证券简称:天融信   证券代码:002212
安全通告
首页 > 技术支持 > 安全通告

每日攻防资讯简报[Apr.23th]

发布时间:2021-04-23查看次数:116
分享到

0x00漏洞

1.Linux内核io_uring子系统中的引用计数漏洞,可以利用该漏洞进行本地特权升级(CVE-2021-20226)

https://www.zerodayinitiative.com/blog/2021/4/22/cve-2021-20226-a-reference-counting-bug-in-the-linux-kernel-iouring-subsystem

2.QNAP在灾难恢复和数据备份解决方案HBS 3 Hybrid Backup Sync中发现的硬编码后门漏洞(CVE-2021-28799)

https://www.bleepingcomputer.com/news/security/qnap-removes-backdoor-account-in-nas-backup-disaster-recovery-app/

3.苹果的AirDrop存在漏洞,发送方和接收方可能会泄漏其联系方式

https://www.usenix.org/system/files/sec21fall-heinrich.pdf

https://www.theregister.com/2021/04/22/airdrop_contact_leaks/

0x01工具

1.SockFuzzer:针对iOS内核网络栈的Fuzzer

https://github.com/googleprojectzero/SockFuzzer

https://googleprojectzero.blogspot.com/2021/04/designing-sockfuzzer-network-syscall.html

2.dnspeep:监控主机发出的DNS请求

https://github.com/jvns/dnspeep

3.Windows提权漏洞CVE-2021-26415

https://www.cloaked.pl/2021/04/cve-2021-26415/

4.pe:GoLang包,解析、分析和提取PE文件元数据

https://github.com/saferwall/pe

0x02恶意代码

1.庞大的Android设备僵尸网络Pareto, 由将近一百万台受感染的移动Android设备组成,用来模拟数以百万计的人在智能电视和其他设备上观看广告

https://www.humansecurity.com/newsroom/human-formerly-white-ops-together-with-newly-formed-human-collective-and-industry-leaders-google-roku-announces-discovery-and-disruption-of-pareto-ctv-botnet

2.发现SolarWinds黑客使用的其他基础结构,攻击者精心计划了行动的每个阶段,使取证分析变得困难

https://www.riskiq.com/blog/external-threat-management/solarwinds-c2-servers-new-tactics/

3.利用Microsoft Exchange漏洞的Prometei僵尸网络

https://www.cybereason.com/blog/prometei-botnet-exploiting-microsoft-exchange-vulnerabilities

0x03技术

1.新版Burp Scanner可以重放复杂的登陆过程,例如由JS渲染的登陆页面

https://portswigger.net/blog/recorded-logins-in-burp-scanner

2.用户模式绕过LSA防护

https://blog.scrt.ch/2021/04/22/bypassing-lsa-protection-in-userland/

3.网络钓鱼中绕过“外部电子邮件”的警告

https://whynotsecurity.com/blog/external-email-warning-bypass/

4.有效的EDR评估测试

https://www.cybereason.com/blog/inside-effective-edr-evaluation-testing

5.Google hacking/Docking的使用

https://infosecwriteups.com/google-hacking-dorking-3a58757a9ae7

6.在下载过程中将恶意代码嵌入可执行文件

https://infosecwriteups.com/embedding-malicious-codes-into-executable-files-during-the-download-process-93b269aff1a6

7.泄漏的会所数据的探索和可视化

https://infosecwriteups.com/data-exploration-and-visualization-on-leaked-clubhouse-data-25408b03664