•DOS2RCE: A New Technique to Exploit V8 NULL Pointer Dereference Bug
https://blog.br0vvnn.io/pages/blogpost.aspx?id=1&ln=0V8 issue-1003286 NULL PointerDereference漏洞分析及利用漏洞挖掘相關•Fuzzing Python packages in 5 min using pythonfuzz
https://academy.fuzzinglabs.com/fuzzing-python-packages-5-min-pythonfuzz5分鐘學會用pythonfuzz fuzz Python packages•Introduction to Go fuzzing: fuzz your first project in a few minutes
https://www.youtube.com/watch?v=pA4E8rvQGmYGo fuzzing 簡短視頻IOT漏洞相關•From Zero to main(): Demystifying Firmware Linker Scripts
https://interrupt.memfault.com/blog/how-to-write-linker-scripts-for-firmware固件程序link過程解析•Analysis & Exploitation of a Recent TP-Link Archer A7 Vulnerability
https://starlabs.sg/blog/2020/10/analysis-exploitation-of-a-recent-tp-link-archer-a7-vulnerability/TP-LinkArcher A7 rce漏洞 CVE-2020-10882分析虛擬化逃逸漏洞相關•Dockerfile Security Best Practices
https://cloudberry.engineering/article/dockerfile-security-best-practices/Dockerfile安全實踐CTF相關•File Stream Oriented Programming: SECCON CTF 2020 - lazynote
https://faraz.faith/2020-10-13-FSOP-lazynote/通過SECCON CTF 2020- lazynote來詳細描述FSOP作業系統漏洞相關•Acronis backup software contains multiple privilege escalation vulnerabilities
https://www.kb.cert.org/vuls/id/114757CVE-2020-10138 win10 通過Acronis backup 進行提權•CVE-2020-16898: 「Bad Neighbor」
https://www.mcafee.com/blogs/other-blogs/mcafee-labs/cve-2020-16898-bad-neighbor/https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16898https://github.com/advanced-threat-research/CVE-2020-16898CVE-2020-16898Windows TCP/IP遠程命令執行漏洞分析•CVE-2020-16952
https://attackerkb.com/topics/4yGC4tLK2x/cve-2020-16952https://srcincite.io/pocs/cve-2020-16952.py.txtCVE-2020-16952MicrosoftSharePointServer RCE漏洞exp•CVE-2020-12928 Exploit Proof-of-Concept, Privilege Escalation in AMD Ryzen Master AMDRyzenMasterDriver.sys
https://h0mbre.github.io/RyzenMaster_CVE/#CVE-2020-12928 AMD RyzenMasterAMDRyzenMasterDriver.sys驅動漏洞分析•Exploiting Uses of Uninitialized Stack Variables in Linux Kernels to Leak Kernel Pointers
https://www.youtube.com/watch?v=uI377m9S0qshttps://www.usenix.org/system/files/woot20-paper1-slides-cho.pdfhttps://www.usenix.org/system/files/woot20-paper-cho.pdflinux內核利用棧未初始化變量變量來洩露內核指針•Beware the Bad Neighbor: Analysis and PoC of the Windows IPv6 Router Advertisement Vulnerability (CVE-2020-16898)
https://blog.quarkslab.com/beware-the-bad-neighbor-analysis-and-poc-of-the-windows-ipv6-router-advertisement-vulnerability-cve-2020-16898.htmlCVE-2020-16898 windows BadNeighbor poc分析•Introducing Edge Vulnerability Research
https://microsoftedge.github.io/edgevr/posts/Introducing-Edge-Vulnerability-Research/windows edge瀏覽器安全性分析系列文章第一篇應用程式漏洞相關•Exploiting CVE-2020–25213: wp-file-manager wordpress plugin (<6.9) for unauthenticated arbitrary file upload
https://medium.com/@mansoorr/exploiting-cve-2020-25213-wp-file-manager-wordpress-plugin-6-9-3f79241f0cd8CVE-2020–25213 wp-file-manager wordpress plugin (<6.9) 免認證任意文件上傳漏洞分析•Bypassing Trend Micro Web Threat Protection via Punycode
https://www.inputzero.io/2020/08/bypass-trend-micro-web-threat-protection.html過TrendMicroWebThreatProtection殺軟•Attackers Abuse MobileIron’s RCE to deliver Kaiten
https://www.blackarrow.net/attackers-abuse-mobileirons-rce-to-deliver-kaiten/MobileIron’s mobile DeviceManagement(MDM) 漏洞利用分析•403 to RCE in XAMPP
https://www.securifera.com/blog/2020/10/13/403-to-rce-in-xampp/XAMPP 從403到RCE•CVE-2020-16947
https://github.com/0neb1n/CVE-2020-16947Outlook2019(16.0.13231.20262) 漏洞CVE-2020-16947 poc工具相關•Getting started with Datalog & Rust for program analysis
https://hexgolems.com/2020/10/getting-started-with-ddlog/Datalog程序靜態分析工具其它•In Process Execute Assembly and Mail Slots
https://teamhydra.blog/2020/10/12/in-process-execute-assembly-and-mail-slots/進程加載執行彙編代碼•XBALTI Phishing Scam
https://blog.medarkus.net/2020/10/11/XBALTI-Kit.html釣魚方式調研總結•HTML to PDF converters, can I hack them?
https://sidechannel.tempestsi.com/html-to-pdf-converters-can-i-hack-them-a681cfee0903•The State of Exploit Development: 80% of Exploits Publish Faster than CVEs
https://unit42.paloaltonetworks.com/state-of-exploit-development/paloalto團隊發布的漏洞利用及cve公布之間的分析往期推薦
linux-kernel-pwn qwb2018 core
2020.9.21-9.27一周知識動態
2020.9.28-10.4一周知識動態
2020.10.5-10.11一周知識動態
【平凡路上】是一個致力於二進位漏洞分析與利用交流與分享的圈子,做純粹的技術分享,與大家共同進步。如果大家覺得公眾號不錯的話,幫忙推薦給身邊的朋友,你的分享是我們的動力。同時歡迎掃描下方二維碼加入【平凡路上】知識星球,在星球裡面與各位師傅分享自己的經驗與心得以及提出自己的疑問,與大家共同進步。