每日安全动态推送(9-5)
2023-9-5 14:54:35 Author: mp.weixin.qq.com(查看原文) 阅读量:2 收藏

Tencent Security Xuanwu Lab Daily News

• Better Random Numbers for Javascript:
https://github.com/nquinlan/better-random-numbers-for-javascript-mirror

   ・ 为什么 Math.random 不应该用于生产环境的编程 – SecTodayBot

• Old bug, shallow bug: Exploiting Ubuntu at Pwn2Own Vancouver 2023:
https://www.synacktiv.com/publications/old-bug-shallow-bug-exploiting-ubuntu-at-pwn2own-vancouver-2023

   ・ 在 Pwn2Own 温哥华 2023 上利用 Ubuntu:本地权限升级(CVE-2023-35001,Linux 内核中已有 9 年历史的漏洞) – SecTodayBot

• AtlasReaper: reconnaissance of Confluence and Jira:
https://securityonline.info/atlasreaper-reconnaissance-of-confluence-and-jira/

   ・ AtlasReaper 是一款为进攻性安全目的而开发的命令行工具,主要专注于 Confluence 和 Jira 的侦察。它还提供了各种有助于完成凭证获取和社会工程等任务的功能。 – SecTodayBot

• VMWare Aria Operations For Networks Static SSH Key RCE CVE-2023-34039:
https://summoning.team/blog/vmware-vrealize-network-insight-rce-cve-2023-34039/

   ・ 由于缺乏唯一加密密钥生成而导致的 VMware Aria Operations for Networks 静态 SSH 密钥身份验证绕过 RCE 漏洞 – SecTodayBot

• Multiple Splunk Enterprise Flaws Let Attackers Execute Arbitrary Code:
https://gbhackers.com/multiple-splunk-enterprise-flaws/

   ・ Splunk Enterprise 存在多个漏洞,可能导致跨站点脚本 (XSS)、拒绝服务 (DoS)、远程代码执行、权限提升和路径遍历。 – SecTodayBot

• BitLocker, TPM and Pluton | What Are They and How Do They Work:
https://github.com/HotCakeX/Harden-Windows-Security/wiki/BitLocker,-TPM-and-Pluton-%7C--What-Are-They-and-How-Do-They-Work

   ・ BitLocker、TPM 和 Pluton:关于物理入侵和物理攻击防护模式和方法的论述 – SecTodayBot

• Red Team Tactics: Writing Windows Kernel Drivers for Advanced Persistence (Part 2):
https://v3ded.github.io/redteam/red-team-tactics-writing-windows-kernel-drivers-for-advanced-persistence-part-2

   ・ Windows 过滤平台 (WFP) 以及如何使用它通过驱动程序处理网络数据包。 – SecTodayBot

• 2023 APT Landscape Unveiled: Trends, Challenges, Solutions:
https://kas.pr/61qm

   ・ 2023 年 APT 格局揭晓:卡巴斯基介绍的趋势、挑战和解决方案 – SecTodayBot

• Introducing Session Hijacking Visual Exploitation (SHVE): An Innovative Open-Source Tool for XSS Exploitation:
https://blog.doyensec.com//2023/08/31/introducing-session-hijacking-visual-exploitation.html

   ・ 会话劫持视觉利用(SHVE)提供了一种劫持受害者浏览器会话的新颖方法,通过 XSS 或恶意网页挂钩后将其用作视觉代理 – SecTodayBot

* 查看或搜索历史推送内容请访问:
https://sec.today

* 新浪微博账号:腾讯玄武实验室
https://weibo.com/xuanwulab


文章来源: https://mp.weixin.qq.com/s?__biz=MzA5NDYyNDI0MA==&mid=2651959344&idx=1&sn=aa5bb4e1ed1fffd383973c1bbbb70b90&chksm=8baed0afbcd959b99b6a0ad45ef3312fdc0c43ddb144cbb89f18c6fc79fb82d3656efae4a63c&scene=58&subscene=0#rd
如有侵权请联系:admin#unsafe.sh