2020.11.23-11.29一周安全知识动态

转自image-20200929114557052

IOT漏洞相关

•DualSense Reverse Engineering

1
2
https://sensepost.com/blog/2020/dualsense-reverse-engineering/
Sony DualSense无线控制器逆向分析

虚拟化逃逸漏洞相关

•MMU Virtualization Via Intel EPT – Index

1
2
https://revers.engineering/mmu-virtualization-via-intel-ept-index/
通过Intel EPT 实现MMU Virtualization

应用程序漏洞相关

•ImageMagick - Shell injection via PDF password

1
2
https://insert-script.blogspot.com/2020/11/imagemagick-shell-injection-via-pdf.html
ImageMagick通过pdf 密码实现shell注入漏洞

•DETAILING SALTSTACK SALT COMMAND INJECTION VULNERABILITIES

1
2
https://www.zerodayinitiative.com/blog/2020/11/24/detailing-saltstack-salt-command-injection-vulnerabilities
SALTSTACK 命令注入漏洞分析

浏览器漏洞相关

•GEF extension to handle tagged and compressed pointers in v8 better (WIP)

1
2
https://gist.github.com/lordidiot/1580ddc3474d8f017f2f7972a69727d2
v8的gef插件,可以更好的支持指针压缩

•Add missing HasValue check in BitfieldCheck::Detect

1
2
https://github.com/v8/v8/commit/633f67caa6d0a126487a489c240ed86a59b2b291
v8 CVE-2020-16013漏洞commit

操作系统漏洞相关

•Exploiting a “Simple” Vulnerability – In 35 Easy Steps or Less!

1
2
https://windows-internals.com/exploiting-a-simple-vulnerability-in-35-easy-steps-or-less/
windows CVE-2020-1034漏洞分析

•Comparing iPhone OS 1.0 with iOS 14 using tree maps

1
2
https://blog.timac.org/2020/1122-comparing-iphone-os-with-ios-14-using-tree-maps/
通过tree maps来比较iPhone OS1.0到iOS14

•Discovering, exploiting and shutting down a dangerous Windows print spooler vulnerability

1
2
https://www.accenture.com/us-en/blogs/cyber-defense/discovering-exploiting-shutting-down-dangerous-windows-print-spooler-vulnerability
cve-2020-1030 Windows print spooler 漏洞分析

•0day in Windows 7 and Server 2008 R2 Gets a Micropatch

1
2
https://blog.0patch.com/2020/11/0day-in-windows-7-and-server-2008-r2.html
win7及server 2008提权漏洞分析

其它

•PC Life After Apple Silicon

1
2
https://mondaynote.com/pc-life-after-apple-silicon-a96861f58442
苹果发布芯片后pc市场的分析

•macOS has checked app signatures online for over 2 years

1
2
https://eclecticlight.co/2020/11/25/macos-has-checked-app-signatures-online-for-over-2-years/
macOS在线验证签名两年之久

•Architecture of a ransomware (1/2)

1
2
https://securityshenaningans.medium.com/architecture-of-a-ransomware-1-2-1b9fee757fcbhttps://securityshenaningans.medium.com/architecture-of-a-ransomware-2-2-e22d8eb11cee
勒索软件架构综合分析

•Code injection series

1
2
https://blog.sevagas.com/?-Code-injection-series-
代码注入原理及实现系列文章

工具相关

•Patch Diffing with Ghidra

1
2
https://ihack4falafel.github.io/Patch-Diffing-with-Ghidra/
使用Ghidra来进行补丁比对

•fpsmt_gpu

1
2
https://github.com/moyix/fpsmt_gpu
brute-force fuzzing floating point SMT on GPUs

•DbgShell

1
2
https://github.com/microsoft/DbgShell
基于Powershell实现的windows调试器引擎

•minizinh0-FUD

1
2
https://github.com/gnxbr/Fully-Undetectable-Techniques/tree/main/minizinh0-FUD
minizinh0可以绕过杀软的勒索软件
⬆︎UP