Web安全
利用Bash和OCR技术暴力破解图像验证码
https://zth33d.medium.com/brute-force-attacks-with-image-captcha-bypass-using-bash-script-and-ocr-2dc05b69f2d9
PHP从内存中加载扩展程序
https://adepts.of0x.cc/dlopen-from-memory-php/
终端对抗
从受Windows Defender Credential Guard保护的加密凭据中恢复NTLM哈希
https://research.ifcr.dk/pass-the-challenge-defeating-windows-defender-credential-guard-31a892eee22
RatInject:通过4个注册表项在Windows中实现不可检测的持久化
https://github.com/S12cybersecurity/RatInject
通过在堆栈上分配大的有效负载规避Windows 10上的Windows Defender检测
https://steve-s.gitbook.io/0xtriboulet/deceiving-defender/deceiving-defender-the-big-stack-bypass
Blindside:使用硬件断点注入命令以规避EDR和XDR
https://github.com/CymulateResearch/Blindside
ShellcodeMutator:使用无指令集改变nasm程序集源文件nops以避免检测
https://github.com/nettitude/ShellcodeMutator
使用CLR方法的API调用Hook绕过AMSI
https://practicalsecurityanalytics.com/new-amsi-bypass-using-clr-hooking/
ASRenum-BOF:Cobalt Strike BOF识别攻击面减少 (ASR) 规则、操作和排除位置
https://github.com/mlcsec/ASRenum-BOF
实战场景中Cobalstrike的二次开发
https://mp.weixin.qq.com/s/R1BoWivtTxo0zFk4nyBFTw
fakeshell:模拟类似Linux系统的沙箱环境
https://github.com/phishing-hunter/fakeshell
漏洞相关
CVE-2022-41040、CVE-2022-41082:Exchange SSRF和RCE漏洞
https://securelist.com/cve-2022-41040-and-cve-2022-41082-zero-days-in-ms-exchange/108364/
CVE-2022-46175:JSON5原型污染漏洞
https://securityonline.info/cve-2022-46175-json5-prototype-pollution-vulnerability/
CVE-2022-27510、CVE-2022-27518:Citrix ADC和网关未授权访问和RCE漏洞
https://blog.fox-it.com/2022/12/28/cve-2022-27510-cve-2022-27518-measuring-citrix-adc-gateway-version-adoption-on-the-internet/
CVE-2022-42046:wfshbr64.sys权限提升漏洞PoC
https://github.com/kkent030315/CVE-2022-42046
SNI代理错误配置导致的SSRF漏洞
https://www.invicti.com/blog/web-security/ssrf-vulnerabilities-caused-by-sni-proxy-misconfigurations/
云安全
Azure利用CBA证书身份验证实现无密码持久化和特权提升
https://posts.specterops.io/passwordless-persistence-and-privilege-escalation-in-azure-98a01310be3f
其他
供应链安全:威胁和缓解措施的评估
https://engineering.mercari.com/en/blog/entry/20221215-supplychain-security-reevaluation/
AskJoe :利用ChatGPT辅助Ghidra进行恶意软件分析
https://github.com/securityjoes/ThreatResearch/
PPEditor:内核模式WinDbg扩展,用于编辑进程的保护级别
https://github.com/daem0nc0re/TangledWinExec/tree/main/ProtectedProcess#ppeditor
DCMB:在不使用签名或跨多个Windows版本偏移的情况下找到内核回调列表/数组
https://github.com/GetRektBoy724/DCMB
M01N Team公众号
聚焦高级攻防对抗热点技术
绿盟科技蓝军技术研究战队
官方攻防交流群
网络安全一手资讯
攻防技术答疑解惑
扫码加好友即可拉群
往期推荐