(转载)2020.11.23-11.29一周安全知识动态
2020.11.23-11.29一周安全知识动态
转自
IOT漏洞相关
•DualSense Reverse Engineering
1 | https://sensepost.com/blog/2020/dualsense-reverse-engineering/ |
虚拟化逃逸漏洞相关
•MMU Virtualization Via Intel EPT – Index
1 | https://revers.engineering/mmu-virtualization-via-intel-ept-index/ |
应用程序漏洞相关
•ImageMagick - Shell injection via PDF password
1 | https://insert-script.blogspot.com/2020/11/imagemagick-shell-injection-via-pdf.html |
•DETAILING SALTSTACK SALT COMMAND INJECTION VULNERABILITIES
1 | https://www.zerodayinitiative.com/blog/2020/11/24/detailing-saltstack-salt-command-injection-vulnerabilities |
浏览器漏洞相关
•GEF extension to handle tagged and compressed pointers in v8 better (WIP)
1 | https://gist.github.com/lordidiot/1580ddc3474d8f017f2f7972a69727d2 |
•Add missing HasValue check in BitfieldCheck::Detect
1 | https://github.com/v8/v8/commit/633f67caa6d0a126487a489c240ed86a59b2b291 |
操作系统漏洞相关
•Exploiting a “Simple” Vulnerability – In 35 Easy Steps or Less!
1 | https://windows-internals.com/exploiting-a-simple-vulnerability-in-35-easy-steps-or-less/ |
•Comparing iPhone OS 1.0 with iOS 14 using tree maps
1 | https://blog.timac.org/2020/1122-comparing-iphone-os-with-ios-14-using-tree-maps/ |
•Discovering, exploiting and shutting down a dangerous Windows print spooler vulnerability
1 | https://www.accenture.com/us-en/blogs/cyber-defense/discovering-exploiting-shutting-down-dangerous-windows-print-spooler-vulnerability |
•0day in Windows 7 and Server 2008 R2 Gets a Micropatch
1 | https://blog.0patch.com/2020/11/0day-in-windows-7-and-server-2008-r2.html |
其它
•PC Life After Apple Silicon
1 | https://mondaynote.com/pc-life-after-apple-silicon-a96861f58442 |
•macOS has checked app signatures online for over 2 years
1 | https://eclecticlight.co/2020/11/25/macos-has-checked-app-signatures-online-for-over-2-years/ |
•Architecture of a ransomware (1/2)
1 | https://securityshenaningans.medium.com/architecture-of-a-ransomware-1-2-1b9fee757fcbhttps://securityshenaningans.medium.com/architecture-of-a-ransomware-2-2-e22d8eb11cee |
•Code injection series
1 | https://blog.sevagas.com/?-Code-injection-series- |
工具相关
•Patch Diffing with Ghidra
1 | https://ihack4falafel.github.io/Patch-Diffing-with-Ghidra/ |
•fpsmt_gpu
1 | https://github.com/moyix/fpsmt_gpu |
•DbgShell
1 | https://github.com/microsoft/DbgShell |
•minizinh0-FUD
1 | https://github.com/gnxbr/Fully-Undetectable-Techniques/tree/main/minizinh0-FUD |