Last Week in Security (LWiS) - 2026-02-23
嗯,用户让我总结这篇文章的内容,控制在一百个字以内,而且不需要特定的开头。我得先仔细阅读文章,找出主要的信息点。 文章看起来是关于过去一周的网络安全新闻、技术、工具和漏洞的综述。里面提到了Firefox的RCE漏洞,Havoc Professional的发布,afd.sys的UAF漏洞,macOS的JIT滥用,还有AEMonitor工具。这些都是主要的技术点。 另外,还有一些新闻部分,比如Palo Alto没有将中国与网络攻击联系起来,以及Claude Code Security这样的产品发布。技术方面还有如何利用拼写错误导致RCE,构建安全的Electron自动更新器等等。 工具和漏洞方面提到了PhantomSec、ludus_windows_smb_share、ghleaks等工具。还有一些新的安全研究和资源,比如sns-buster、studio等。 综合来看,我需要把这些关键点浓缩到100字以内。要确保涵盖主要的技术漏洞、工具发布以及相关的新闻事件。 可能的结构是:提到主要漏洞(Firefox RCE、afd.sys UAF、macOS JIT),工具发布(Havoc Professional、AEMonitor),以及一些重要的新闻或技术趋势(如Palo Alto的决策、Claude Code Security)。同时还要提到其他相关技术如初始访问攻击和防御工具。 最后检查字数是否在限制内,并确保语言简洁明了。 </think> 文章总结了过去一周的网络安全动态,包括Firefox远程代码执行漏洞、afd.sys内存释放后使用漏洞、macOS JIT滥用技术等关键安全问题。还介绍了Havoc Professional专业版发布、AEMonitor工具等功能,并涉及初始访问攻击防御及云密码管理器安全性分析等内容。 2026-2-24 04:59:0 Author: blog.badsectorlabs.com(查看原文) 阅读量:5 收藏

Firefox RCE (@kqx_io), Havoc Professional (@C5pider + @0xC4RN4GE + @avx128), afd.sys UAF (@Dark_Puzzle + @Bad_Jubies), macOS JIT abuse (@kyleavery), AEMonitor (@__pberba__), and more!

Last Week in Security is a summary of the interesting cybersecurity news, techniques, tools and exploits from the past week. This post covers 2026-02-16 to 2026-02-23.

News

Techniques and Write-ups

Tools and Exploits

  • PhantomSec | Advanced Offensive Capabilities Automated - EvadeX Sponsored - EvadeX is an evasion-as-a-service platform for red teams and pentesters who want modern, continuously-updated evasive tradecraft without turning every engagement into an R&D project. Generate highly customizable, low-signature payloads through a simple web workflow so you can tune to the target and stay focused on the engagement. Trusted by teams from small consultancies to the Fortune 10. Get callbacks past EDR today!

CAPSlock is an offline Conditional Access (CA) analysis tool built on top of a roadrecon database. It helps defenders, auditors, and red teams understand how Conditional Access policies actually behave, not just how they are configured. Read more at: STOP THE CAP: Making Entra ID Conditional Access Make Sense Offline.

  • GhostShellGarden - A multi-runtime research anthology demonstrating in-memory credential harvesting against running web servers.
  • processhacker-mcp - your ai debugger, vibe hacking tool.
  • titus - High-performance secrets scanner. CLI, Go library, Burp Suite extension, and Chrome extension. 459 detection rules with live credential validation.
  • lsawhisper-bof - A Beacon Object File (BOF) that talks directly to Windows authentication packages through the LSA untrusted/trusted client interface, without touching LSASS process memory.
  • Splunk Attack Range v5 - The popular attack range has been updated with a new Web app to deploy into the cloud. The use of WireGuard and Ansible roles feels inspired by Ludus 😊. If you want to deploy locally, check out the Ludus guide.

New to Me and Miscellaneous

This section is for news, techniques, write-ups, tools, and off-topic items that weren't released last week but are new to me. Perhaps you missed them too!

Techniques, tools, and exploits linked in this post are not reviewed for quality or safety. Do your own research and testing.


文章来源: https://blog.badsectorlabs.com/last-week-in-security-lwis-2026-02-23.html
如有侵权请联系:admin#unsafe.sh