SecWiki周刊(第12期)
2014/05/19-2014/05/25
安全资讯
Sucuri CloudProxy – Website Firewall Enhancements
http://blog.sucuri.net/2014/05/sucuri-cloudproxy-website-firewall-enhancements.html
http://blog.sucuri.net/2014/05/sucuri-cloudproxy-website-firewall-enhancements.html
一周海外安全事件回顾(20140512-0518)
http://www.freebuf.com/news/special/34645.html
http://www.freebuf.com/news/special/34645.html
Technical Analysis of CVE-2014-0515 Adobe Flash Player Exploit
http://h30499.www3.hp.com/t5/HP-Security-Research-Blog/Technical-Analysis-of-CVE-2014-0515-Adobe-Flash-Player-Exploit/ba-p/6482744#.U39XrXWSykB
http://h30499.www3.hp.com/t5/HP-Security-Research-Blog/Technical-Analysis-of-CVE-2014-0515-Adobe-Flash-Player-Exploit/ba-p/6482744#.U39XrXWSykB
安全技术
没事捣腾了一下yuange的DVE
http://weibo.com/p/1001603713879803836905
http://weibo.com/p/1001603713879803836905
OWASP 移动安全漏洞Top 10
http://www.truesec.net/?p=130
http://www.truesec.net/?p=130
MemPick: High-Level Data Structure Detection in C/C++ Binaries
http://www.cs.vu.nl/~herbertb/papers/mempick_wcre13.pdf
http://www.cs.vu.nl/~herbertb/papers/mempick_wcre13.pdf
BinTrace record and dump traces of an executable program
https://bitbucket.org/mihaila/bintrace/wiki/Home
https://bitbucket.org/mihaila/bintrace/wiki/Home
Metasploit: Controlling Internet Explorer user traffic through a proxy PAC file
http://www.shelliscoming.com/2013/12/metasploit-controlling-internet.html
http://www.shelliscoming.com/2013/12/metasploit-controlling-internet.html
Mathematics for Computer Science,Eric Lehman et al 2013
http://courses.csail.mit.edu/6.042/fall13/mcs.pdf
http://courses.csail.mit.edu/6.042/fall13/mcs.pdf
Linux后门的两种姿势(suid shell与inetd后门)
http://www.91ri.org/9026.html
http://www.91ri.org/9026.html
Reversing RIG EK’s Flash File
http://www.kahusecurity.com/2014/reversing-rig-eks-flash-file/
http://www.kahusecurity.com/2014/reversing-rig-eks-flash-file/
WebGoat视频
http://pan.baidu.com/s/1pJlsfQ7
http://pan.baidu.com/s/1pJlsfQ7
CVE-2013-4547 Nginx解析漏洞深入利用及分析
http://sec.baidu.com/index.php?research/detail/id/19
http://sec.baidu.com/index.php?research/detail/id/19
中文分词器性能比较
http://www.52ml.net/15536.html
http://www.52ml.net/15536.html
Elasticsearch 代码执行漏洞利用工具
http://lcx.cc/?i=4339
http://lcx.cc/?i=4339
OSXAuditor:Mac OS X计算机取证工具
https://github.com/jipegit/OSXAuditor
https://github.com/jipegit/OSXAuditor
在渗透测试中使用fuzz技术(附windows安装指南)
http://www.freebuf.com/articles/network/34136.html
http://www.freebuf.com/articles/network/34136.html
从输入 URL 到页面加载完成的过程中都发生了什么事情
http://fex.baidu.com/blog/2014/05/what-happen/
http://fex.baidu.com/blog/2014/05/what-happen/
NMAP 基础教程
http://drops.wooyun.org/tips/2002
http://drops.wooyun.org/tips/2002
Chrome扩展及应用开发
http://www.ituring.com.cn/book/1421
http://www.ituring.com.cn/book/1421
从Fuzzing到0day
http://worm.cc/from-fuzzing-to-0day.html
http://worm.cc/from-fuzzing-to-0day.html
mitmproxy now supports #gotofail
http://corte.si/posts/security/gotofail-mitmproxy.html
http://corte.si/posts/security/gotofail-mitmproxy.html
购买 Linux VPS 服务器后简单的安全设置
http://ttt.tt/104/
http://ttt.tt/104/
Linux x86 Reverse Engineering
http://www.exploit-db.com/download_pdf/33429
http://www.exploit-db.com/download_pdf/33429
邪恶的JAVA HASH DOS攻击
http://security.alibaba.com/blog/blog_4.htm?spm=0.0.0.0.OJKNZd
http://security.alibaba.com/blog/blog_4.htm?spm=0.0.0.0.OJKNZd
moloch:网络数据收集与索引系统
https://github.com/aol/moloch
https://github.com/aol/moloch
How I bypassed 2-Factor-Authentication on Google, Facebook, Yahoo, LinkedIn
http://shubh.am/how-i-bypassed-2-factor-authentication-on-google-yahoo-linkedin-and-many-others/
http://shubh.am/how-i-bypassed-2-factor-authentication-on-google-yahoo-linkedin-and-many-others/
How I XSS’ed All Of Yahoo’s Services
http://nahamsec.com/?p=210
http://nahamsec.com/?p=210
基于nginx和lua的WAF系统 nginx-lua-ds-waf
https://github.com/Hevienz/nginx-lua-ds-waf
https://github.com/Hevienz/nginx-lua-ds-waf
DEFCON 22 CTF Qualifiers Writeup
http://blog.spiderlabs.com/2014/05/defcon-22-ctf-qualifiers-writeup.html
http://blog.spiderlabs.com/2014/05/defcon-22-ctf-qualifiers-writeup.html
批量网站DNS区域传送漏洞检测
http://drops.wooyun.org/tips/2014
http://drops.wooyun.org/tips/2014
大牛分享:MongoDB技术资料汇总
http://wenku.it168.com/wenji/2137
http://wenku.it168.com/wenji/2137
从美国起诉我5名军官一事,谈网络国防的不对称性
http://blog.sina.com.cn/s/blog_7110463b0101it8w.html
http://blog.sina.com.cn/s/blog_7110463b0101it8w.html
Insecure default in Elasticsearch enables remote code execution
http://bouk.co/blog/elasticsearch-rce/
http://bouk.co/blog/elasticsearch-rce/
Mysql漏洞利用
http://www.truesec.net/?p=127
http://www.truesec.net/?p=127
BYON给企业带来的安全挑战
http://mp.weixin.qq.com/s?__biz=MjM5MzQ5ODYwNA==&mid=200180774&idx=1&sn=024a13a5af0b126b08f60d65bffda427#rd
http://mp.weixin.qq.com/s?__biz=MjM5MzQ5ODYwNA==&mid=200180774&idx=1&sn=024a13a5af0b126b08f60d65bffda427#rd
使用nginx搭建https服务器
http://www.zeroplace.cn/article.asp?id=899
http://www.zeroplace.cn/article.asp?id=899
PHP中该怎样防止SQL注入?
http://blog.jobbole.com/67875/
http://blog.jobbole.com/67875/
Baby's first NX+ASLR bypass
http://blog.spiderlabs.com/2014/05/babys-first-nx-aslr-bypass.html
http://blog.spiderlabs.com/2014/05/babys-first-nx-aslr-bypass.html
Java-based Malware Distributed Through Spam
http://blog.spiderlabs.com/2014/05/java-based-remote-access-trojan-distributed-through-spam.html
http://blog.spiderlabs.com/2014/05/java-based-remote-access-trojan-distributed-through-spam.html
USENIX:List of Accepted Papers
https://www.usenix.org/conference/usenixsecurity14/list-accepted-papers
https://www.usenix.org/conference/usenixsecurity14/list-accepted-papers
科学网—浅谈产业界与学术界的合作研究
http://blog.sciencenet.cn/blog-414166-795432.html
http://blog.sciencenet.cn/blog-414166-795432.html
IE11SandboxEscapes
https://github.com/tyranid/IE11SandboxEscapes
https://github.com/tyranid/IE11SandboxEscapes
Award-Winning Web Casting & Online Seminar Hosting Software
https://www2.gotomeeting.com/register/400294658
https://www2.gotomeeting.com/register/400294658
Thotcon 0×5 Phishing Frenzy
http://www.pentestgeek.com/2014/05/15/thotcon-phishing-frenzy/
http://www.pentestgeek.com/2014/05/15/thotcon-phishing-frenzy/
Exploiting LFI Vulnerabilities with Liffy
http://rotlogix.com/2014/05/21/exploiting-local-file-includes-with-liffy/
http://rotlogix.com/2014/05/21/exploiting-local-file-includes-with-liffy/
Effective NTLM / SMB Relaying
http://www.room362.com/blog/2014/05/21/effective-ntlm-slash-smb-relaying/
http://www.room362.com/blog/2014/05/21/effective-ntlm-slash-smb-relaying/
Windows键盘记录软件
http://www.coolhacker.org/?p=1657
http://www.coolhacker.org/?p=1657
The PLA and the 8:00am-5:00pm Work Day
http://www.fireeye.com/blog/technical/2014/05/the-pla-and-the-800am-500pm-work-day-fireeye-confirms-dojs-findings-on-apt1-intrusion-activity.html
http://www.fireeye.com/blog/technical/2014/05/the-pla-and-the-800am-500pm-work-day-fireeye-confirms-dojs-findings-on-apt1-intrusion-activity.html
Android Hacking and Security, Part 6: Exploiting Debuggable Android Applications
http://resources.infosecinstitute.com/android-hacking-security-part-6-exploiting-debuggable-android-applications/
http://resources.infosecinstitute.com/android-hacking-security-part-6-exploiting-debuggable-android-applications/
Internet_Explorer_11_Exploit
https://github.com/demi6od/Internet_Explorer_11_Exploit
https://github.com/demi6od/Internet_Explorer_11_Exploit
一些常见的重置密码漏洞分析整理
http://drops.wooyun.org/papers/2035
http://drops.wooyun.org/papers/2035
-----微信ID:SecWiki-----
SecWiki,13年来一直专注安全技术资讯分析!
SecWiki:https://www.sec-wiki.com
本期原文地址: SecWiki周刊(第12期)
