每日安全动态推送(10-12)
2023-10-12 15:54:37 Author: mp.weixin.qq.com(查看原文) 阅读量:1 收藏

Tencent Security Xuanwu Lab Daily News

• GitHub - chompie1337/Windows_MSKSSRV_LPE_CVE-2023-36802: LPE exploit for CVE-2023-36802:
https://github.com/chompie1337/Windows_MSKSSRV_LPE_CVE-2023-36802

   ・ Windows CVE-2023-36802 本地提权 EXP – WireFish

• Relaying NTLM to MSSQL:
https://blog.compass-security.com/2023/10/relaying-ntlm-to-mssql/

   ・ Relaying NTLM to MSSQL – WireFish

• Using the Windows Server Protocols documentation set to better understand the Active Directory Schema:
https://learn.microsoft.com/en-us/archive/blogs/openspecification/using-the-windows-server-protocols-documentation-set-to-better-understand-the-active-directory-schema

   ・ 通过Windows文档来帮助理解Active Directory – WireFish

• GPU.zip attack in simple terms:
https://kas.pr/bc6q

   ・ 攻击GPU的漏洞,可从可视化系统中窃取机密或者窃取压缩数据 – WireFish

• How I made a heap overflow in curl:
https://daniel.haxx.se/blog/2023/10/11/how-i-made-a-heap-overflow-in-curl/

   ・ curl 堆溢出漏洞分析 – WireFish

• PVS-Studio: static code analyzer:
https://link.medium.com/Xd5W2XZrMDb

   ・ PVS-Studio,静态代码分析器 – WireFish

• HTTP/2 Rapid Reset Vulnerability, CVE-2023-44487 | CISA:
https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487

   ・ HTTP/2 Rapid 重置漏洞,可导致拒绝服务 – WireFish

• SOCKS5 heap buffer overflow:
https://curl.se/docs/CVE-2023-38545.html

   ・ curl SOCKS5 heap buffer overflow – WireFish

• D-Link DAP-X1860: Remote Command Injection:
https://www.redteam-pentesting.de/advisories/rt-sa-2023-006

   ・ D-Link DAP-X1860 WiFi6信号扩展器远程命令注入 – WireFish

• Alex Chapman: How to Be a High-Impact Hacker (Ep. 31):
https://buff.ly/3PLiCmd

   ・ 如何成为一个高影响力的黑客 – WireFish

• An Algorithm to Detect Hosting Providers and their IP Ranges:
https://ipapi.is/blog/detecting-hosting-providers.html

   ・ 检测云服务提供商及其IP段的方法 – WireFish

• MacOS "DirtyNIB" Vulnerability: Let Attackers Execute Malicious Code:
https://gbhackers.com/macos-dirtynib-vulnerability/

   ・ MacOS DirtyNIB 漏洞可导致恶意代码执行 – WireFish

• GitHub - clearbluejar/ghidriff: Python Command-Line Ghidra Binary Diffing Engine:
https://github.com/clearbluejar/ghidriff

   ・ Ghidra 二进制 diff 工具 – WireFish

* 查看或搜索历史推送内容请访问:
https://sec.today

* 新浪微博账号:腾讯玄武实验室
https://weibo.com/xuanwulab


文章来源: https://mp.weixin.qq.com/s?__biz=MzA5NDYyNDI0MA==&mid=2651959380&idx=1&sn=9c50031721b2688d0976680452205882&chksm=8baed0cbbcd959dd134e09e6b933a6399a92ba02802e65ed3a1456d02ba06a3fcd6ef38a0ca1&scene=58&subscene=0#rd
如有侵权请联系:admin#unsafe.sh