每日安全动态推送(11-13)
2023-11-13 17:18:45 Author: mp.weixin.qq.com(查看原文) 阅读量:1 收藏

Tencent Security Xuanwu Lab Daily News

• EasyEASM: The Zero Dollar Attack Surface Management Tool:
https://securityonline.info/easyeasm-the-zero-dollar-attack-surface-management-tool/

   ・ EasyEASM是一款零成本的攻击面管理工具,可为您的组织提供完整的在线资产视图,并每日扫描并通过Slack或Discord向您发送新发现资产的警报!还能生成Excel风格的风险登记表或资产数据库 – SecTodayBot

• 在通用 Symfony 包中寻找 POP 链(下):
https://paper.seebug.org/3070/

   ・ Symfony doctrine/doctrine-bundle是最常见的Symfony应用程序包之一,但它也成为了一个有趣的反序列化利用目标。了解如何构建有效的POP链和有效负载。 – SecTodayBot

• DUALITY – Advanced Red Team Persistence through Self-Reinfecting DLL Backdoors... - Faisal Tameesh:
https://youtube.com/watch?v=DM23uv4P0EI

   ・ 通过可自我感染的DLL后门,DUALITY实现了高级红队持久性,深入探讨其主要思想和关键特点。 – SecTodayBot

• Credential Theft and Domain Name Hijacking through Phishing Sites - JPCERT/CC Eyes:
https://blogs.jpcert.or.jp/en/2023/11/credential-theft-and-domain-name-hijacking-through-phishing-sites.html

   ・ 描述了一起未经授权的域名转移案例,攻击者利用钓鱼网站窃取管理员凭证并将域名转移到另一个注册商 – SecTodayBot

• (CVE-2023-32530) Trend Micro Apex Central 2019 (<= Build 6016) Authenticated RCE:
https://starlabs.sg/advisories/23/23-32530/

   ・ Trend Micro Apex Central™存在SQL注入漏洞,攻击者可利用该漏洞在服务器上执行任意代码,甚至在最低权限下也能实现远程代码执行。 – SecTodayBot

• GitHub - slowmist/SlowMist-Learning-Roadmap-for-Becoming-a-Smart-Contract-Auditor: Smart contract audit skills roadmap for beginners, auditors, engineers, etc.:
https://github.com/slowmist/SlowMist-Learning-Roadmap-for-Becoming-a-Smart-Contract-Auditor

   ・ 总结了智能合约安全审计师所需的技能图谱,旨在列举智能合约安全审计所需的基本技能,并激励团队成员采用研究、创新和工程演进的思维方式。 – SecTodayBot

• Apache UIMA Java SDK Vulnerability (CVE-2023-39913): Potential Untrusted Code Execution:
https://securityonline.info/cve-2023-39913-apache-uima-java-sdk-vulnerability/

   ・ Apache UIMA Java SDK存在漏洞(CVE-2023-39913),可能导致任意代码执行。 – SecTodayBot

• Malware Unpacking With Hardware Breakpoints - Cobalt Strike Example:
https://embee-research.ghost.io/unpacking-malware-with-hardware-breakpoints-cobalt-strike

   ・ 介绍了使用硬件断点进行恶意软件解包的方法,通过调试器(x64dbg)和静态分析工具(Ghidra)完成完整分析,详细讲解了如何获取解码后的Shellcode以及使用Ghidra手动定位Shellcode和解密密钥的方法。 – SecTodayBot

• Introducing broad C/C++ vulnerability management support:
https://osv.dev/blog/posts/introducing-broad-c-c++-support/

   ・ OSV-Scanner针对Go和Rust的调用图分析、向数据库添加了六个新生态系统以及扩展了C/C++漏洞访问权限的determineversion API。这将使得软件的C和C++依赖的漏洞管理成为可能。 – SecTodayBot

• Parsing the msDS-KeyCredentialLink value for ShadowCredentials attack:
https://podalirius.net/en/articles/parsing-the-msds-keycredentiallink-value-for-shadowcredentials-attack/

   ・ 了解ShadowCredentials攻击中的msDS-KeyCredentialLink值的解析方法,该值存储用于机器账户认证的证书,攻击者可以利用此技术获取未授权访问资源的权限。 – SecTodayBot

• A Tale of 2 Vulnerability Disclosures:
https://projectblack.io/blog/a-tale-of-2-vulnerability-disclosures/

   ・ 这篇文章讲述了两个漏洞披露的故事,一个是成功的案例,另一个则是最糟糕的经历,强调了漏洞披露的重要性和正确的做法。 – SecTodayBot

• GitHub - fransr/unpack-burp: For unpacking base64:ed "Save items"-content from Burp (From search + proxy history):
https://github.com/fransr/unpack-burp

   ・ 用于解码Burp中base64编码的“保存项目”内容,可以提取请求的特定部分,如从请求体中提取所有参数、获取响应头为X的所有请求体、收集浏览的JavaScript文件并在本地合并为一个大的JS文件进行美化,以及基于所有响应和/或请求参数/头创建字典列表。 – SecTodayBot

• Confluence 漏洞 (CVE-2023-22515) 及 Atlassian Bamboo 分析研究:
https://paper.seebug.org/3071/

   ・ 最近披露了Confluence的一个漏洞SafeParameterFilter,允许未经身份验证的远程攻击者创建新的管理用户帐户。同时还研究了Atlassian Bamboo是否存在类似的问题。 – SecTodayBot

• Researchers Uncover Undetectable Crypto Mining Technique on Azure Automation:
https://thehackernews.com/2023/11/researchers-uncover-undetectable-crypto.html

   ・ 网络安全研究人员开发出了一种利用微软Azure自动化服务进行加密货币挖矿的方法,而且不会产生任何费用和引起注意,这是首次实现的。 – SecTodayBot

* 查看或搜索历史推送内容请访问:
https://sec.today

* 新浪微博账号:腾讯玄武实验室
https://weibo.com/xuanwulab


文章来源: https://mp.weixin.qq.com/s?__biz=MzA5NDYyNDI0MA==&mid=2651959420&idx=1&sn=ecd78ee5d6109be2ece20f4c5f9fd205&chksm=8baed0e3bcd959f5ac5a6251d383b3d1bc0249048ac7a08d8d59f34573d260b1822e9e425f74&scene=58&subscene=0#rd
如有侵权请联系:admin#unsafe.sh