Web安全
Python原型链污染变体(prototype-pollution-in-python)
https://tttang.com/archive/1876/
MYSQL JDBC反序列化解析
https://tttang.com/archive/1877/
内网渗透
certsync:转储带有黄金证书的NTDS和UnPAC哈希
https://github.com/zblurx/certsync
ReverseSocks5:用Golang编写的单个可执行反向socks5代理
https://github.com/Acebond/ReverseSocks5
利用VSCode中的签名文件建立反向Shell
https://badoption.eu/docs/blog/2023/01/31/code_c2.html
终端对抗
RToolZ:可以滥用ProcExp152.sys驱动程序转储PPL Lsass,无需调用dbghelp.lib
https://github.com/OmriBaso/RToolZ
NTDLLReflection:基于Windows ReleaseID从远程服务器内存加载反射Ntdll绕过用户态EDR挂钩
https://github.com/TheD1rkMtr/NTDLLReflection
ntdlll-unhooking-collection:基于磁盘、KnownDll、挂起的进程、远程服务器(无文件)绕过NTDLL挂钩
https://github.com/TheD1rkMtr/ntdlll-unhooking-collection
UnhookingPatch:通过修补NT API Stub并在运行时解析SSN和系统调用指令来绕过EDR挂钩
https://github.com/TheD1rkMtr/UnhookingPatch
ETW绕过PoC测试1--关闭你的ProcMon.exe
https://mp.weixin.qq.com/s/AOGWTXxek32AKH2Qw3851w
BypassAV:绕过防病毒和EDR的基本技术概括脑图
https://cmepw.github.io/BypassAV/
https://github.com/CMEPW/BypassAV
import-patching:使用导入函数将代码注入原始PE文件
https://washi.dev/blog/posts/import-patching/
FilelessPELoader:在内存中加载远程AES加密PE,并解密运行
https://github.com/TheD1rkMtr/FilelessPELoader
使用DarkLoadLibrary技术加载DLL
https://github.com/daem0nc0re/TangledWinExec/tree/main/DarkLoadLibrary
D1rkLrd:Shellcode加载器,具有间接动态系统调用实现、MAC格式Shellcode、PEB解析API、Syscall calll和运行解析syscall指令地址功能
https://github.com/TheD1rkMtr/D1rkLrd
HellHall:执行间接清理系统调用
https://github.com/Maldev-Academy/HellHall
微软OneNote可成为新的恶意软件载体
https://marcoramilli.com/2023/02/04/onenote-malware-classification-and-personal-notes/
滥用模拟特权将权限从服务权限提升到System权限的新型Potato武器化
https://github.com/crisprss/RasmanPotato
漏洞相关
将Linux设备驱动程序从C移植到Rust,探索使用不同Rust API的移植变体和漏洞在移植过程中持续存在的可能性
https://research.nccgroup.com/2023/02/06/rustproofing-linux-part-1-4-leaking-addresses/
https://research.nccgroup.com/2023/02/08/rustproofing-linux-part-2-4-race-conditions/
ENLBufferPwn (CVE-2022-47949):任天堂NetworkBuffer UDP Packet缓冲区溢出漏洞
https://github.com/PabloMK7/ENLBufferPwn
CVE-2022-4135:Chrome validating command decoder中的堆缓冲区溢出漏洞
https://googleprojectzero.github.io/0days-in-the-wild//0day-RCAs/2022/CVE-2022-4135.html
CVE-2021-34462: Windows AppXSvc服务逻辑错误漏洞利用分析
https://www.pixiepointsecurity.com/blog/nday-cve-2021-34462.html
云安全
Neo4jection:在真实场景中使用的不同Neo4j攻击和规避技术
https://www.varonis.com/blog/neo4jection-secrets-data-and-cloud-exploits
利用AWS S3原生功能实现数据渗出
https://bleemb.medium.com/data-exfiltration-with-native-aws-s3-features-c94ae4d13436
Docker容器的攻击思路以及防护策略
https://infosecwriteups.com/attacking-and-securing-docker-containers-cc8c80f05b5b
微软Azure 2023年身份安全趋势和解决方案
https://www.microsoft.com/en-us/security/blog/2023/01/26/2023-identity-security-trends-and-solutions-from-microsoft/
其他
已验证安全测试(VST)概念说明:从TTPs迁移到VST
https://www.preludesecurity.com/blog/verified-security-tests-explained
https://github.com/preludeorg/test
PipeViewer:在Windows中查看命名管道详细信息的工具
https://github.com/cyberark/PipeViewer
Microsoft Edge将原生嵌入Acrobat PDF技术
https://blogs.windows.com/msedgedev/2023/02/08/adobe-acrobat-microsoft-edge-pdf/
制作一个可以自毁的USB设备
https://interruptlabs.ca/2023/02/06/I-Built-a-Self-Destructing-USB-Drive-Part-3/
2023年全球网络安全情报风险报告
https://threatmon.io/the-global-cyber-security-intelligence-risk-report-2023/
M01N Team公众号
聚焦高级攻防对抗热点技术
绿盟科技蓝军技术研究战队
官方攻防交流群
网络安全一手资讯
攻防技术答疑解惑
扫码加好友即可拉群
往期推荐