Aggregator
Cisco智能许可工具漏洞遭攻击者利用,内置后门账户曝光
用SQL注入穿IE沙箱
每一个安全初学者都喜欢问这样一个问题,“我应该做web安全还是做二进制安全,哪个更有意思?哪个更有钱途?”
二进制安全就只等于反汇编,逆向,调试,内核 ……?
Web安全就只等于XSS,SQL注入,CSRF,webshell ……?
当两者结合起来的时候会发生什么美妙的事情呢?
一个典型的Web系统运行于Linux平台,使用Apache作为服务器,用PHP完成功能逻辑,重要数据存储在MySQL数据中,接收用户输入并返回信息。对于客户端软件来说其实也存在类似的架构,软件运行在Windows系统上,用C/C++完成功能逻辑,可能用SQLite存储重要数据,支持进程间通信。
那么在二进制漏洞挖掘中是否可用使用Web漏洞挖掘的思路呢?
笔者在研究某客户端软件时发现了一个非常有意思的逻辑安全漏洞。本文笔者将展示如何使用客户端软件中存在的SQL注入漏洞,实现本地权限提升,使用漏洞可以绕过IE沙箱等的限制,在高权限进程的上下文中执行任意代码。
UK NCSC Sets 2035 Deadline for Post-Quantum Migration
The British cybersecurity agency urged critical infrastructure operators to adapt to post-quantum cryptography by 2035 as it and other government agencies prepare for the inevitability of quantum computers capable of breaking current encryption algorithms.
公私合作:网络安全行业增长与成熟的催化剂
安卓设备被Root后遭遇攻击的风险激增3000倍,iPhone亦不安全
Цифровые наёмники с ИИ: государства привлекают хакеров для политических атак
Why No-Reply Emails Are a Cybersecurity Hazard
No-reply emails may seem convenient, but they pose serious cybersecurity risks. Learn how they enable phishing, spoofing, and financial fraud—and how to protect your business.
The post Why No-Reply Emails Are a Cybersecurity Hazard appeared first on Security Boulevard.
CVE-2024-13881 | Link My Posts Plugin up to 1.0 on WordPress cross site scripting
CVE-2024-13880 | My Quota Plugin up to 1.0.8 on WordPress cross site scripting
CVE-2024-13877 | Passbeemedia Web Push Notification Plugin up to 1.0.0 on WordPress cross site scripting
CVE-2024-13878 | SpotBot Plugin up to 0.1.8 on WordPress cross site scripting
CVE-2024-13875 | WP-PManager Plugin up to 1.2 on WordPress cross site scripting
CVE-2024-13876 | mEintopf Plugin up to 0.2.1 on WordPress cross site scripting
2025 AI大模型安全防护:AI安全部署实战指南
面向漏洞编程:如何让AI编程助手生成带后门的代码
5 pitfalls that can delay cyber incident response and recovery
The responsibility of cyber incident response falls squarely on the shoulders of the CISO. And many CISOs invest heavily in technical response procedures, tabletop exercises and theoretical plans only to find out that when an actual breach strikes the organization is not as prepared as it should be. Every event is unique and can introduce unforeseen complications, and the chaos of the moment can quickly derail even the best laid plans. But CISOs can improve … More →
The post 5 pitfalls that can delay cyber incident response and recovery appeared first on Help Net Security.