每周蓝军技术推送(2024.9.28-10.11) | CTF导航
Tags
maec-delivery-vectors: | Watering Hole |
attack-pattern: | Models Phishing - T1660 Phishing - T1566 Tool - T1588.002 Connection Proxy - T1090 |
Common Information
Type | Value |
---|---|
UUID | 3282d832-dce8-4e3a-8cce-b72c45360d04 |
Fingerprint | 535bc348f56adf32 |
Analysis status | DONE |
Considered CTI value | -2 |
Text language | |
Published | Sept. 28, 2024, midnight |
Added to db | Oct. 11, 2024, 2:20 p.m. |
Last updated | Nov. 17, 2024, 7:44 p.m. |
Headline | 每周蓝军技术推送(2024.9.28-10.11) |
Title | 每周蓝军技术推送(2024.9.28-10.11) | CTF导航 |
Detected Hints/Tags/Attributes | 11/2/80 |
Source URLs
Redirection | Url | |
---|---|---|
Details | Source | https://www.ctfiot.com/208958.html |
URL Provider
RSS Feed
Details | Id | Enabled | Feed title | Url | Added to db |
---|---|---|---|---|---|
Details | 426 | ✔ | CTF导航 | https://www.ctfiot.com/feed | 2024-08-30 22:08 |
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | CVE | 44 | cve-2024-45409 |
|
Details | CVE | 12 | cve-2024-7479 |
|
Details | CVE | 12 | cve-2024-7481 |
|
Details | CVE | 7 | cve-2024-44193 |
|
Details | CVE | 1 | cve-2024-20696 |
|
Details | CVE | 52 | cve-2024-5910 |
|
Details | CVE | 43 | cve-2024-9464 |
|
Details | Domain | 2 | iq.thc.org |
|
Details | Domain | 1 | www.fitretech.com |
|
Details | Domain | 4127 | github.com |
|
Details | Domain | 26 | posts.specterops.io |
|
Details | Domain | 208 | mp.weixin.qq.com |
|
Details | Domain | 8 | blog.projectdiscovery.io |
|
Details | Domain | 4 | itm4n.github.io |
|
Details | Domain | 7 | pgj11.com |
|
Details | Domain | 2 | clearbluejar.github.io |
|
Details | Domain | 24 | www.horizon3.ai |
|
Details | Domain | 10 | trustedsec.com |
|
Details | Domain | 5 | www.vectra.ai |
|
Details | Domain | 154 | arxiv.org |
|
Details | Domain | 18 | speakerdeck.com |
|
Details | Domain | 23 | permiso.io |
|
Details | Domain | 37 | openai.com |
|
Details | Domain | 101 | www.elastic.co |
|
Details | Domain | 1 | ax.attacksurge.com |
|
Details | Domain | 19 | www.huntress.com |
|
Details | File | 1 | 基于rust仅使用ntapi转储lsass.exe |
|
Details | File | 155 | horizon3.ai |
|
Details | File | 7 | vectra.ai |
|
Details | Github username | 3 | decoder-it |
|
Details | Github username | 1 | teach2breach |
|
Details | Github username | 3 | namazso |
|
Details | Github username | 2 | safedv |
|
Details | Github username | 1 | mlcsec |
|
Details | Github username | 1 | friends-security |
|
Details | Github username | 3 | petergabaldon |
|
Details | Github username | 1 | mbog14 |
|
Details | Github username | 8 | googleprojectzero |
|
Details | Github username | 11 | horizon3ai |
|
Details | Github username | 1 | vectra-ai-research |
|
Details | Github username | 1 | agiresearch |
|
Details | Github username | 1 | h4nm |
|
Details | Github username | 1 | attacksurge |
|
Details | Url | 1 | https://iq.thc.org/bypassing-noexec-and-executing-arbitrary-binaries内网渗透paranoia:通过物理访问攻击加入域的计算机https://www.fitretech.com/blog/par... |
|
Details | Url | 1 | https://iq.thc.org/bypassing-noexec-and-executing-arbitrary-binaries |
|
Details | Url | 1 | https://www.fitretech.com/blog/paranoia |
|
Details | Url | 1 | https://github.com/decoder-it/krbrelay-smbserver |
|
Details | Url | 1 | https://github.com/teach2breach/noldr |
|
Details | Url | 1 | https://github.com/namazso/dll-proxy-generator |
|
Details | Url | 1 | https://posts.specterops.io/dotnet-source-generators-in-2024-part-1-getting-started-76d619b633f5 |
|
Details | Url | 1 | https://github.com/safedv/rustivedump |
|
Details | Url | 1 | https://github.com/mlcsec/edrenum-bof |
|
Details | Url | 1 | https://github.com/friends-security/sharpexclusionfinder |
|
Details | Url | 1 | https://mp.weixin.qq.com/s/csztzvsbuexf9a-7tsmwvw |
|
Details | Url | 1 | https://mp.weixin.qq.com/s/pvikx0fdnzzo5idm3-nssg |
|
Details | Url | 2 | https://blog.projectdiscovery.io/ruby-saml-gitlab-auth-bypass |
|
Details | Url | 1 | https://itm4n.github.io/printnightmare-not-over |
|
Details | Url | 3 | https://github.com/petergabaldon/cve-2024-7479_cve-2024-7481 |
|
Details | Url | 3 | https://pgj11.com/posts/finding-teamviewer-0days-part-1 |
|
Details | Url | 3 | https://pgj11.com/posts/finding-teamviewer-0days-part-2 |
|
Details | Url | 3 | https://pgj11.com/posts/finding-teamviewer-0days-part-3 |
|
Details | Url | 1 | https://github.com/mbog14/cve-2024-44193 |
|
Details | Url | 1 | https://clearbluejar.github.io/posts/patch-tuesday-diffing-cve-2024-20696-windows-libarchive-rce |
|
Details | Url | 1 | https://github.com/googleprojectzero/sockfuzzer |
|
Details | Url | 4 | https://www.horizon3.ai/attack-research/palo-alto-expedition-from-n-day-to-full-compromise |
|
Details | Url | 2 | https://github.com/horizon3ai/cve-2024-9464 |
|
Details | Url | 1 | https://trustedsec.com/blog/kicking-it-old-school-with-time-based-enumeration-in-azure |
|
Details | Url | 1 | https://www.vectra.ai/blog/halberd-the-open-source-tool-democratizing-multi-cloud-security-testing |
|
Details | Url | 1 | https://github.com/vectra-ai-research/halberd |
|
Details | Url | 1 | https://arxiv.org/pdf/2410.02644 |
|
Details | Url | 1 | https://github.com/agiresearch/asb |
|
Details | Url | 1 | https://speakerdeck.com/jmortega/security-and-auditing-tools-in-large-language-models-llm |
|
Details | Url | 1 | https://permiso.io/blog/exploiting-hosted-models |
|
Details | Url | 1 | https://openai.com/global-affairs/an-update-on-disrupting-deceptive-uses-of-ai |
|
Details | Url | 1 | https://www.microsoft.com/en-us/security/blog/2024/10/08/file-hosting-services-misused-for-identity-phishing |
|
Details | Url | 1 | https://www.elastic.co/pdf/elastic-global-threat-report-2024 |
|
Details | Url | 1 | https://github.com/h4nm/whoyoucalling |
|
Details | Url | 1 | https://ax.attacksurge.com |
|
Details | Url | 1 | https://github.com/attacksurge/ax |
|
Details | Url | 1 | https://www.huntress.com/blog/hunting-for-m365-password-spraying |