每日安全资讯-2020.2.10

声明:本文所有内容仅用于学习和研究目的,且不能违反《网络安全法》、《刑法》等相关要求,尤其禁止传播,或用于非善良目的。您查看本文,即视为遵守以上约定,否则责任自负。

今日导读:新年期间将自己包装成礼物的垃圾邮件和网络钓鱼、Sudo:从崩溃到本地提权分析、Windows 7至Windows 10中的Dejablue漏洞分析、从内存损坏到disable_functions bypass、伪造SWIFT MT付款消息、AppLocker分析等。

【病毒区】
1、MyCERT Advisory - Espionage campaign targeting Malaysia government officials
2、Happy New Fear! Gift-wrapped spam and phishing

【漏洞分析区】
3、oob_timestamp is a proof-of-concept research exploit that exports the kernel task port on iOS 13.3 17C54 on the iPhone12,3
4、Sudo:From Crash to Local Privilege Escalation(CVE-2019-18634)
5、Dejablue Vulnerabilities in Windows 7 to Windows 10(CVE-2019-1181&CVE-2019-1182)
6、V3 Behavior Detection for File Vulnerability in IE Vulnerability (CVE-2019-1367)

【技术分享区】
7、From memory corruption to disable_functions bypass: understanding PHP exploits
8、Forging SWIFT MT Payment Messages for fun and pr… research!
9、The Internals of AppLocker - Part 1 - Overview and Setup
10、The Internals of AppLocker - Part 2 - Blocking Process Creation
11、The Internals of AppLocker - Part 3 - Access Tokens and Access Checking
12、The Internals of AppLocker - Part 4 - Blocking DLL Loading
13、Demystifying Browsers
14、SecWiki周刊(2020/02/03-2020/02/09)

2 1