SecWiki周刊(第116期)
2016/05/16-2016/05/22
安全资讯
“全天候全方位感知网络安全态势”解读
https://mp.weixin.qq.com/s?__biz=MzA4MTY1MzE1NA==&mid=2247483810&idx=1&sn=69dc202e8de15efac4305a460492f5bc
https://mp.weixin.qq.com/s?__biz=MzA4MTY1MzE1NA==&mid=2247483810&idx=1&sn=69dc202e8de15efac4305a460492f5bc
简读爱因斯坦计划-美国的网络空间态势感知
http://mp.weixin.qq.com/s?__biz=MzI3NDI3OTE2Ng==&mid=2247483659&idx=1&sn=14fc36d87915cfd1cd40b89139d32467
http://mp.weixin.qq.com/s?__biz=MzI3NDI3OTE2Ng==&mid=2247483659&idx=1&sn=14fc36d87915cfd1cd40b89139d32467
Ecuador Bank Hacked:$12 Million Stolen in 3rd Attack on SWIFT System
http://thehackernews.com/2016/05/swift-banking-hack.html
http://thehackernews.com/2016/05/swift-banking-hack.html
安全技术
List of Accepted Papers | USENIX 2016
https://www.usenix.org/conference/usenixsecurity16/list-accepted-papers
https://www.usenix.org/conference/usenixsecurity16/list-accepted-papers
国外25个泄露数据库
http://zone.wooyun.org/content/27374
http://zone.wooyun.org/content/27374
CROZONO Framework v1.0 – Hacking with Drones & Robots
http://www.crozono.com/
http://www.crozono.com/
ProtoFuzz: A Protobuf Fuzzer
http://blog.trailofbits.com/2016/05/18/protofuzz-a-protobuf-fuzzer/
http://blog.trailofbits.com/2016/05/18/protofuzz-a-protobuf-fuzzer/
docker_api_vul: docker 未授权访问漏洞利用脚本
https://github.com/Tycx2ry/docker_api_vul
https://github.com/Tycx2ry/docker_api_vul
利用环境变量LD_PRELOAD来绕过php disable_function执行系统命令
http://drops.wooyun.org/tips/16054
http://drops.wooyun.org/tips/16054
使用Ngrok实现内网穿透
http://cjting.me/misc/2016-05-21-%E4%BD%BF%E7%94%A8Ngrok%E5%AE%9E%E7%8E%B0%E5%86%85%E7%BD%91%E7%A9%BF%E9%80%8F.html
http://cjting.me/misc/2016-05-21-%E4%BD%BF%E7%94%A8Ngrok%E5%AE%9E%E7%8E%B0%E5%86%85%E7%BD%91%E7%A9%BF%E9%80%8F.html
Local root exploits search
https://www.kernel-exploits.com/
https://www.kernel-exploits.com/
铁面“网警”——知乎反作弊系统悟空演变之路
https://mp.weixin.qq.com/s?__biz=MjM5MDE0Mjc4MA==&mid=2650992609&idx=1&sn=0ab0ac8f0ad37f98ddb2cbdb182f8fba&scene=1
https://mp.weixin.qq.com/s?__biz=MjM5MDE0Mjc4MA==&mid=2650992609&idx=1&sn=0ab0ac8f0ad37f98ddb2cbdb182f8fba&scene=1
CTF中比较好玩的stego
http://drops.wooyun.org/tips/16041
http://drops.wooyun.org/tips/16041
payloads:A collection of web attack payloads
https://github.com/foospidy/payloads
https://github.com/foospidy/payloads
利用电视棒追踪民航飞机
http://s1nh.com/post/Track_Civil_Aircraft/
http://s1nh.com/post/Track_Civil_Aircraft/
Web爬虫:多线程、异步与动态代理初步
http://www.freebuf.com/articles/web/104732.html
http://www.freebuf.com/articles/web/104732.html
2016 SCTF-writeup
http://pan.baidu.com/s/1nvmywNf
http://pan.baidu.com/s/1nvmywNf
[笔记]渗透师的Powershell入门
https://www.blackh4t.org/archives/1870.html
https://www.blackh4t.org/archives/1870.html
写给即将离开校园成为一名程序员的几句忠告
https://www.zhuyingda.com/blog/article.html?id=9
https://www.zhuyingda.com/blog/article.html?id=9
Website Hacked Report 2016 - Q1
https://sucuri.net/website-security/website-hacked-report
https://sucuri.net/website-security/website-hacked-report
针对Phorum开源论坛项目的安全评估报告
http://www.freebuf.com/articles/web/104088.html
http://www.freebuf.com/articles/web/104088.html
新姿势之Docker Remote API未授权访问漏洞分析和利用
http://drops.wooyun.org/papers/15892
http://drops.wooyun.org/papers/15892
Linux Backdoor
http://drops.wooyun.org/tips/15702
http://drops.wooyun.org/tips/15702
Python识别验证码
http://0cx.cc/python_captcha_breaker.jspx
http://0cx.cc/python_captcha_breaker.jspx
NSE: Some of my work on Nmap Scripts (NSE)
https://github.com/s4n7h0/NSE
https://github.com/s4n7h0/NSE
Avoiding XSS Detection
http://brutelogic.com.br/blog/avoiding-xss-detection/
http://brutelogic.com.br/blog/avoiding-xss-detection/
phishing-frenzy: Ruby on Rails Phishing Framework
https://github.com/pentestgeek/phishing-frenzy
https://github.com/pentestgeek/phishing-frenzy
How I found a huge data leak of a company during a college lecture
http://sijmen.ruwhof.net/weblog/937-how-i-found-a-huge-data-leak-of-a-company-during-a-college-lecture
http://sijmen.ruwhof.net/weblog/937-how-i-found-a-huge-data-leak-of-a-company-during-a-college-lecture
金融反欺诈-走近打码平台
https://mp.weixin.qq.com/s?__biz=MzAxMzgwNTAxMQ==&mid=2650951515&idx=1&sn=4706f6c12e613aa174923d48c97d09c1
https://mp.weixin.qq.com/s?__biz=MzAxMzgwNTAxMQ==&mid=2650951515&idx=1&sn=4706f6c12e613aa174923d48c97d09c1
Backdoor in Fake Joomla! Core Files
https://blog.sucuri.net/2016/05/unexpected-backdoor-fake-core-files.html
https://blog.sucuri.net/2016/05/unexpected-backdoor-fake-core-files.html
-----微信ID:SecWiki-----
SecWiki,13年来一直专注安全技术资讯分析!
SecWiki:https://www.sec-wiki.com
本期原文地址: SecWiki周刊(第116期)
