服务粉丝

我们一直在努力
当前位置:首页 > 财经 >

每日安全动态推送(2-16)

日期: 来源:腾讯玄武实验室收集编辑:admin
Tencent Security Xuanwu Lab Daily News

• [Tools] Reversing The EVM: Raw Calldata:
https://degatchi.com/articles/reading-raw-evm-calldata

   ・ EVM中calldata编码与解码 – keenan


• How to get a heart attack while using JEB decompiler:
https://blog.stmcyber.com/how-to-get-a-heart-attack-while-using-jeb-decompiler/

   ・ JEB在逆向时会在沙箱中执行目标程序的代码,但在Java 18中不使用指定flag则沙箱不会被开启,此时代码会直接在环境中执行,给JEB使用者带来风险。 – keenan


• [Tools] 100 Red Team Projects for Pentesters and Network Managers:
https://github.com/kurogai/100-redteam-projects

   ・ 100 Red Team Projects for Pentesters and Network Managers – lanying37


• [Malware] Cybercriminals Bypass ChatGPT Restrictions to Generate Malicious Content:
https://blog.checkpoint.com/2023/02/07/cybercriminals-bypass-chatgpt-restrictions-to-generate-malicious-content/

   ・ 通过直接调用text-davinci-003可以绕过chatgpt content filtering。不过严格意义上来说text-davinci-003和chatgpt并不是同一个模型 – Atum


• [Tools] A Different Payload for CVE-2022-47966:
https://vulncheck.com/blog/cve-2022-47966-payload

   ・ Apache xmlsec 相关软件远程代码执行漏洞(CVE-2022-47966)的另外一种payload,可以绕过一些公开的漏洞利用检测。 – P4nda


• GitLab GitHub Repo Import Deserialization Remote Code Execution:
https://packetstormsecurity.com/files/171008

   ・ 一个gitlab导入github repo的反序列化漏洞的exp – Atum


• [PDF] https://martinschwarzl.at/media/files/thesis_main.pdf:
https://martinschwarzl.at/media/files/thesis_main.pdf

   ・ 远程侧信道攻击与防御 – keenan


* 查看或搜索历史推送内容请访问:
https://sec.today

* 新浪微博账号:腾讯玄武实验室
https://weibo.com/xuanwulab


相关阅读

  • 每日安全动态推送(2-17)

  • Tencent Security Xuanwu Lab Daily News• Linux内核常用保护和绕过技术:http://blog.topsec.com.cn/linux%e5%86%85%e6%a0%b8%e5%b8%b8%e7%94%a8%e4%bf%9d%e6%8a%a4%e5%92
  • 每日安全动态推送(2-20)

  • Tencent Security Xuanwu Lab Daily News• I'm Building a Self-Destructing USB Drive:https://interruptlabs.ca/2022/07/29/I-m-Building-a-Self-Destructing-USB-Drive
  • 每日安全动态推送(2-21)

  • Tencent Security Xuanwu Lab Daily News• [Tools] r/netsec - mast1c0re: Part 3 – Escaping the PS5 emulator:https://www.reddit.com/r/netsec/comments/115u6xc/mast
  • 每日安全动态推送(2-22)

  • Tencent Security Xuanwu Lab Daily News• Open source solution replicates ChatGPT training process! Ready to go with only 1.6GB GPU memory and gives you 7.73 tim
  • 每日安全动态推送(2-24)

  • Tencent Security Xuanwu Lab Daily News• [macOS] Built-in macOS Security Tools:https://www.huntress.com/blog/built-in-macos-security-tools ・ 一篇介绍macos自
  • 每日安全动态推送(2-27)

  • Tencent Security Xuanwu Lab Daily News• [Android] The code that wasn’t there: Reading memory on an Android device by accident:https://github.blog/2023-02-23-t
  • HAProxy请求走私漏洞安全风险通告

  • 奇安信CERT致力于第一时间为企业级用户提供安全风险通告和有效解决方案。安全通告HAProxy是一个使用C语言编写的自由及开放源代码软件,其提供高可用性、负载均衡,以及基于TCP

热门文章

  • “复活”半年后 京东拍拍二手杀入公益事业

  • 京东拍拍二手“复活”半年后,杀入公益事业,试图让企业捐的赠品、家庭闲置品变成实实在在的“爱心”。 把“闲置品”变爱心 6月12日,“益心一益·守护梦想每一步”2018年四

最新文章

  • 每日安全动态推送(2-16)

  • Tencent Security Xuanwu Lab Daily News• [Tools] Reversing The EVM: Raw Calldata:https://degatchi.com/articles/reading-raw-evm-calldata ・ EVM中calldata编码与
  • 每日安全动态推送(2-17)

  • Tencent Security Xuanwu Lab Daily News• Linux内核常用保护和绕过技术:http://blog.topsec.com.cn/linux%e5%86%85%e6%a0%b8%e5%b8%b8%e7%94%a8%e4%bf%9d%e6%8a%a4%e5%92
  • 每日安全动态推送(2-20)

  • Tencent Security Xuanwu Lab Daily News• I'm Building a Self-Destructing USB Drive:https://interruptlabs.ca/2022/07/29/I-m-Building-a-Self-Destructing-USB-Drive
  • 每日安全动态推送(2-21)

  • Tencent Security Xuanwu Lab Daily News• [Tools] r/netsec - mast1c0re: Part 3 – Escaping the PS5 emulator:https://www.reddit.com/r/netsec/comments/115u6xc/mast
  • 每日安全动态推送(2-22)

  • Tencent Security Xuanwu Lab Daily News• Open source solution replicates ChatGPT training process! Ready to go with only 1.6GB GPU memory and gives you 7.73 tim
  • 每日安全动态推送(2-24)

  • Tencent Security Xuanwu Lab Daily News• [macOS] Built-in macOS Security Tools:https://www.huntress.com/blog/built-in-macos-security-tools ・ 一篇介绍macos自