Last Week in Security (LWiS) - 2026-03-02
好的,我现在需要帮用户总结一篇文章的内容,控制在100个字以内。首先,我得仔细阅读文章内容,找出主要的信息点。 文章标题提到了SolarWinds RCE、Windows 11的LPE漏洞、机器人RCE等,这些都是安全方面的漏洞和攻击技术。接着,文章分为新闻、技术和工具、新发现等几个部分。 在新闻部分,Google和Cloudflare在推动量子安全的HTTPS,还有关于Google API密钥的新规则变化。技术部分包括利用PCC固件构建虚拟iPhone、SolarWinds的预认证RCE链、Windows的本地权限提升漏洞等。工具部分提到了PhantomSec、airsnitch、MacNoise等工具和框架。 用户要求总结控制在100字以内,不需要特定开头。我需要提炼出关键的技术点和工具,同时保持简洁明了。 可能的结构是:提到主要的安全事件和技术,如SolarWinds RCE、Windows漏洞、机器人RCE等,然后简要说明涉及的技术和工具。 最后检查字数是否符合要求,并确保内容准确传达文章的核心信息。 </think> 文章总结了近期网络安全领域的新闻和技术动态,包括SolarWinds远程代码执行漏洞、Windows 11本地权限提升漏洞、机器人远程代码执行漏洞以及EDR作为C2工具的滥用等。还涉及量子安全HTTPS进展、API密钥安全问题及多种工具与技术的研究与开发。 2026-3-3 04:59:0 Author: blog.badsectorlabs.com(查看原文) 阅读量:10 收藏

SolarWinds RCE (@chudyPB), Windows 11 Recall-based LPE (@filip_dragovic), Robot RCEs (@olivier_boschko + @ruikai), EDR as a RAT (@p0w1_), and more!

Last Week in Security is a summary of the interesting cybersecurity news, techniques, tools and exploits from the past week. This post covers 2026-02-23 to 2026-03-02.

News

Techniques and Write-ups

Tools and Exploits

  • PhantomSec | Advanced Offensive Capabilities Automated - EvadeX Sponsored - EvadeX is an evasion-as-a-service platform for red teams and pentesters who want modern, continuously-updated evasive tradecraft without turning every engagement into an R&D project. Generate highly customizable, low-signature payloads through a simple web workflow so you can tune to the target and stay focused on the engagement. Trusted by teams from small consultancies to the Fortune 10. Get callbacks past EDR today!
  • airsnitch - A set of attacks that enable a guest user to bypass Wi-Fi client isolation. Or put differently, it allows an adversary who can connect to your network, either as a malicious insider or by connecting to a co-located open network, to 'bypass Wi-Fi encryption'. [PDF] Paper.
  • Introducing MacNoise! - MacNoise is a modular macOS telemetry noise generator for EDR testing and security research. It generates real system events: network connections, file writes, process spawns, plist mutations, TCC permission probes, and more so security teams can validate that their EDR, SIEM, and firewall tooling detects what it is supposed to detect.
  • redStack - Boot-to-Breach red team lab on AWS. Mythic, Sliver, and Havoc C2 behind a production-style Apache redirector. Deployed via Terraform.
  • Nemesis 2.2 - "Nemesis 2.2 introduces a number of powerful new features focusing on large container processing, data processing agents, enhanced DPAPI support, and a host of performance improvements."
  • TimeAfterFree - PHP 8 sandbox escape PoC demonstrating a disable_functions bypass on Unix-like systems.
  • OpenAnt - An open source LLM-based vulnerability discovery product that helps defenders proactively find verified security flaws while minimizing both false positives and false negatives. Stage 1 detects. Stage 2 attacks. What survives is real.
  • mquire - Linux memory forensics without external dependencies
  • notion - A Mythic C2 profile that uses Notion as a covert communication channel.
  • nerva - Fast service fingerprinting CLI for 120+ protocols (TCP/UDP/SCTP) - built by Praetorian
  • gibson - Network monitoring tool that maps process-to-network connections, identifies cloud providers, and detects beaconing activity. Zero-flag agent binary for deployment, aggregation server, offline ASN lookup.
  • ADPulse is an open-source Active Directory security auditing tool that connects to a domain controller via LDAP(S), runs 35 automated security checks, and produces detailed reports in console, JSON, and HTML formats.
  • Tyche is a Mythic HTTPX Profile Generator used to create Malleable C2 Profiles.

New to Me and Miscellaneous

This section is for news, techniques, write-ups, tools, and off-topic items that weren't released last week but are new to me. Perhaps you missed them too!

Techniques, tools, and exploits linked in this post are not reviewed for quality or safety. Do your own research and testing.


文章来源: https://blog.badsectorlabs.com/last-week-in-security-lwis-2026-03-02.html
如有侵权请联系:admin#unsafe.sh