每日安全动态推送(12-20)
2023-12-20 18:26:42 Author: mp.weixin.qq.com(查看原文) 阅读量:2 收藏

Tencent Security Xuanwu Lab Daily News

• Let Me Manage Your AppDomain:
https://ipslav.github.io/2023-12-12-let-me-manage-your-appdomain/

   ・ 该文章介绍了一种新的技术,可以在.NET Framework应用程序中植入后门并在目标应用程序进程内执行任意代码。 – SecTodayBot

• Some tips to earn your first bounty find XSS,Blind-XSS,SQLI,SSRF,LFI,LOG4J using some handy tools:
https://medium.com/@Alra3ees/some-tips-to-earn-your-first-bounty-find-xss-blind-xss-sqli-ssrf-lfi-log4j-using-some-handy-tools-2ae31afeae1a

   ・ 介绍了一些有用的自动化工具和方法,用于发现XSS、Blind-XSS、SQLI、SSRF、LFI、LOG4J漏洞。  – SecTodayBot

• New Hacker Group Uses SQL Injection to Hack Companies in APAC Region:
https://cybersecuritynews.com/hacker-group-uses-sql-injection/

   ・ 露了一个名为“GambleForce”的新威胁行为者利用SQL注入攻击获取对APAC地区组织的未经授权访问。文章详细分析了该威胁行为者使用的工具、攻击方法以及相关信息 – SecTodayBot

• Abusing Liftoff assembly and efficiently escaping from sbx:
https://retr0.zip/blog/abusing-Liftoff-assembly-and-efficiently-escaping-from-sbx.html

   ・ 该文章介绍了Chrome引擎实施的新的缓解措施和V8沙盒项目 – SecTodayBot

• Poisoned AI Coding, Assistant Tools Opens Application To Hack Attack:
https://gbhackers.com/poisoned-ai-coding/

   ・ 人工智能编程助手工具在软件工程领域的革命性影响,然而存在毒化风险。研究揭示了攻击者如何通过操纵模型注入恶意代码片段 – SecTodayBot

• HTB: Coder:
https://0xdf.gitlab.io/2023/12/16/htb-coder.html

   ・ 该文章涉及了对一个HTB: Coder的渗透过程,其中包括了对漏洞的利用、逆向工程、解密和新方法的讨论。文章详细分析了CVE-2022-26923漏洞的根本原因,并提供了利用这一漏洞的漏洞利用工具 – SecTodayBot

• Mobile Malware Analysis Part 6 – Xenomorph:
https://8ksec.io/mobile-malware-analysis-part-6-xenomorph/

   ・ 论了分析最新威胁和加固网络安全防御的相关内容,重点解剖了Xenomorph恶意软件及其混淆代码的复杂性 – SecTodayBot

• I scanned every package on PyPi and found 57 live AWS keys:
https://tomforb.es/blog/aws-keys-on-pypi/

   ・ 介绍了作者如何扫描PyPi以查找泄漏的AWS密钥,并开发了一个工具来自动扫描并通知AWS可能泄漏的密钥。  – SecTodayBot

* 查看或搜索历史推送内容请访问:
https://sec.today

* 新浪微博账号:腾讯玄武实验室
https://weibo.com/xuanwulab


文章来源: https://mp.weixin.qq.com/s?__biz=MzA5NDYyNDI0MA==&mid=2651959468&idx=1&sn=ea99fa4df1aa1a694d5bce068c1ea335&chksm=8baed033bcd959256ff34ada8a303820b89325efced85c71d2e79549e0a2321b81f624c3172d&scene=58&subscene=0#rd
如有侵权请联系:admin#unsafe.sh