每周蓝军技术推送(2024.9.7-9.13)

科技   2024-09-13 18:01   北京  


Web安全


借助mTLS身份认证机制,绕过多重身份验证 (MFA)

https://edermi.github.io/post/2024/mfa_bypass_mtls/


内网渗透


BloodHound 中的 ADCS 攻击路径-第3部分

https://posts.specterops.io/adcs-attack-paths-in-bloodhound-part-3-33efb00856ac

从Linux操作系统攻击AD域

https://gatari.dev/posts/the-art-of-exploiting-ad-from-linux/

Impacket的ZSH Shell集成

https://github.com/dadevel/impacket-zsh-integration

Personal-Vault-BEK:破解OneDrive的个人保险库,读取加密文件

https://malwaremaloney.blogspot.com/2024/09/cracking-onedrives-personal-vault.html

https://github.com/Beercow/Personal-Vault-BEK


终端对抗


EchoStrike:Golang实现的持久化反向shell

https://github.com/stivenhacker/EchoStrike

GhostStrike:基于异或加密与进程镂空的载荷加载器

https://github.com/stivenhacker/GhostStrike

goffloader:Golang实现的BOF加载器

https://github.com/praetorian-inc/goffloader

NtDumpBOF:Native Dump凭据转储工具的BOF版本

https://github.com/deh00ni/NtDumpBOF

remote_wrapper:可扩展的Mythic包装器,允许远程封装载荷

https://github.com/Flangvik/remote_wrapper

从“Potatoes”说起,Windows权限提升的10年发展

https://www.youtube.com/watch?v=rPZx1zbKJnI

为何内核级ETW是最好的,揭秘未公开日志结构

https://www.elastic.co/security-labs/kernel-etw-best-etw


漏洞相关


CVE-2024-38014:Windows MSI安装器SYTEM权限提升漏洞

https://sec-consult.com/blog/detail/msi-installer-repair-to-system-a-detailed-journey/

msiscan:扫描MSI安装包中的本地权限提升漏洞

https://github.com/sec-consult/msiscan

MSI文件的漏洞挖掘与滥用分析

https://cicada-8.medium.com/evil-msi-a-long-story-about-vulnerabilities-in-msi-files-1a2a1acaf01c

CVE-2024-26230:Windows telephony 服务UAF本地提权漏洞EXP

https://github.com/Wa1nut4/CVE-2024-26230

CVE-2024-30051:Windows DWM核心库权限提升漏洞分析

https://www.coresecurity.com/core-labs/articles/windows-dwm-core-library-elevation-privilege-vulnerability-cve-2024-30051

低完整性权限下利用CVE-2021-31956 Windows 内核堆溢出漏洞

https://3sjay.github.io/2024/09/08/Windows-Kernel-Pool-Exploitation-CVE-2021-31956-Part1.html

CVE-2024-41498:IOMap64.sys 物理内存读写漏洞

https://blog.reveng.ai/physmem-e-when-kernel-drivers-peek-into-memory/

CVE-2024–27394:分析TCP-AO UAF漏洞,深入研究RCU条件竞争

https://blog.theori.io/deep-dive-into-rcu-race-condition-analysis-of-tcp-ao-uaf-cve-2024-27394-f40508b84c42

CVE-2024-40711:Veeam Backup & Replication 认证/未认证 RCE漏洞分析

https://labs.watchtowr.com/veeam-backup-response-rce-with-auth-but-mostly-without-auth-cve-2024-40711-2/

CVE-2023-27532:Veeam Backup & Replication 身份认证绕过漏洞细节批漏

https://blog.scrt.ch/2024/09/10/getting-code-execution-on-veeam-through-cve-2023-27532

CVE-2024-5274:Chrome V8 JavaScript解析器越界读写漏洞分析

https://www.darknavy.org/blog/cve_2024_5274_a_minor_flaw_in_v8_parser_leading_to_catastrophes/

COMThanasia:COM漏洞挖掘分析辅助套件

https://github.com/CICADA8-Research/COMThanasia

使用Angr挖掘现实目标的漏洞

https://plowsec.github.io/angr-introspection-2024.html


云安全


Microsoft Intune如何被滥用于混合身份环境中的横向移动

https://securityintelligence.com/x-force/detecting-intune-lateral-movement/

利用错误配置的 GitLab OIDC AWS IAM 角色

https://hackingthe.cloud/aws/exploitation/Misconfigured_Resource-Based_Policies/exploiting_misconfigured_gitlab_oidc_aws_iam_roles/


人工智能和安全


OpenAI发布o1系统新模型,基于思维链的强化学习使模型具备自我矫正能力

https://openai.com/index/introducing-openai-o1-preview/

https://openai.com/index/learning-to-reason-with-llms/

https://cdn.openai.com/openai-preparedness-framework-beta.pdf

提高大型语言模型安全性的分步指南

https://cloudsecurityalliance.org/blog/2024/09/10/a-step-by-step-guide-to-improving-large-language-model-security

针对LLM进行红队测试的综合指南

https://www.aporia.com/learn/red-teaming-large-language-models/

基于LLM的边缘智能:架构、应用、安全的综合调查

https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10669603

探索LLM用于恶意软件检测

https://arxiv.org/pdf/2409.07587


其他


Chrome浏览器常见攻击方式与检测日志源

https://trustedsec.com/blog/when-on-workstation-do-as-the-local-browsers-do

edr-artifacts:收集EDR产品网络与主机工件信息,帮助搜寻潜在滥用

https://github.com/cbecks2/edr-artifacts


M01N Team公众号

聚焦高级攻防对抗热点技术

绿盟科技蓝军技术研究战队

官方攻防交流群

网络安全一手资讯

攻防技术答疑解惑

扫码加好友即可拉群


往期推荐

每周蓝军技术推送(2024.8.31-9.6)

每周蓝军技术推送(2024.8.24-8.30)

每周蓝军技术推送(2024.8.17-8.23)

M01N Team
研战一体,以攻促防,共筑网络安全未来!
 最新文章