Last Week in Security (LWiS) - 2026-03-09
好的,我现在需要帮用户总结这篇文章的内容,控制在100个字以内。首先,我得通读整篇文章,了解主要信息。 文章标题是“Last Week in Security”,内容涵盖了过去一周的网络安全新闻、技术、工具和漏洞。新闻部分提到了iOS的Coruna漏洞套件,涉及23个漏洞,适用于旧版本的iOS系统。还有关于AWS数据中心被无人机攻击导致大规模停机的事件,以及Ziff Davis出售Ookla和Downdetector给Accenture的交易。 技术部分讨论了Juniper Junos Evolved中的CVE-2026-21902漏洞,这是一个预身份验证的RCE漏洞。还有关于DPAPI和Nemesis工具的使用,用于从浏览器中提取凭证。此外,还提到了FortiClient EMS中的SQL注入漏洞和一些经典的Cookie注入攻击。 工具和漏洞部分包括PhantomSec、Dracarys、sopa等工具,以及Cisco SD-WAN控制器的预身份验证RCE漏洞。还有一些新的框架和工具如Speakeasy v2.0.0b1、vulhunt等。 综合来看,文章内容丰富,涉及多个方面的安全动态和技术分析。我需要将这些信息浓缩到100字以内,突出主要点:iOS漏洞套件、Juniper RCE、DPAPI工具、Cisco SD-WAN漏洞以及安全工具的发展。 确保语言简洁明了,不使用复杂的术语,并且直接描述内容。这样用户就能快速了解文章的主要内容。 </think> 文章总结了近期网络安全领域的新闻、技术与工具动态,包括iOS 13-17.2.1版本的Coruna漏洞套件、Juniper Junos Evolved预身份验证RCE漏洞(CVE-2026-21902)、基于DPAPI的Nemesis工具、Cisco SD-WAN控制器预身份验证RCE漏洞(CVE-2026-20127)等,并介绍了多种安全工具与框架的发展。 2026-3-10 03:59:0 Author: blog.badsectorlabs.com(查看原文) 阅读量:15 收藏

Ludus 2 (@badsectorlabs), new GOAD lab (@M4yFly), 🍪 hack (@XeEaton), DPAPI + Nemesis (@harmj0y + @tifkin_), iOS exploit kit found (@Mandiant), and more!

Last Week in Security is a summary of the interesting cybersecurity news, techniques, tools and exploits from the past week. This post covers 2026-03-02 to 2026-03-09.

News

  • Coruna: The Mysterious Journey of a Powerful iOS Exploit Kit - The kit only works on iOS 13-17.2.1 (from 2023), so as always having an up to date device makes you much harder to exploit (and moreso if you have the latest hardware with additional hardware based protections like Memory Integrity Enforcement (MIE)). Pretty impressive there is a kit out there with 23 separate iOS exploits (5 full chains) that all work together nicely. This kit was likely caught as it was being used rather recklessly (a pop up telling users to visit the site on iOS and targeting any user who landed on the page is bold), but consider how many of these kits work on iOS 26 and are currently being used more carefully in targeted attacks. If you may be a target, consider enabling Lockdown Mode. What are the odds this was was the kit sold by the L3Harris executive to Russia?.
  • Operational issue - Multiple services (UAE) - Does your disaster recovery plan include drones targeting your datacenter? AWS' ME-CENTRAL-1 took direct hits causing massive outages.
  • Ziff Davis to sell Ookla and Downdetector to Accenture as part of $1.2 billion deal - $1.2B USD for the speedtest.net company?!
  • [PDF] President Trump’s CYBER STRATEGY for America - A few interesting points in this short document. "We will unleash the private sector by creating incentives to identify and disrupt adversary networks and scale our national capabilities." Sounds like contractors are about to get in on some offensive operations. China has been doing this for years. Russia tacitly approves of ransomware groups as long as they don't target Russian speaking countries. I'm not sure why the government is involved in, "supporting the security of cryptocurrencies and blockchain technologies." Wasn't the original point of cryptocurrency to break from government and institutional control? Perhaps Trump wants to secure his own bag. It also states, "America’s cyber workforce... is an asset worthy of great investment and essential to our nation’s economic prosperity and security." And yet across party lines and industry, the verdict is the same: CISA is in trouble.

Techniques and Write-ups

Tools and Exploits

  • PhantomSec | Advanced Offensive Capabilities Automated - EvadeX Sponsored - EvadeX is an evasion-as-a-service platform for red teams and pentesters who want modern, continuously-updated evasive tradecraft without turning every engagement into an R&D project. Generate highly customizable, low-signature payloads through a simple web workflow so you can tune to the target and stay focused on the engagement. Trusted by teams from small consultancies to the Fortune 10. Get callbacks past EDR today!
  • Dracarys - New GOAD lab from Mayfly!
  • sopa - A practical client for ADWS in Golang.
  • ludus-defender-lab - Ludus range configs and Ansible roles for a Windows security lab pre-staged for MDE and MDI, with a fully misconfigured ADCS installation for detection coverage testing.
  • vscode-frida - Unofficial frida extension for VSCode.
  • DLLHijackHunter - Automated DLL Hijacking Detection with Zero False Positives.
  • ludus_nginx_redirector - This role is designed for use in Ludus ranges to proxy C2 traffic with extensive customization options for routing, rate limiting, and operational security.
  • CVE-2026-20127---Cisco-SD-WAN-Preauth-RCE - This repository contains a working proof-of-concept exploit for CVE-2026-20127, a critical pre-authentication vulnerability in Cisco Catalyst SD-WAN Controller (formerly vSmart) and Catalyst SD-WAN Manager (formerly vManage) that has been actively exploited in the wild since 2023.
  • Speakeasy v2.0.0b1 - The Windows malware emulation framework that executes binaries, drivers, and shellcode in a modeled Windows runtime instead of a full VM got a major update!
  • vulhunt - Vulnerability detection framework by Binarly's REsearch team
  • PrivHound - A BloodHound OpenGraph collector that models Windows local privilege escalation as interconnected attack paths.
  • Maverick - Adaptix C2 agent using Crystal Palace PIC linker and PICO module system

New to Me and Miscellaneous

This section is for news, techniques, write-ups, tools, and off-topic items that weren't released last week but are new to me. Perhaps you missed them too!

  • enject - Hide .env secrets from prAIng eyes: secrets live in local encrypted stores (per project) and are injected directly into apps at runtime, never touching disk as plaintext.
  • eden - A PoC UDRL for Cobalt Strike built with Crystal Palace that combines Raphael Mudge's page streaming technique with a modular call gate (Draugr)
  • unredact - Unredact uses computer vision, font-aware constraint solving, and LLM reasoning to figure out what text is hiding under those black bars. Upload a PDF, and it will detect redactions, calculate exactly which strings could fit based on pixel-width constraints, and let you visually verify guesses with a live overlay.
  • LTR101 - Getting into Industry in 2026 - Andy updates his "breaking into cybersecurity" post for 2026. Guess what made it in the Resources section this year? Ludus 😎.

Techniques, tools, and exploits linked in this post are not reviewed for quality or safety. Do your own research and testing.


文章来源: https://blog.badsectorlabs.com/last-week-in-security-lwis-2026-03-09.html
如有侵权请联系:admin#unsafe.sh