每日安全动态推送(09-14)

  • A+
所属分类:安全新闻
Tencent Security Xuanwu Lab Daily News


• [Malware] Dexter, Project Hook POS Malware Campaigns Persist:
https://threatpost.com/dexter-project-hook-pos-malware-campaigns-persist/104655/

   ・ 针对POS机的Dexter和Project Hook恶意软件正在活跃 – Schwarrzz


• [CTF] google/google-ctf:
https://github.com/google/google-ctf/tree/master/2020/quals

   ・ 今年 Google CTF 所有赛题源码 – Jett


• [Reverse Engineering, Hardware] Reverse-engineering the first FPGA chip, the XC2064:
http://www.righto.com/2020/09/reverse-engineering-first-fpga-chip.html

   ・ FPGA XC2064 芯片的硬件级逆向分析 – Jett


• [Tools] Cross C2:
https://github.com/gloxec/CrossC2

   ・ CrossC2 framework - 生成 CobaltStrike 的跨平台 beacon  – Jett


• [Tools, Browser] Lucid: An Interactive Hex-Rays Microcode Explorer:
https://blog.ret2.io/2020/09/11/lucid-hexrays-microcode-explorer/

   ・ Lucid - 一款开源的用于交互式查看 IDA Pro Hex-Rays 微码的工具 – Jett


• [Windows] Weak Permissions on Windows Service | Privilege Escalation:
https://medium.com/bugbountywriteup/weak-permissions-on-windows-service-privilege-escalation-e8fa97ce4a54?source=rss----7b722bfd1b8d---4

   ・ 利用Windows服务权限弱点与Powershell脚本提权的总结方法。 – lanying37


• [Attack] SoftServe подверглась атаке хакеров:
https://ain.ua/2020/09/01/softserve-haknuli/

   ・ 乌克兰最大的IT公司之一SoftServe遭受网络攻击安全威胁。 – lanying37


• [Linux] CVE: 2020-14356 & 2020-25220:
http://blog.pi3.com.pl/?p=720

   ・ Linux kernel Cgroup BPF Use-After-Free 漏洞的分析 – Jett


• [Windows, Tools] HTTP-revshell - Powershell Reverse Shell Using HTTP/S Protocol With AMSI Bypass And Proxy Aware:
https://ift.tt/2Zz4S4H

   ・ 通过http/s协议提供反向连接的渗透测试工具HTTP-revshell – Schwarrzz


• [Tools] Docker for Pentester: Image Vulnerability Assessment:
https://www.hackingarticles.in/docker-for-pentester-image-vulnerability-assessment/

   ・ Docker for Pentester:图像漏洞评估使用说明。 – lanying37


• [Reverse Engineering] Collaborative Reverse Engineering with Ghidra Server:
https://byte.how/posts/collaborative-reverse-engineering/

   ・ 如何使用逆向工具Ghidra的内置“ git”服务器进行共享项目控制工作。  – lanying37


• [Tools] dragon dance: Binary code coverage visualizer plugin for Ghidra:
https://securityonline.info/dragon-dance-binary-code-coverage-visualizer-plugin-for-ghidra/

   ・ Ghidra插件Dragon Dance发布,可协助分析二进制数据 – Schwarrzz


• [Web] How I Hacked Facebook Again! Unauthenticated RCE on MobileIron MDM:
https://blog.orange.tw/2020/09/how-i-hacked-facebook-again-mobileiron-mdm-rce.html?m=1

   ・ How I Hacked Facebook Again! Unauthenticated RCE on MobileIron MDM – Jett


• Tencent Keen Security Lab 5G Security Research Demo:
https://youtu.be/Ca9lPMMToi0

   ・ 腾讯科恩实验公布5G安全漏洞演示视频。 – lanying37


• [Tools] GitHub - dwisiswant0/crlfuzz: A fast tool to scan CRLF vulnerability written in Go:
https://github.com/dwisiswant0/crlfuzz

   ・ CRLFuzz - 用于扫描 CRLF 漏洞的工具 – Jett


* 查看或搜索历史推送内容请访问:
https://sec.today

* 新浪微博账号:腾讯玄武实验室
https://weibo.com/xuanwulab


发表评论

:?: :razz: :sad: :evil: :!: :smile: :oops: :grin: :eek: :shock: :???: :cool: :lol: :mad: :twisted: :roll: :wink: :idea: :arrow: :neutral: :cry: :mrgreen: