0x00漏洞
1.Linux 內核eBPF 驗證器導致的提權漏洞
https://www.zerodayinitiative.com/blog/2021/1/18/zdi-20-1440-an-incorrect-calculation-bug-in-the-linux-kernel-ebpf-verifier
2.開源自動化營銷軟件Mautic中未經身份驗證的XSS到遠程代碼執行鏈
https://www.horizon3.ai/disclosures/mautic-unauth-xss-to-rce.html
3.八種不安全的Kubernetes Pod配置以及執行特權提升的相應方法
https://labs.bishopfox.com/tech-blog/bad-pods-kubernetes-pod-privilege-escalation
4.常見的DNS軟件dnsmasq中披露了7個新漏洞
https://www.jsof-tech.com/disclosures/dnspooq/
0x01工具
1.移除Flash的時間炸彈
https://gist.github.com/KuromeSan/56d8b724c0696b54f9f81994ae3591d1
https://github.com/KuromeSan/FlashPatcher
2.Svetovid:后滲透腳本和二進制文件+反向代理服務器
https://github.com/redcode-labs/Svetovid
3.Snort官方發布V3版
https://blog.snort.org/2021/01/snort-3-officially-released.html
4.HosTaGe:低交互的手機蜜罐
https://github.com/aau-network-security/HosTaGe
0x02惡意代碼
1.在SolarWinds事件調查中發現了新的惡意軟件Raindrop,是一種加載器,用于投遞Cobalt Strike
https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/solarwinds-raindrop-malware
2.隨著時間的流逝, 持續的惡意廣告攻擊者DCCBoost憤怒了
https://blog.confiant.com/persistent-malvertising-attacker-dccboost-raged-as-the-year-faded-4d09340cd3f5
0x03技術
1.用Ghidra的PCode審計系統調用,挖掘命令注入漏洞
https://www.youtube.com/watch?v=UVNeg7Vqytc
2.轉儲Zynq bootROM的簡易方式
https://gist.github.com/four0four/76401de07a3a170affd3fef0894b624d
3.從HIDS角度看Falco與AuditD
https://sysdig.com/blog/falco-vs-auditd-hids/
4.作者如何在嵌入式設備的密碼庫中發現兩個類似漏洞,以及如何花兩年時間對其進行注冊的故事
https://bi-zone.medium.com/silence-will-fall-or-how-it-can-take-2-years-to-get-your-vuln-registered-e6134846f5bb
5.流行的開源軟件包(npm/PyPi)中的緩存中毒
https://snyk.io/blog/cache-poisoning-in-popular-open-source-packages/
6.Microsoft 365防御UNC2452的補救和強化策略
https://www.fireeye.com/content/dam/collateral/en/wp-m-unc2452.pdf
7.Traverxec HacktheBox Walkthrough
https://www.hackingarticles.in/traverxec-hackthebox-walkthrough/
8.對許多消息傳遞平臺(包括Signal,JioChat,Mocha,Google Duo和Facebook Messenger)的呼叫狀態機的調查
https://googleprojectzero.blogspot.com/2021/01/the-state-of-state-machines.html
9.DNS劫持:接管頂級域和子域(基礎)
https://blog.detectify.com/2021/01/19/dns-hijacking-taking-over-top-level-domains-and-subdomains/
10.FreakOut –利用最新漏洞創建僵尸網絡
https://research.checkpoint.com/2021/freakout-leveraging-newest-vulnerabilities-for-creating-a-botnet/
11.利用基于錯誤的SQL注入和繞過限制
https://medium.com/bugbountywriteup/exploiting-error-based-sql-injections-bypassing-restrictions-ed099623cd94
熱門標簽: