每日安全资讯-2020.6.3

声明:本文所有内容仅用于学习和研究目的,且不能违反《网络安全法》、《刑法》等相关要求,尤其禁止传播,或用于非善良目的。您查看本文,即视为遵守以上约定,否则责任自负。

今日导读:对新Team9恶意软件家族的深入分析、Mustang Panda最近的活动-使用临时C2服务器的Dll-Sideloading木马、全面接管VMware Cloud Director(CVE-2020-3956)-分析,利用和PoC利用、新的冷启动攻击影响了七年的LG Android智能手机、Kubernetes中RCE漏洞分析、Excel 4.0宏武器化的演变等。

【病毒区】
1、In-depth analysis of the new Team9 malware family

2、Mustang Panda Recent Activity: Dll-Sideloading trojans with temporal C2 servers
https://lab52.io/blog/mustang-panda-recent-activity-dll-sideloading-trojans-with-temporal-c2-servers/

【漏洞分析区】
3、Full infrastructure takeover of VMware Cloud Director (CVE-2020-3956) - analysis, exploitation and PoC exploit

4、UAF in chrome chrome!content::BrowserAccessibilityManager::GetFromAXNode($20000)
https://bugs.chromium.org/p/chromium/issues/detail?id=1055393

5、New cold boot attack affects seven years of LG Android smartphones

6、VMware Workstation 15 denial-of-service vulnerability

7、Remote command execution by using the internal dumped credentials in Kubernetes(CVE-2020-8555)

【技术分享区】
8、Evolution of Excel 4.0 Macro Weaponization

9、Pwn2Own or Not2Pwn, Part 2.5: A brief tale of free 0days

10、Detecting and Advancing In-Memory .NET Tradecraft
https://www.mdsec.co.uk/2020/06/detecting-and-advancing-in-memory-net-tradecraft/

11、Attacking FreeIPA — Part I Authentication

12、Attacking FreeIPA — Part II Enumeration

13、Attacking FreeIPA — Part III: Finding A Path

14、APC Series: User APC Internals
https://repnz.github.io/posts/apc/kernel-user-apc-api/

#工具#CVE-2020-1066-EXP支持Windows 7和Windows Server 2008 R2操作系统提权工具

#工具#RCE PoC for CVE-2020-0796 “SMBGhost”

#工具#SQLancer (Synthesized Query Lancer) is a tool to automatically test Database Management Systems (DBMS) in order to find logic bugs in their implementation.

#工具#PoC for cve-2020-10136:A flaw in the IP-in-IP tunneling protocol that can be exploited for DoS attacks and to bypass security controls impact devices from Cisco and other vendors

#工具#o365enum:Enumerate valid usernames from Office 365 using ActiveSync, Autodiscover v1, or office.com login page
https://github.com/gremwell/o365enum