每日攻防资讯简报[Aug.21th]

  • A+
所属分类:安全新闻

每日攻防资讯简报[Aug.21th]

0x00资讯

1.消费者信用报告机构Experian的南非分公司发生数据泄露事件,影响2400万南非人和793749个商业实体

https://www.sabric.co.za/media-and-news/press-releases/experian-data-breach/

0x01漏洞

1.我是如何发现Horde Groupware Webmail应用程序的漏洞的,以及如何利用漏洞实现RCE

https://srcincite.io/blog/2020/08/19/a-smorgashorde-of-vulnerabilities-a-comparative-analysis-of-discovery.html

 

2.如何在谷歌托管的关系数据库服务Cloud SQL上释放Shell

https://offensi.com/2020/08/18/how-to-contact-google-sre-dropping-a-shell-in-cloud-sql/

 

3.IBM Db2共享内存漏洞(CVE-2020-4414)

https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/ibm-db2-shared-memory-vulnerability-cve-2020-4414/

 

4.macOS Mojave 10.14中远程登录(ssh)中的漏洞仍然存在

https://eclecticlight.co/2020/08/20/the-vulnerability-in-remote-login-ssh-persists/

 

5.Cisco vWAAS for Cisco ENCS 5400-W系列和CSP 5000-W系列默认证书漏洞

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-waas-encsw-cspw-cred-hZzL29A7

0x02恶意代码

1.Transparent Tribe: Evolution analysis, part 1

https://securelist.com/transparent-tribe-part-1/98127/

https://www.proofpoint.com/sites/default/files/proofpoint-operation-transparent-tribe-threat-insight-en.pdf

0x03工具

1.reconspider:开源OSINT框架,用于扫描IP地址、邮件、网站和组织,从不同的源查找信息

https://github.com/bhavsec/reconspider

 

2.Backdoorplz:使用win32api添加后门用户

https://github.com/jfmaes/Backdoorplz

 

3.DmaBackdoorHv:Hyper-V后门,它提供了一个接口,用于从来宾或主机分区检查虚拟机监控程序状态(VMCS,物理/虚拟内存,寄存器等)并执行VM逃逸攻击

https://github.com/Cr4sh/s6_pcie_microblaze/tree/master/python/payloads/DmaBackdoorHv#deploying-the-backdoor-using-firmware-flash-infection

 

4.bof_helper:Cobalt Strike引入了用于Beacon agent的Beacon Object File (BOF)的概念,此工具用于辅助创建BOF

https://github.com/dtmsecurity/bof_helper

0x04技术

1.绕过Web框架Play Framework的CSRF防护

https://blog.doyensec.com/2020/08/20/playframework-csrf-bypass.html

 

2.如何使用WEB代理窃取内部信息

https://sefod.eu/posts/web_proxies/

 

3.2020年OSCP备考终极指南

https://johnjhacking.com/blog/the-oscp-preperation-guide-2020/

 

4.Office 365邮件转发规则(以及其他邮件规则)

https://isc.sans.edu/diary/26484

 

5.我是如何在不被邻居察觉的情况下破解其密码的

https://arstechnica.com/information-technology/2012/08/wireless-password-easily-cracked/

 

6.从奇虎360安全浏览器和Tor浏览器中提取密码

https://eforensicsmag.com/extracting-passwords-from-qihoo-360-safe-browser-and-tor-browser-by-oleg-afonin/

 

7.为什么扫描UDP端口如此重要,Part2

https://medium.com/@securityshenaningans/why-you-should-always-scan-udp-part-2-2-42050fb136d8

 

8.Kernel Panic: DEF CON 2020回顾

https://dttw.tech/posts/Skww4fzGP

 

9.DHCP饥饿攻击:不用发出任何DHCP请求

https://medium.com/bugbountywriteup/dhcp-starvation-attack-without-making-any-dhcp-requests-bef0022133c9

 

10.WordPress用户管理终极指南

https://www.wpwhitesecurity.com/ultimate-guide-wordpress-user-management/

 

11.攻击Azure & Azure AD, Part II

https://posts.specterops.io/attacking-azure-azure-ad-part-ii-5f336f36697d

 

12.Bypass Windows Defender Attack Surface Reduction

https://blog.sevagas.com/IMG/pdf/bypass_windows_defender_attack_surface_reduction.pdf

天融信阿尔法实验室成立于2011年,一直以来,阿尔法实验室秉承“攻防一体”的理念,汇聚众多专业技术研究人员,从事攻防技术研究,在安全领域前瞻性技术研究方向上不断前行。作为天融信的安全产品和服务支撑团队,阿尔法实验室精湛的专业技术水平、丰富的排异经验,为天融信产品的研发和升级、承担国家重大安全项目和客户服务提供强有力的技术支撑。



每日攻防资讯简报[Aug.21th]

每日攻防资讯简报[Aug.21th]

天融信

阿尔法实验室

长按二维码关注我们



发表评论

:?: :razz: :sad: :evil: :!: :smile: :oops: :grin: :eek: :shock: :???: :cool: :lol: :mad: :twisted: :roll: :wink: :idea: :arrow: :neutral: :cry: :mrgreen: