(转载)2020.11.30-12.6一周安全知识动态
2020.11.30-12.6一周安全知识动态
转自
CTF相关
•hitcon-ctf-2020
1 | https://github.com/orangetw/My-CTF-Web-Challenges/tree/master/hitcon-ctf-2020 |
•angelboy hitcon writeup
1 | https://github.com/scwuaptx/CTF/tree/master/ |
漏洞挖掘相关
•healer
1 | https://github.com/SunHao-0/healer |
漏洞利用相关
•A Modern Exploration of Windows Memory Corruption Exploits - Part I: Stack Overflows
1 | https://www.forrest-orr.net/post/a-modern-exploration-of-windows-memory-corruption-exploits-part-i-stack-overflows |
IOT漏洞相关
•Another LILIN DVR 0-day being used to spread Mirai
1 | https://blog.netlab.360.com/another-lilin-dvr-0-day-being-used-to-spread-mirai-en/ |
•CVE-2020-25988: A UPnP Abuse(?)
1 | https://niteshsurana.medium.com/cve-2020-25988-a-upnp-abuse-424f0db73129 |
虚拟化逃逸漏洞相关
•Kernel privilege escalation: how Kubernetes container isolation impacts privilege escalation attacks
1 | https://snyk.io/blog/kernel-privilege-escalation/ |
•vmware-exploitation
1 | https://github.com/xairy/vmware-exploitation |
应用程序漏洞相关
•AliExpress Captcha Reuse
1 | https://therealunicornsecurity.github.io/Aliexpress/ |
•Multiple (RCE) Vulnerabilities in Micro Focus Operations Bridge Manager
1 | https://github.com/pedrib/PoC/blob/master/advisories/Micro_Focus/Micro_Focus_OBM.md |
•Don’t scan my website I: exploiting an old version of Wappalyzer
1 | https://medium.com/@csal/dont-scan-my-website-i-exploiting-an-old-version-of-wappalyzer-14c001279434 |
•CLOUDGOAT EXPLOITATION SERIES - PRIVILEGE ESCALATION VIA LAMBDA AND IAM PASS ROLE
1 | https://makosecblog.com/aws-pentest/lambda-privesc/ |
操作系统漏洞相关
•BUG OR FEATURE: PRIVILEGE ESCALATION IN WINDOWS AUTOPILOT
1 | https://sec-consult.com/en/blog/2020/11/bug-oder-feature-privilege-escalation-in-windows-autopilot/ |
•More On Foreign Hashes
1 | https://sensepost.com/blog/2020/nthashes-and-encodings/https://sensepost.com/blog/2020/more-on-foreign-hashes/ |
•How to run Windows 10 on ARM in QEMU with Hypervisor.framework patches on Apple Silicon Mac
1 | https://gist.github.com/niw/e4313b9c14e968764a52375da41b4278#file-readme-md |
•An iOS zero-click radio proximity exploit odyssey
1 | https://googleprojectzero.blogspot.com/2020/12/an-ios-zero-click-radio-proximity.html |
•IOS 1-DAY HUNTING: UNCOVERING AND EXPLOITING CVE-2020-27950 KERNEL MEMORY LEAK
1 | https://www.synacktiv.com/publications/ios-1-day-hunting-uncovering-and-exploiting-cve-2020-27950-kernel-memory-leak.htmlCVE-2020-27950 IOS内核内存泄露漏洞分析 |
•Linux kernel heap quarantine versus use-after-free exploits
1 | https://a13xp0p0v.github.io/2020/11/30/slab-quarantine.html |
•sysdiag-who?
1 | https://labs.f-secure.com/blog/sysdiag-who/ |
•Apple EFI firmware passwords and the SCBO myth
1 | https://reverse.put.as/2016/06/25/apple-efi-firmware-passwords-and-the-scbo-myth/ |
其它
•Secure Website: From Architecture to Deployment
1 | https://www.yavs.io/Article_18Nov20_SecureWebsite/ref/reddit_netsec |