漏洞攻擊與防護_攻擊面(Attack Surface)研究資源整理
PS:資料來源於 騰訊玄武實驗室 的 每日安全動態推送 ,本人的工作是進行了部分歸納和整理,後期研究漏洞防護需要用到這部分的內容。版權歸騰訊玄武實驗室,侵刪!
攻擊方向:
1.
[ Exploit ] Privilege Escalation: Manual privilege escalation techniques on Unix and Windows - https://t.co/RDZ5DlHH7w #Hacking #Pentesting #PrivEsc
" Unix 和 Windows 系統中的本地提權技術總結: http://t.cn/R6C2FLB "
2.
[ Windows ] Our #BlueHatIL Slides "Device Guard Attack Surface, Bypasses, and Mitigations " https://1drv.ms/b/s!AjtdNPlVeOS5hTrAHJchDzh7HKsx @ mattifestation @ subTee
" Casey Smith 在 BlueHatIL 會議的演講《Device Guard 的攻擊界面、繞過方法和緩解措施》: https://t.co/H1e4AWgjY6 "
3.
[ Windows ] EXD: An attack surface for Microsoft Office | Fortinet Blog http://ow.ly/10g8Vx
"EXD 文件: Microsoft Office 的一個攻擊界面, 來自 Fortinet Blog: https://t.co/R7kjDxansc"
4.
[ Browser ] @ MarkYason on WinRT PDF: WinRT PDF: A Potential Route for Attacking Edge
"WinRT PDF 是 Edge 瀏覽器的一個新的攻擊界面, WinRT PDF 是 Edge 瀏覽器用於處理 PDF 文件的類庫,最早出現在 Windows 8: https://t.co/GNUuNSQNS5
這篇 Blog 的作者 Mark Yason 在這幾天的 RSA 2016 會議上也有一個相關的演講< EdgeHTML 引擎的攻擊界面和漏洞利用緩解技術>: http://www.rsaconference.com/writable/presentations/file_upload/hta-w04-understanding-the-attack-surface-and-attack-resilience-of-edgehtml.pdf Edge "
5.
[ Browser ] Nice! Mozilla ships its first Rust code in Firefox. Media parsers have been a large attack surface for browsers. Shipping Rust in Firefox
" Mozilla Firefox 48 版本起將在各桌面平台內置 Rust 組件,其中的 MP4 解析器將用 Rust 代碼實現: https://t.co/WLToS14wUA"
6.
[ Browser ] Slowly, but surely reducing Chromium attack surface: https://groups.google.com/a/chromium.org/forum/#!topic/blink-dev/lyuWXZ_1kXo. Thanks @ meacer!
"Blink(Chromium)項目將要禁止通過 標籤、window.open、window.location 打開 view-source, 來自 Blink 郵件組 ︰ https://t.co/P1ygXO13n9 "
7.
[ Windows ] Analysis of the Attack Surface of Windows 10 Virtualization-Based Security : https://www.blackhat.com/docs/us-16/materials/us-16-Wojtczuk-Analysis-Of-The-Attack-Surface-Of-Windows-10-Virtualization-Based-Security.pdf (Slides) #BlackHat2016
" Windows 10 基於虛擬化的安全架構的攻擊面分析,來自 BlackHat 2016 會議,PPT︰ https://t.co/8DLuSWe22u Paper: https://www.blackhat.com/docs/us-16/materials/us-16-Wojtczuk-Analysis-Of-The-Attack-Surface-Of-Windows-10-Virtualization-Based-Security-wp.pdf "
8.
[ Windows ] Windows Meta?les : An Analysis of the EMF Attack Surface & Recent Vulnerabilities : http://www.slideshare.net/PacSecJP/jurczyk-windows-metafilepacsecv2 (Slides) cc @ j00ru
"Windows Meta?les: EMF 的攻擊面和最近的漏洞分析,來自 PacSec 會議︰ https://t.co/gQm5YjT4q0 "
9.
[ Fuzzing ] DIG INTO THE ATTACK SURFACE OF PDF AND GAIN 100+ CVES IN 1 YEAR,來自玄武實驗室 Ke Liu 在 BlackHat Asia 會議的演講,其中分享了他在挖掘 PDF 文件格式漏洞過程中的經驗,包括如何尋找攻擊面以及 Fuzzing 過程中的一些技巧:
10.
[ Windows ] pgboy1988 公開了其在 CanSecWest 2017 會議關於 win32k Composition 攻擊面 演講的 PPT 和兩個漏洞 PoC: progmboy/cansecwest2017
11.
[ Windows ] Check details how I exploit a win32k vulnerability for EoP in Pwn2Own 2016. https://twitter.com/zer0mem/status/791522523003228160
" win32k 的攻擊面以及如何利用它的漏洞在 Pwn2Own 2016 繞過 Edge 的沙箱,來自科恩實驗室研究員的分享《Rainbow Over the Windows: More Colors Than You Could Expect》: https://t.co/UYndiEXj0T http://www.slideshare.net/PeterHlavaty/rainbow-over-the-windows-more-colors-than-you-could-expect "
防禦技術
1.
[ Mitigation ] ROP CFI RAP XNR CPI WTF? – Navigating the Exploit Mitigation Jungle (@f0rki) - https://t.co/NCarLKtGf4 #BSidesLjubljana #video
" BSides 會議上一篇針對 ASLR/CFI 等緩解措施的總結: ROP CFI RAP XNR CPI WTF? - Navigating the Exploit Mitigation Jungle (Michael Rodler) - Security BSidesLjubljana 0x7E1 "
2.
[ Browser ] Understanding EdgeHTML』s Attack Surface and Exploit Mitigations by @ MarkYason - Understanding EdgeHTMLs Attack Surface and Exploit Mitigations
"EdgeHTML 的攻擊界面和漏洞利用緩解措施: https://t.co/lZ0QmfOcud"
3.
[ Browser ] Great attack surface reduction for the Microsoft Edge sandbox in the upcoming Creators Update https://twitter.com/MSEdgeDev/status/844957192818110464
"微軟發了一篇新 Blog,談即將發布的 Windows 10 Creators 中 Edge 沙箱所做的防禦改進措施: Strengthening the Microsoft Edge Sandbox "
4.
[ Windows ] #PacSec decks are up! Go check @j00rus crazy 150 slides on Windows Meta?les and the EMF attack surface...… https://t.co/QWMJiJ7PKc
"windows metafile,演講者主要對 EMF 攻擊面進行了分析,同時分析了最近的一些漏洞,來自 PacSec 2016(slides): https://t.co/QWMJiJ7PKc同時演講者分享了他今年其他的議題: Slides about my Windows Metafile research (Ruxcon, PacSec) and fuzzing (Black Hat EU) now public."
5.
[ Windows ] WINDOWS 10 MITIGATION IMPROVEMENTS: https://www.blackhat.com/docs/us-16/materials/us-16-Weston-Windows-10-Mitigation-Improvements.pdf
"Windows 10 在漏洞利用緩解措施方面的改進,來自微軟研究員在 BlackHat 會議的演講︰ https://t.co/8h4Ju7T5tM BlackHat 會議,除了演講,還有一個稱為 兵器庫 的部分,其中很多工具也值得看看: Black Hat USA 2016 "
推薦閱讀:
※Adobe ColdFusion 任意命令執行漏洞(CVE–2017–11283, CVE–2017–11284)預警
※記一次爬蟲批量爬取exp
※大家都來談談安全漏洞等級的評價吧,你認為怎樣的標準合理呢?怎麼讓業務或者是其他安全團隊接受的你判斷。