第一周/20211101红队推送
2021-11-1 23:26:7 Author: mp.weixin.qq.com(查看原文) 阅读量:0 收藏


【漏洞研究】

WordPress TaxoPress3.0.7.1存储型XSS

https://cxsecurity.com/issue/WLB-2021100097

Gitlab RCE(CVE-2021-22205)

https://security.humanativaspa.it/gitlab-ce-cve-2021-22205-in-the-wild/

Hikvision Web Server Build 210702 Command Injection

https://cxsecurity.com/issue/WLB-2021100098

Zeno - THM Writeup (Abusing service file misconfigurations)

https://infosecwriteups.com/zeno-thm-writeup-abusing-service-file-misconfigurations-3dd8ac94be24

SPA Cart CMS - 多个SQL注入

https://seclists.org/fulldisclosure/2021/Oct/35

PHP Melody v3.0 - 多个跨站漏洞

https://seclists.org/fulldisclosure/2021/Oct/38

【红队文章】

紫队如何评估网络威胁和风险

https://infosecwriteups.com/purple-team-operations-part-1-how-to-assess-cyber-threats-and-risk-for-your-organization-30bcdbe01ca9

Chrome沙盒逃逸

https://securitylab.github.com/research/one_day_short_of_a_fullchain_sbx/

走进真实世界的漏洞利用链

https://github.blog/2021-03-24-real-world-exploit-chains-explained/

【红队工具】

InlineExecute-assembl: Cobaltstrike BOF (.NET)

https://github.com/anthemtotheego/InlineExecute-Assembly

Inject-amsiBypass:Cobalt Strike BOF(AMSI Bypass)

https://github.com/boku7/injectAmsiBypass

Mediator: 一个架构新颖的端对端加密反向Shell

https://www.kitploit.com/2021/10/mediator-extensible-end-to-end.html?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+PentestTools+%28PenTest+Tools%29

GPOwned: GPO利用套件

https://github.com/X-C3LL/GPOwned

ObfuscateP: 用于C++编译时混淆字符串

https://github.com/killvxk/ObfuscateP

Webdiscover:Web枚举自动化

https://www.kitploit.com/2021/10/webdiscover-purpose-of-this-script-is.html?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+PentestTools+%28PenTest+Tools%29

Azure Outlook C2

https://github.com/boku7/azureOutlookC2


更多详情请查看原文


文章来源: https://mp.weixin.qq.com/s?__biz=MzIxMjI0Mzk0OQ==&mid=2247483729&idx=1&sn=11982d2f68e8161ffa81125dabf3b1b6&chksm=974845d3a03fccc561e9fa47706f1afd51809398d613e233398bc923489c0d06a150205a2e9c&scene=58&subscene=0#rd
如有侵权请联系:admin#unsafe.sh