(转载)2020.11.2-11.15一周安全知识动态
2020.11.2-11.15一周安全知识动态
转自
漏洞挖掘相关
•Moving From Dynamic Emulation of UEFI Modules To Coverage-Guided Fuzzing of UEFI Firmware
1 | https://labs.sentinelone.com/moving-from-dynamic-emulation-of-uefi-modules-to-coverage-guided-fuzzing-of-uefi-firmware/https://github.com/Sentinel-One/efi_fuzz |
•Fuzzing Go package using go-fuzz & libfuzzer
1 | https://academy.fuzzinglabs.com/fuzzing-go-package-go-fuzz-libfuzzer |
•2020 LLVM Developers’ Meeting: E. Stepanov “Memory tagging in LLVM and Android”
1 | https://www.youtube.com/watch?v=tqG9pr1K5G8 |
•Instrumenting Adobe Reader with Frida
1 | https://starlabs.sg/blog/2020/11/instrumenting-adobe-reader-with-frida/ |
IOT漏洞相关
•Vulnerabilities and tools for the PAX Payment Devices, including D200, S80, S300, S800, S900, S920
1 | https://git.lsd.cat/g/pax-pwn |
•Silver Peak Unity Orchestrator RCE
1 | https://medium.com/realmodelabs/silver-peak-unity-orchestrator-rce-2928d65ef749 |
•TP-Link Takeover with a Flash Drive
1 | https://medium.com/tenable-techblog/tp-link-takeover-with-a-flash-drive-d493666f6b39 |
•Extraordinary Vulnerabilities Discovered in TCL Android TVs, Now World’s 3rd Largest TV Manufacturer
1 | https://sick.codes/extraordinary-vulnerabilities-discovered-in-tcl-android-tvs-now-worlds-3rd-largest-tv-manufacturer/ |
操作系统漏洞相关
•Fuzzing for eBPF JIT bugs in the Linux kernel
1 | https://scannell.me/fuzzing-for-ebpf-jit-bugs-in-the-linux-kernel/ |
•Using the Linux Audit API to Track Processes
1 | http://natanyellin.com/posts/using-linux-audit-to-track-processes/ |
•Detecting Dynamic Loading in Android Applications With /proc/maps
1 | https://sayfer.io/blog/dynamic-loading-in-android-applications-with-proc-maps/ |
•Booting a macOS Apple Silicon kernel in QEMU
1 | https://worthdoingbadly.com/xnuqemu3/ |
•[Linux Kernel Exploitation 0x0] Debugging the Kernel with QEMU
1 | https://blog.k3170makan.com/2020/11/linux-kernel-exploitation-0x0-debugging.html |
•Sleep Attack: Intel Bootguard vulnerability waking from S3
1 | https://trmm.net/Sleep_attack/ |
•How to get root on Ubuntu 20.04 by pretending nobody’s /home
1 | https://securitylab.github.com/research/Ubuntu-gdm3-accountsservice-LPE |
•Exploring the Exploitability of “Bad Neighbor”: The Recent ICMPv6 Vulnerability (CVE-2020-16898)
1 | https://blog.zecops.com/vulnerabilities/exploring-the-exploitability-of-bad-neighbor-the-recent-icmpv6-vulnerability-cve-2020-16898/ |
•Intel Coverage Security and Management Engine
1 | https://www.intel.com/content/dam/www/public/us/en/security-advisory/documents/intel-csme-security-white-paper.pdf |
•Windows RpcEptMapper Service Insecure Registry Permissions EoP
1 | https://itm4n.github.io/windows-registry-rpceptmapper-eop/ |
浏览器漏洞相关
•Try to in-place transition during map update
1 | https://chromium.googlesource.com/v8/v8.git/+/3ba21a17ce2f26b015cc29adc473812247472776%5E%21/#F3 |
•Actions Speak Browser Than Words (Exploiting n-days for fun and profit)
1 | https://www.youtube.com/watch?v=L7aiFKDg0Jk |
•[JSC] Assert Operation and HostFunction are in JITOperationsList
1 | https://github.com/WebKit/webkit/commit/2ffeeff4dfb86a74ae695dea8671fccc423559adhttps://trac.webkit.org/search?q=JIT-caging |
•JavaScriptCore Internals Part I: Tracing JavaScript Source to Bytecode
1 | https://zon8.re/posts/jsc-internals-part1-tracing-js-source-to-bytecode/ |
•V8: Turbofan fails to deoptimize code after map deprecation, leading to type confusion
1 | https://bugs.chromium.org/p/project-zero/issues/detail?id=2106 |
•WebAssembly compilation pipeline
1 | https://v8.dev/docs/wasm-compilation-pipeline |
•Deep Dive into Site Isolation (Part 1)
1 | https://microsoftedge.github.io/edgevr/posts/deep-dive-into-site-isolation-part-1/ |
•[compiler] Fix use of HeapObjectMatcher
1 | https://github.com/v8/v8/commit/27900f17b845b8881d8328ef70b1bccba8984bbcv8 cve-2020-16013 commit |
•Firefox Vulnerability Research Part 2
1 | https://blog.exodusintel.com/2020/11/10/firefox-vulnerability-research-part-2/ |
•Warp: Improved JS performance in Firefox 83
1 | https://hacks.mozilla.org/2020/11/warp-improved-js-performance-in-firefox-83/ |
应用程序漏洞相关
•CVE-2020-16877: Exploiting Microsoft Store Games
1 | https://labs.ioactive.com/2020/11/cve-2020-16877-exploiting-microsoft.html |
•DIVING INTO A WEBSOCKET VULNERABILITY IN APACHE TOMCAT
1 | https://blog.redteam-pentesting.de/2020/websocket-vulnerability-tomcat/ |
•Breaking The Facebook For Android Application
1 | https://www.ash-king.co.uk/blog/facebook-bug-bounty-09-18 |
•Attack of the clones: Git clients remote code execution
1 | https://blog.blazeinfosec.com/attack-of-the-clones-github-desktop-remote-code-execution/ |
•Active SaltStack CVEs Announced
1 | https://www.saltstack.com/blog/on-november-3-2020-saltstack-publicly-disclosed-three-new-cves/ |
•CVE-2020-16995: Microsoft Azure Network Watcher Linux Extension EoP
1 | https://www.intezer.com/blog/cloud-security/cve-2020-16995-microsoft-azure-network-watcher-linux-extension/Microsoft Azure Network Watcher 提权漏洞CVE-2020-16995分析 |
•SAD DNS — New Flaws Re-Enable DNS Cache Poisoning Attacks
1 | https://thehackernews.com/2020/11/sad-dns-new-flaws-re-enable-dns-cache.htmlCVE-2020-25705 DNS投毒分析 |
•apache-openoffice-rce-via-uno-links
1 | https://github.com/irsl/apache-openoffice-rce-via-uno-links |
•Interesting case of SQLi
1 | https://medium.com/@mrnikhilsri/interesting-case-of-sqli-84cc3f4a5255 |
•Decrypting OpenSSH sessions for fun and profit
1 | https://research.nccgroup.com/2020/11/11/decrypting-openssh-sessions-for-fun-and-profit/ |
工具相关
•CobaltStrike
1 | https://github.com/Freakboy/CobaltStrike |
其它
•Hacking in an epistolary way: implementing kerberoast in pure VBA
1 | https://adepts.of0x.cc/kerberoast-vba-macro/ |
•Let’s Encrypt issues new Root and Intermediate Certificates
1 | https://scotthelme.co.uk/lets-encrypts-new-root-and-intermediate-certificates/证书加密分析 |
•The Art of the Honeypot Account: Making the Unusual Look Normal
1 | https://www.hub.trimarcsecurity.com/post/the-art-of-the-honeypot-account-making-the-unusual-look-normal |
•China and Vulnerability Research
1 | https://medium.com/@thegrugq/china-and-vulnerability-research-dc617c993c4ehttps://medium.com/@thegrugq/cyber-security-motivations-guessing-game-cbb404728ec7 |
•The Chromium Projects Quarterly Updates
1 | https://www.chromium.org/Home/chromium-security/quarterly-updates |
•Oops, I missed it again!
1 | https://googleprojectzero.blogspot.com/2020/11/oops-i-missed-it-again.html |
•Hunting for Malicious Packages on PyPI
1 | https://jordan-wright.com/blog/post/2020-11-12-hunting-for-malicious-packages-on-pypi/ |