每日安全动态推送(07-04)

渗透技巧 2年前 (2022) admin
457 0 0
Tencent Security Xuanwu Lab Daily News


• libmagic: The Blathering:
https://blog.trailofbits.com/2022/07/01/libmagic-the-blathering/

   ・ PolyFile – Trail of Bits 开源的文件格式识别工具,保护对混合、内嵌文件格式的识别 – Jett


• [Android, Malware] Flubot: the evolution of a notorious Android Banking Malware:
https://blog.fox-it.com/2022/06/29/flubot-the-evolution-of-a-notorious-android-banking-malware/

   ・ Android 银行恶意软件 Flubot 的进化 – Jett


• Let’s talk about Kubernetes on the Internet:
https://raesene.github.io/blog/2022/07/03/lets-talk-about-kubernetes-on-the-internet/

   ・ 扫描网络上暴露的 Kubernetes clusters – Jett


• nday exploit: netgear orbi unauthenticated command injection (cve-2020-27861):
https://blog.coffinsec.com//research/2022/07/02/orbi-nday-exploit-cve-2020-27861.html

   ・ netgear orbi unauth 命令注入漏洞的分析和利用(CVE-2020-27861) – Jett


• Building a SAST program at Razorpay’s scale | Razorpay Engineering:
https://engineering.razorpay.com/building-a-sast-program-at-razorpays-scale-719887fe0aec

   ・ 构建一个静态源码安全分析工具(SAST) – Jett


• Bulk Analysis of Cobalt Strike’s Beacon Configurations:
https://www.archcloudlabs.com/projects/bulk-cs-analysis/

   ・ 对超过 11 万条 Cobalt Strike Beacon payloads 数据的分析 – Jett


• spiderSilk:
https://spidersilk.com/news/Its-Been-Zero-Days-Since-BIND9-Crashed

   ・ spiderSilk 团队通过扫描发现,48% 的 BIND9 DNS 服务依然没有修复 CVE-2021-25220 漏洞 – Jett


• [PDF] https://i.blackhat.com/Asia-22/Friday-Materials/AS-22-Korkos-AMSI-and-Bypass.pdf:
https://i.blackhat.com/Asia-22/Friday-Materials/AS-22-Korkos-AMSI-and-Bypass.pdf

   ・ Windows AMSI Bypass 技术研究 – Jett


• Revisiting Pegasus on iOS9:
https://shadowfile.inode.link/blog/2022/07/revisiting-pegasus-on-ios9/

   ・ Revisiting Pegasus on iOS 9,NSO Group 的 Pegasus iOS 利用链的分析 – Jett


* 查看或搜索历史推送内容请访问:
https://sec.today

* 新浪微博账号:腾讯玄武实验室
https://weibo.com/xuanwulab


原文始发于微信公众号(腾讯玄武实验室):每日安全动态推送(07-04)

版权声明:admin 发表于 2022年7月4日 下午12:21。
转载请注明:每日安全动态推送(07-04) | CTF导航

相关文章

暂无评论

您必须登录才能参与评论!
立即登录
暂无评论...