每日安全动态推送(06-07)

渗透技巧 2年前 (2022) admin
671 0 0
Tencent Security Xuanwu Lab Daily News


• Follina Microsoft Office RCE with MS-MSDT Protoco:
https://paper.seebug.org/1911/

   ・ Follina Microsoft Office RCE with MS-MSDT Protoco – lanying37


• [Windows] Defeating Windows ASLR via low-entropy shared libraries in 2 hours:
https://link.medium.com/PgyApAujDqb

   ・ Defeating Windows ASLR via 32-bit Share Library – Jett


• 5.2. Connection Shutdown:
https://www.rfc-editor.org/rfc/rfc9114.html

   ・ HTTP/3 协议 RFC 9114 发布 – Jett


• Shining the Light on Black Basta – NCC Group Research:
https://research.nccgroup.com/2022/06/06/shining-the-light-on-black-basta/

   ・ NCC Group 对 Black Basta 勒索软件背后攻击者使用的一些技术(TTP) – Jett


• Exploiting the Wii U’s USB Descriptor parsing:
https://garyodernichts.blogspot.com/2022/06/exploiting-wii-us-usb-descriptor-parsing.html

   ・ Exploiting the Wii U’s USB Descriptor parsing – Jett


• 域内特权提升 – 将 Certifried 与 KrbRelay 结合利用:
https://tttang.com/archive/1605/

   ・ 域内特权提升 – 将 Certifried 与 KrbRelay 结合利用  – lanying37


• [Machine Learning] PopSkipJump: Decision-Based Attack for Probabilistic Classifiers:
https://arxiv.org/abs/2106.07445

   ・ PopSkipJump: Decision-Based Attack for Probabilistic Classifiers(Paper) – Jett


• GitHub – Idov31/FunctionStomping: A new shellcode injection technique. Given as C++ header or standalone Rust program.:
https://github.com/Idov31/FunctionStomping

   ・ FunctionStomping – 类似 Module Stomping 的 Shellcode 注入技术,用于逃逸反病毒软件的检测 – Jett


• CVE-2022-26134 Confluence OGNL RCE 漏洞深入分析和高版本绕过沙箱实现命令回显:
https://mp.weixin.qq.com/s/nCMtSD7QH8ai6fpurJBXTg

   ・ CVE-2022-26134 Confluence OGNL RCE 漏洞深入分析和高版本绕过沙箱实现命令回显 – Jett


• [Windows] README.md:
https://github.com/mattifestation/AntimalwareBlight

   ・ AntimalwareBlight – 滥用 Windows Early Launch Antimalware (ELAM) 的防护功能 – Jett


* 查看或搜索历史推送内容请访问:
https://sec.today

* 新浪微博账号:腾讯玄武实验室
https://weibo.com/xuanwulab


原文始发于微信公众号(腾讯玄武实验室):每日安全动态推送(06-07)

版权声明:admin 发表于 2022年6月7日 下午12:01。
转载请注明:每日安全动态推送(06-07) | CTF导航

相关文章

暂无评论

您必须登录才能参与评论!
立即登录
暂无评论...