CVE-2021-1675 PrintNightmare漏洞EXP代码被公开,微软6月补丁无效,并为此分配了新的漏洞编号,目前可通过禁用打印机服务或移除Pre-Windows 2000 Compatible Access用户组的所有用户来降低漏洞利用风险。
https://mp.weixin.qq.com/s/MjLPFuFJobkDxaIowvta7A
https://doublepulsar.com/zero-day-for-every-supported-windows-os-version-in-the-wild-printnightmare-b3fdb82f840c
https://twitter.com/gentilkiwi/status/1410621282446495749
CVE-2021-1675 PrintNightmare漏洞EXP的C#实现
https://github.com/cube0x0/CVE-2021-1675/tree/main/SharpPrintNightmare
https://github.com/cube0x0/CVE-2021-1675
CVE-2021-1675 PrintNightmare漏洞利用检测Sigma规则
https://github.com/SigmaHQ/sigma/pull/1593/files
Exchage Server集成AMSI,能够扫描发送到 Exchange Server 的 HTTP 请求中的内容,并在 Exchange Server 处理恶意请求之前阻止恶意请求
https://techcommunity.microsoft.com/t5/exchange-team-blog/released-june-2021-quarterly-exchange-updates/ba-p/2459826
思科身份服务引擎漏洞组合拳:从xss、低权限用户java反序列化远程rce和提权漏洞拿下思科身份服务引擎系统
https://github.com/pedrib/PoC/blob/master/advisories/Cisco/cisco_ise_rce.md
绕过白名单csp执行xss的经过(paypal的漏洞赏金writeup)
https://portswigger.net/research/finding-dom-polyglot-xss-in-paypal-the-easy-way
通过利用npm,python,ruby等语言对于公共依赖(dependency)的特征,可上传恶意的依赖包,从而在build的过程中执行代码
https://medium.com/@alex.birsan/dependency-confusion-4a5d60fec610
https://0xsapra.github.io/website//Exploiting-Dependency-Confusion
MacOS持久化之XQuartz
https://theevilbit.github.io/beyond/beyond_0018/
红队行动的10条OPSEC原则
https://blog.sektor7.net/#!res/2021/opdec.md
从逃逸和提权的角度,分析QEMU的工作原理以及行为
https://github.com/rafaeldtinoco/howtos/blob/main/KVM-Security-Matters.md
谷歌云gcp通过攻击dhcp弱配置,可远程拿取虚拟机ssh密钥
https://github.com/irsl/gcp-dhcp-takeover-code-exec
云安全渗透测试pentest-book
https://pentestbook.six2dez.com
VNC服务相关的渗透测试:密码爆破,哈希抓取和破解,配置文件查阅等
https://www.hackingarticles.in/vnc-penetration-testing/
打造钓鱼的基础设施:域名、dns、spf、dkim、dmarc、ptr、ssl证书
https://www.xanthus.io/mastering-the-simulated-phishing-attack/
CVE-2021-1665漏洞分析:windows图形设备接口GDI+ RCE
https://www.mcafee.com/blogs/other-blogs/mcafee-labs/analyzing-cve-2021-1665-remote-code-execution-vulnerability-in-windows-gdi/
Mac程序沙箱逃逸:CVE-2020-9971利用microsoft office提权
https://perception-point.io/using-cve-2020-9971-to-escape-microsoft-offices-app-sandbox/
CVE-2021-27850:Apache Tapestry框架漏洞RCE POC
https://github.com/kahla-sec/CVE-2021-27850_POC
M01N Team
聚焦高级攻防对抗热点技术
绿盟科技蓝军技术研究战队
推荐站内搜索:最好用的开发软件、免费开源系统、渗透测试工具云盘下载、最新渗透测试资料、最新黑客工具下载……
还没有评论,来说两句吧...