Last Week in Security (LWiS) - 2026-02-09
嗯,用户让我用中文总结这篇文章,控制在100字以内,而且不需要特定的开头。首先,我得通读整篇文章,了解主要内容。 文章是关于过去一周的网络安全新闻、技术和工具的综述。里面提到了FBI因苹果的Lockdown模式无法提取iPhone数据,以及微软给FBI提供Bitlocker密钥的问题。这些都是新闻部分。 然后是技术与漏洞部分,包括利用AI生成漏洞、NetSupport Manager的RCE漏洞、Azure Blob存储作为C2服务器等。工具和漏洞方面有很多项目,比如PhantomSec、ConfigManBearPig等。 最后还有一些新的技术和工具,比如AI安全研究和数据泄露情况。 总结的时候需要涵盖主要事件和技术点,同时保持简洁。要确保在100字以内,所以得挑选最重要的信息:Lockdown模式限制FBI提取数据、微软密钥问题、利用AI生成漏洞、NetSupport RCE、Azure Blob C2等。 这样用户就能快速了解文章的主要内容了。 </think> 文章总结了近期网络安全领域的新闻、技术与工具动态,包括苹果Lockdown模式限制FBI提取iPhone数据、微软提供Bitlocker密钥引发隐私担忧、利用AI生成漏洞及攻击工具等。 2026-2-10 04:59:0 Author: blog.badsectorlabs.com(查看原文) 阅读量:0 收藏

"Negative-day" discovery (@spaceraccoonsec), Exploit gen with LLMs (@seanhn), Harmony LPE (@johnnyspandex + @buffaloverflow), NetSupport Manager RCE (@0xor_solo), Azure blob C2 (@KingOfTheNOPs + @senderend) and more!

Last Week in Security is a summary of the interesting cybersecurity news, techniques, tools and exploits from the past week. This post covers 2026-01-12 to 2026-02-09.

News

Techniques and Write-ups

Tools and Exploits

  • PhantomSec | Advanced Offensive Capabilities Automated - EvadeX Sponsored - EvadeX is an evasion-as-a-service platform for red teams and pentesters who want modern, continuously-updated evasive tradecraft without turning every engagement into an R&D project. Generate highly customizable, low-signature payloads through a simple web workflow so you can tune to the target and stay focused on the engagement. Trusted by teams from small consultancies to the Fortune 10. Get callbacks past EDR today!
  • ConfigManBearPig - PowerShell collector for adding SCCM attack paths to BloodHound with OpenGraph.
  • embbridge - ADB-like device bridge for embedded systems. Shell, file transfer, and firmware dumping for forensics and research.
  • uart-push - Like scp, but over UART serial connections.
  • TopazTerminator - Just another EDR killer.
  • lcre - Wrapper RE tool for CLI.
  • Erebus - Erebus is an Initial Access wrapper for the Mythic Command & Control Server. It utilizes multiple techniques to equip the operator with the right tools, for the right job.
  • Google Groups Reconnaissance Tools - A suite of Go tools for discovering and analyzing publicly accessible Google Workspace groups. These tools help security professionals identify groups with overly permissive settings during authorized security assessments.
  • remnux-mcp-server - MCP server for using the REMnux malware analysis toolkit via AI assistants.
  • the-one-wsl-bof - One WSL BOF to rule them all.
  • AutoPtT - Automated Pass-the-Ticket (PtT) attack. Standalone alternative to Rubeus and Mimikatz for this attack, implemented in C++ and Python.
  • AddUser-SAMR - Create local administrators with the SAMR API (lowest-level technique). Implemented in C#, Python, Rust and Crystal.
  • DuplexSpyCS - A Remote Access Tool developed in C#, enabling complete control of a remote Windows machine, designed for legitimate remote administration and security testing of Windows systems.
  • fawkes - Fawkes is my attempt at a Mythic C2 Agent.
  • shannon - Fully autonomous AI hacker to find actual exploits in your web apps. Shannon has achieved a 96.15% success rate on the hint-free, source-aware XBOW Benchmark.
  • agscript_middleware - Run CobaltStrike aggressorscript over TCP.
  • BloodBash - A Bloodhound alternative. BloodBash will ingest the same files bloodhound does but no server is required to use this tool. It's great for quick AD enumeration.
  • skills - Trail of Bits Claude Code skills for security research, vulnerability detection, and audit workflows.
  • beignet - MacOS Shared Library to Shellcode Loader.
  • Cobaltstrike_BOFLoader - open source port/reimplementation of the Cobalt Strike BOF Loader as is.

New to Me and Miscellaneous

This section is for news, techniques, write-ups, tools, and off-topic items that weren't released last week but are new to me. Perhaps you missed them too!

  • Antide's Law - "If it's unclear what a cyber-security company is doing, what they're doing is pretty clear (exploits/capabilities)."
  • What AI Security Research Looks Like When It Works - This is a marketing post, but the fact that curl accepted multiple vulnerabilities from their scanner instantly gives it credibility. Are we seeing AI powered automated vulnerability discovery that is better than any single human and scalable with money/chips/power instead of very hard to find talent? Probably very close. Are defenses at the same watershed moment? I haven't seen it. Should we be concerned about this imbalance? Yes.
  • Owning a $5M data center - Cool to see a company reject the cloud and build their own AI datacenter.
  • Incident Report: CVE-2024-YIKES - This feels too real.
  • HolyGrail - BYOVD hunter to help prioritize windows drivers worth manual analysis.

Techniques, tools, and exploits linked in this post are not reviewed for quality or safety. Do your own research and testing.


文章来源: https://blog.badsectorlabs.com/last-week-in-security-lwis-2026-02-09.html
如有侵权请联系:admin#unsafe.sh