2020.03.2-03.8一周知識動態

2021-12-31 平凡路上

收錄於話題 #一周知識動態 45個

                               

知識動態包括每周感覺不錯的技術文章、工具以及重要漏洞相關信息。

瀏覽器漏洞相關

•Intro to Chrome’s V8 from an exploit development angle

https://sensepost.com/blog/2020/intro-to-chromes-v8-from-an-exploit-development-angle/從攻擊者角度看v8相關工具(turbolizer)的使用,同時也簡單描述了turbofan的優化過程。

•Understanding the ECMAScript spec, part 2

https://v8.dev/blog/understanding-ecmascript-part-2V8 官方關於它們對於ECMAScript標準的理解

•Exploiting an Accidentally Discovered V8 RCE

 https://zon8.re/posts/exploiting-an-accidentally-discovered-v8-rce/v8 Issue 744584 從poc到exploit

虛擬逃逸漏洞相關

•Pwning VMware, Part 2: ZDI-19-421, a UHCI bug

https://nafod.net/blog/2020/02/29/zdi-19-421-uhci.html分析vmware逃逸漏洞ZDI-19-421

作業系統漏洞相關

•macOS Security Framework and previous CVEs:

https://rekken.github.io/2020/02/26/macOS-Security-Framework-and-Previous-CVEs-EN/https://rekken.github.io/2020/02/26/macOS-Security-Framework-and-Previous-CVEs-CN/分析 Security Framework 尤其是其中 Keychain 的架構,將 Security Framework 近一兩年的歷史漏洞做個整理。

•Critical MediaTek rootkit affecting millions of Android devices has been out in the open for months

https://www.xda-developers.com/mediatek-su-rootkit-exploit/CVE-2020-0069 MediaTek 晶片rootkit會影響百萬臺安卓設備漏洞

•Android Security Bulletin—March 2020

https://source.android.com/security/bulletin/2020-03-01https://lore.kernel.org/lkml/20191213202531.55010-1-tkjos@google.com/CVE-2020-0041:Android Binder 的漏洞,已經修補。

•CVE-2019-1458: Going from 'in the wild report' to POC

https://github.com/piotrflorczyk/cve-2019-1458_POC/blob/master/README.mdCVE-2019-1458 Win32k特權提升漏洞分析writeup

•Issue 1982: Remote iOS/MacOS kernel heap corruption due to insufficient bounds checking in AWDL

https://bugs.chromium.org/p/project-zero/issues/detail?id=1982cve-2020-3483 目前已有的poc可以遠程dump iphone內存的漏洞

•CVE-2020-8597

https://thehackernews.com/2020/03/ppp-daemon-vulnerability.html隱藏17年的Point-to-Point 協議(PPP) 漏洞,幾乎影響所有的linux系統

應用程式漏洞相關

•str::repeat - stable wildcopy exploit

https://saaramar.github.io/str_repeat_exploit/CVE-2018-1000810 Rust標準庫漏洞從分析到exploit。

•BraveStarr – A Fedora 31 netkit telnetd remote exploit

https://appgateresearch.blogspot.com/2020/02/bravestarr-fedora-31-netkit-telnetd_28.htmlFedora 31 version of netkit-telnet-0.17 遠程rce漏洞分析

•CVE-2020-9547

https://github.com/fairyming/CVE-2020-9547CVE-2020-9547:FasterXML/jackson-databind 遠程代碼執行漏洞

•CVE-2020-9402:Potential SQL injection via tolerance parameter in GIS functions and aggregates on Oracle

https://www.djangoproject.com/weblog/2020/mar/04/security-releases/

•CVE-2020-2555: RCE THROUGH A DESERIALIZATION BUG IN ORACLE』S WEBLOGIC SERVER

https://www.zerodayinitiative.com/blog/2020/3/5/cve-2020-2555-rce-through-a-deserialization-bug-in-oracles-weblogic-serverCVE-2020-2555 weblogic 反序列化rce漏洞

•Weblogic CVE-2020-2551 IIOP協議反序列化RCE

https://y4er.com/post/weblogic-cve-2020-2551/https://github.com/Y4er/CVE-2020-2551/

漏洞挖掘相關

•Reviewing software testing techniques for finding security vulnerabilities.

https://patricegodefroid.github.io/public_psfiles/Fuzzing-101-CACM2020.pdfhttps://www.microsoft.com/en-us/research/blog/a-brief-introduction-to-fuzzing-and-why-its-an-important-tool-for-developers/https://www.youtube.com/watch?v=12oEACM5UEU微軟關於fuzz在漏洞挖掘中作用的闡述

•Fuzzing VIM

https://www.inputzero.io/2020/03/fuzzing-vim.html用afl對vim進行fuzz跑出來的漏洞:CVE-2019-20079。

•Nitro Pro 13 - From Fuzzing to Multiple Heap Corruption

https://nafiez.github.io/security/vulnerability/corruption/fuzzing/2020/03/05/fuzzing-heap-corruption-nitro-pdf-vulnerability.html利用 Basic Fuzzing Framework (BFF)框架fuzz出Nitro PDF軟體漏洞的過程

漏洞利用相關

•Move aside, signature scanning!」 Better kernel data discovery through lookaside lists

https://windows-internals.com/lookaside-list-forensics/新的windows內核數據結構的搜索方式

CTF

•Solving a simple CTF challange with Qiling Framework and IDAPro:

https://www.youtube.com/watch?v=SPjVAt2FkKA使用Qiling Framework與IDA Pro解決簡單的CTF比賽演示教程

工具
bindiff6發布:For IDA 7.4 on Windows, Linux, macOS. If you're feeling lucky, try Ghidra 9.1.2.https://zynamics.com/software.html
先版本的gef發布了:Python2 support dropped, code cleanup, bug fixes, etc.https://github.com/hugsy/gef

•etl-parser

https://github.com/airbus-cert/etl-parser解析Microsoft Windows ETL日誌文件工具

•BinDiff and IDA Pro - Reverse Engineering Speed Hacks

https://www.youtube.com/watch?v=BLBjcZe-C3I結合ida pro使用bindiff的技巧

其它

•披露美國中央情報局CIA攻擊組織(APT-C-39)對中國關鍵領域長達十一年的網絡滲透攻擊

https://www.freebuf.com/articles/network/229066.html

•KRACE: Data Race Fuzzing for Kernel File Systems

https://www.cc.gatech.edu/~mxu80/pubs/xu:krace.pdf多線程競爭漏洞挖掘相關論文

•Project Sandcastle: Android for the iPhone

https://projectsandcastle.org/在iphone上安裝android的項目

•CS6038/CS5138 Malware Analysis, UC

https://class.malware.re/Cincinnati大學關於惡意軟體分析的公開課程,包括ppt、視頻等。

•Security analysis of memory tagging

https://github.com/microsoft/MSRC-Security-Research/blob/master/papers/2020/Security%20analysis%20of%20memory%20tagging.pdf微軟關於memory tagging 技術的安全研究

【平凡路上】是一個致力於二進位漏洞分析與利用交流與分享的圈子,做純粹的技術分享,與大家共同進步。
 如果大家覺得公眾號不錯的話,幫忙推薦給身邊的朋友,你的分享是我們的動力。 同時歡迎掃描下方二維碼加入【平凡路上】知識星球,在星球裡面與各位師傅分享自己的經驗與心得以及提出自己的疑問,與大家共同進步。

相關焦點

  • 2021.3.8-3.14一周知識動態
    收錄於話題 #一周知識動態id=2126F5 Big IP信息洩露漏洞以及越界寫漏洞漏洞挖掘相關•Fuzzing grub: part 1https://sthbrx.github.io/blog/2021/03/04/fuzzing-grub-part-1/利用AFL對grub的模糊測試•POC 2020 - CodeQL as an auditing
  • 2020.9.21-9.27一周知識動態
    漏洞挖掘相關•Resmack: Part 2: Full Fuzzer Detour
  • 2020.8.17-8.23一周知識動態
    -2020-1488CVE-2020-1488WindowsAppXDeployment服務提權漏洞分析•BLIZZARD JAILBREAKhttps://geosn0w.github.io/getblizzard/開源的越獄工具IOS 11.0至 IOS 13.5•CVE-2020-1337: my two cents
  • 2020.6.8-6.14一周知識動態
    -websphere-remote-code-execution-vulnerability-alert/CVE-2020-4450: WebSphere遠程代碼漏洞預警•CVE-2019-16113 PoChttps://github.com/hg8/CVE-2019-16113-PoCCVE-2019-16113Bludit>=
  • 2020.4.20-4.26一周知識動態
    -0022 an Android 8.0-9.0 Bluetooth Zero-Click RCE – BlueFraghttps://insinuator.net/2020/04/cve-2020-0022-an-android-8-0-9-0-bluetooth-zero-click-rce-bluefrag/CVE-2020-0022 Android
  • 2020.4.27-5.3一周知識動態
    Introducing: wasm-decompilehttps://v8.dev/blog/wasm-decompilev8官方關於wasm-decompile的分析•Fuzzing JavaScript Engines with Aspect-preserving Mutationhttps
  • 2020.5.18-5.24一周知識動態
    t=3h16m14sNorthSec2020上關於IOMMU以及DMA攻擊的介紹瀏覽器漏洞相關•This is an exploit for CVE-2020-0674 that runs on the x64 version of IE 8, 9, 10, and 11 on Windows 7.
  • 2020.7.13-7.19一周知識動態
    : Efficient Sanitizer Metadata Design for Fuzzing代碼開源漏洞利用相關•Exploit Development: Playing ROP』em COP』em Robots with WriteProcessMemory()https://connormcgarr.github.io/ROP2/
  • 2020.6.22-7.5一周知識動態
    收錄於話題 #一周知識動態TO ZERO-DAY :)https://secalert.net/from-zero-to-zeroday.html挖掘web rce漏洞的過程•Exploiting an Envoy heap vulnerabilityhttps://blog.envoyproxy.io/exploiting-an-envoy-heap-vulnerability
  • FEX 技術周刊 - 2020/03/23
    7.9.0 Released: Smaller preset-env output, Typescript 3.8 support and a new JSX transformhttps://babeljs.io/blog/2020/03/16/7.9.0While preparing the Babel 8.0.0 release
  • 每日安全動態推送(03-10)
    – lanying37• [Tools] Getting Your Hands on PowerShell 7 - #PS7Now:https://toastit.dev/2020/03/08/ps7now-installing/   ・ PowerShell團隊宣布將發布下一個版本的PowerShell 7。
  • 每日安全動態推送(03-04)
    Tencent Security Xuanwu Lab Daily News• [Programming] CS 110L: Safety in Systems Programming:https://reberhardt.com/cs110l/spring-2020
  • 《新女神》2020/03/05更新公告
    活動時間:2020/03/05(四)至2020/03/10(三)活動詳情:活動時間內任選一天,軍團長以軍團為單位召集本軍團團員,在任意地點集結後合影發送到官方客服QQ可獲得獎勵。(合影會放到官網展示)基本獎勵內容:到場每人防疫口罩*1、記憶卡簡易組x5、100%經驗聖水x5。
  • 每日安全動態推送(03-20)
    Tencent Security Xuanwu Lab Daily News• [CTF] Welcome to Pwn2Own2020 - The Schedule and Live Results:https://www.thezdi.com/blog/2020/3/17/welcome-to-pwn2own-2020-the-schedule-and-live-results   ・ Pwn2Own 2020 今天比賽的結果出來了 – Jett• Das U-Boot Verified
  • 歐神小密圈(2020.03.04):CQ獨立行情,和全國無關.
    2)轉發此文,聯繫下方微信:12582455,免費加入微信群。並可獲取最新的《歐神文集電子版本(含隱匿篇)》,更新至2020年2月。每月一更新。 2020/03/ 16:16提 問:歐大水庫加不了,怎麼辦,安卓,電腦也不行,有別的辦法交錢續期嗎?
  • FEX 技術周刊 - 2020/03/30
    Announcing React Native 0.62 with Flipperhttps://reactnative.dev/blog/2020/03/26/version-0.62.htmlFlipper is a developer tool for debugging mobile apps.
  • Steam 新遊推薦 03-11
    Victory Road關鍵字:體育、模擬、策略、暴力發行日期:2020/03/11(暫無中文)EAVictory Road 是一個拳擊模擬器,不過這次您是扮演教練的角色,而不是拳擊手!Floppy Heroes 2關鍵字:動作、奇幻、體素、物理、多人發行日期:2020/03/11(暫無中文)EAFloppy Heroes 2 建立在上一代的基礎之上,提供了可肢解的布娃娃物理系統
  • 2021.2.1-2.7一周知識動態
    www.leavesongs.com/PENETRATION/the-collision-of-containers-and-the-cloud-pentesting-a-MinIO.htmlMinIO CVE-2021-21287 漏洞分析•CVE-2021-25646 POC https://gist.github.com/FanqXu/36c5e0070fd8e0b6646993b4e386a6b1
  • 2020.6.1-6.7一周知識動態
    posts/apc/kernel-user-apc-api/windows APC機制分析•When it’s not only about a Kubernetes CVE…https://medium.com/@BreizhZeroDayHunters/when-its-not-only-about-a-kubernetes-cve-8f6b448eafa8Kubernetes
  • 360-CERT每日安全簡報(2020-09-03)