Last Week in Security (LWiS) - 2025-09-02
本文总结了近期网络安全事件与技术,包括Salesforce数据泄露、Azure弱ACL攻击路径及DLL侧载攻击等。 2025-9-3 03:59:0 Author: blog.badsectorlabs.com(查看原文) 阅读量:9 收藏

Azure AD via weak ACLS (@xybytes), HTTP stealth proxy (@IAmMandatory), Dll sideloading for initial access (@Print3M_), kernel-hack-drill (@a13xp0p0v), Sitecore RCE (@chudyPB), and more!

Last Week in Security is a summary of the interesting cybersecurity news, techniques, tools and exploits from the past week. This post covers 2025-08-25 to 2025-09-02.

News

Techniques and Write-ups

Tools and Exploits

  • ADSyncDump-BOF - The ADSyncDump BOF is a port of Dirk-Jan Mollema's adconnectdump.py / ADSyncDecrypt into a Beacon Object File (BOF) with zero dependencies.
  • thermoptic - A next-generation HTTP stealth proxy which perfectly cloaks requests as the Chrome browser across all layers of the stack.
  • DllShimmer - Weaponize DLL hijacking easily. Backdoor any function in any DLL.
  • UpSkope - Custom IPC Client and Proof of Concept exploit for CVE-2025-0309 (Netskope Windows Client LPE).
  • NTSleuth - Comprehensive Windows Syscall Extraction & Analysis Framework.
  • BYOVD-DriverKiller - Driver Reversing & Exploitation.
  • VMDragonSlayer - Automated multi-engine framework for unpacking, analyzing, and devirtualizing binaries protected by commercial and custom Virtual Machine based protectors. Combines Dynamic Taint Tracking, Symbolic Execution, Pattern & Semantic Classification, and Machine Learning–driven prioritization to dramatically reduce manual reverse engineering time.

New to Me and Miscellaneous

This section is for news, techniques, write-ups, tools, and off-topic items that weren't released last week but are new to me. Perhaps you missed them too!

Techniques, tools, and exploits linked in this post are not reviewed for quality or safety. Do your own research and testing.


文章来源: https://blog.badsectorlabs.com/last-week-in-security-lwis-2025-09-02.html
如有侵权请联系:admin#unsafe.sh