本文由斗象TCC史辛泽荣誉出品，偷图偷代码还不给署名的我劝你好自为之。 Preface A few days ago, Orange dropped another two Microsoft Exchange attack chains on his BlackHat presentation. The two new attacks are ProxyOrcale, which focuses on the Padding Orcale Attack, and ProxyShell, which exploits a Path Confusion vulnerability to achieve arbitrary file write and eventually code execution. This blog assumes readers have read Orange’s … Continue reading My Steps of Reproducing ProxyShell
Motivation I adore CodeQL a lot despite the fact that I have only been working with it for less than 3 months. It’s so powerful at analyzing applications and it can save a tremendous amount time doing code review. However, nothing is perfect. There are a few downsides of CodeQL. First, it only works when … Continue reading A research on generating CodeQL database for close-sourced applications
Follow My Blog
Get new content delivered directly to your inbox.