漏洞的分析(CVE-2022-1388)
– Jett
• slides/Zer0Con_2022_Tales_from_the_iOS_macOS_Kernel_Trenches.pdf:
https://github.com/potmdehex/slides/blob/main/Zer0Con_2022_Tales_from_the_iOS_macOS_Kernel_Trenches.pdf
・ Zer0Con 2022 会议 ”Tales from the iOS/macOS Kernel Trenches“ 的 Slides
– Jett
• rusty-memory-loadlibrary:
https://github.com/malware-unicorn/rusty-memory-loadlibrary
・ Rust 语言编写的将内存中的 DLL 注入远程进程的工具
– Jett
• [Tools] 获取域控权限的几种思路:
https://github.com/JDArmy/GetDomainAdmin
・ 获取域控权限的几种思路总结
– lanying37
• Learning Linux kernel exploitation – Part 2 – CVE-2022-0847:
https://0x434b.dev/learning-linux-kernel-exploitation-part-2-cve-2022-0847/
・ Linux 内核 DirtyPipe(CVE-2022-0847)漏洞利用实战
– Jett
• JBoss EAP/as <= 6.* RCE 及 rpc 回显:
https://paper.seebug.org/1891/
・ JBoss EAP/as <= 6.* RCE 及 rpc 回显
– lanying37
• Ransomware-as-a-service: Understanding the cybercrime gig economy and how to protect yourself:
https://www.microsoft.com/security/blog/2022/05/09/ransomware-as-a-service-understanding-the-cybercrime-gig-economy-and-how-to-protect-yourself/
・ 勒索软件生态中越来越多的出现 Ransomware-as-a-service
– Jett
• Musl 程序分析和调试环境配置 && 部分源码分析:
https://tttang.com/archive/1582/
・ Musl 程序分析和调试环境配置 && 部分源码分析
– lanying37
* 查看或搜索历史推送内容请访问:
https://sec.today
* 新浪微博账号:腾讯玄武实验室
https://weibo.com/xuanwulab
原文始发于微信公众号(腾讯玄武实验室):每日安全动态推送(05-10)