SecWiki周刊(第124期)
2016/07/11-2016/07/17
安全资讯
新书推荐 - 《漏洞战争》- 泉哥新书
http://item.jd.com/10452457414.html
http://item.jd.com/10452457414.html
Healthcare Hacking
http://resources.infosecinstitute.com/healthcare-hacking/
http://resources.infosecinstitute.com/healthcare-hacking/
NSA Labels Privacy-Centric Internet Users As Extremists – The Merkle
http://themerkle.com/nsa-labels-privacy-centric-internet-users-as-extremists/
http://themerkle.com/nsa-labels-privacy-centric-internet-users-as-extremists/
Cybersecurity in the Healthcare Industry
http://resources.infosecinstitute.com/cybersecurity-in-the-healthcare-industry/
http://resources.infosecinstitute.com/cybersecurity-in-the-healthcare-industry/
漏洞披露模式的法理与价值:记乌云白帽大会圆桌论坛
http://www.aqniu.com/news-views/17655.html
http://www.aqniu.com/news-views/17655.html
Serious Vulnerability Affects Over 120 D-Link Products
http://www.securityweek.com/serious-vulnerability-affects-over-120-d-link-products
http://www.securityweek.com/serious-vulnerability-affects-over-120-d-link-products
安全技术
sqlmap 的源码学习笔记一之目录结构
http://blog.csdn.net/qq_29277155/article/details/51646932
http://blog.csdn.net/qq_29277155/article/details/51646932
Some-PoC-oR-ExP: 各种漏洞poc、Exp的收集或编写
https://github.com/coffeehb/Some-PoC-oR-ExP
https://github.com/coffeehb/Some-PoC-oR-ExP
2016乌云白帽大会视频-0709#密码1olm
http://pan.baidu.com/s/1slGL0df
http://pan.baidu.com/s/1slGL0df
使用GnuRadio + OpenLTE + SDR 搭建4G LTE 基站(上)
http://www.freebuf.com/articles/wireless/108417.html
http://www.freebuf.com/articles/wireless/108417.html
A fork of AFL for fuzzing Windows binaries
https://github.com/ivanfratric/winafl
https://github.com/ivanfratric/winafl
nginx的proxy_pass使用https(SSL加密)
http://xiaoxia.org/2016/07/15/nginx-proxy-pass-https/
http://xiaoxia.org/2016/07/15/nginx-proxy-pass-https/
使用预先算好的字符串hash逆向分析shellcode
http://anhkgg.github.io/anhkgg.github.io/precalculated-string-hashes-reverse-engineering-shellcode/
http://anhkgg.github.io/anhkgg.github.io/precalculated-string-hashes-reverse-engineering-shellcode/
srsLTE: Open source 3GPP LTE library
https://github.com/srsLTE/srsLTE
https://github.com/srsLTE/srsLTE
Exploiting Windows DRIVERS: Double-fetch Race Condition Vulnerability
http://resources.infosecinstitute.com/exploiting-windows-drivers-double-fetch-race-condition-vulnerability/
http://resources.infosecinstitute.com/exploiting-windows-drivers-double-fetch-race-condition-vulnerability/
PoshC2 – Powershell C2
http://www.hackwhackandsmack.com/?p=693
http://www.hackwhackandsmack.com/?p=693
Rails Webconsole DNS Rebinding lead to Remote code execution
http://benmmurphy.github.io/blog/2016/07/11/rails-webconsole-dns-rebinding/
http://benmmurphy.github.io/blog/2016/07/11/rails-webconsole-dns-rebinding/
掌阅iReader某站Python漏洞挖掘
https://www.leavesongs.com/PENETRATION/zhangyue-python-web-code-execute.html
https://www.leavesongs.com/PENETRATION/zhangyue-python-web-code-execute.html
fenghuangscanner_v3:常见服务端口弱口令扫描器
https://github.com/wilson9x1/fenghuangscanner_v3
https://github.com/wilson9x1/fenghuangscanner_v3
XSS Hunter is Now Open Source
https://thehackerblog.com/xss-hunter-is-now-open-source-heres-how-to-set-it-up/index.html
https://thehackerblog.com/xss-hunter-is-now-open-source-heres-how-to-set-it-up/index.html
Cisco Talos software
http://www.talosintelligence.com/software/
http://www.talosintelligence.com/software/
MYSQL提权总结
http://www.webshell.cc/4790.html
http://www.webshell.cc/4790.html
Incident Response Forensic Framework: nightHawk Response
https://n0where.net/incident-response-forensic-framework-nighthawk-response/
https://n0where.net/incident-response-forensic-framework-nighthawk-response/
Bluto V2.0 comming
https://github.com/darryllane/Bluto
https://github.com/darryllane/Bluto
shadow – Firefox Heap Exploitation Tool (jemalloc)
http://www.darknet.org.uk/2016/06/shadow-firefox-heap-exploitation-tool-jemalloc/
http://www.darknet.org.uk/2016/06/shadow-firefox-heap-exploitation-tool-jemalloc/
A Case Study in Attacking KeePass – Part 1
http://www.harmj0y.net/blog/redteaming/a-case-study-in-attacking-keepass/
http://www.harmj0y.net/blog/redteaming/a-case-study-in-attacking-keepass/
Google BigQuery: Analyze all the code of Github
https://medium.com/@hoffa/github-on-bigquery-analyze-all-the-code-b3576fd2b150#.oak7ssj5m
https://medium.com/@hoffa/github-on-bigquery-analyze-all-the-code-b3576fd2b150#.oak7ssj5m
Project Triforce: Run AFL on Everything!
www.nccgroup.trust/uk/about-us/newsroom-and-events/blogs/2016/june/project-triforce-run-afl-on-everything/?Year=2016&Month=6
www.nccgroup.trust/uk/about-us/newsroom-and-events/blogs/2016/june/project-triforce-run-afl-on-everything/?Year=2016&Month=6
2016乌云白帽大会企业场讲点儿啥?
http://www.aqniu.com/industry/17542.html
http://www.aqniu.com/industry/17542.html
pystock-data: US stock market data since 2009
https://github.com/eliangcs/pystock-data
https://github.com/eliangcs/pystock-data
X86 Shellcode Obfuscation - Part 3
https://breakdev.org/x86-shellcode-obfuscation-part-3/?utm_content=buffer5c342&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer
https://breakdev.org/x86-shellcode-obfuscation-part-3/?utm_content=buffer5c342&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer
Gracker level8 write-up
http://paraschetal.in/gracker-level08/
http://paraschetal.in/gracker-level08/
honeydrive:Honeypot Linux distribution
https://bruteforce.gr/honeydrive
https://bruteforce.gr/honeydrive
KeeThief – A Case Study in Attacking KeePass Part 2
http://www.harmj0y.net/blog/redteaming/keethief-a-case-study-in-attacking-keepass-part-2/
http://www.harmj0y.net/blog/redteaming/keethief-a-case-study-in-attacking-keepass-part-2/
The first open source vulnerability scanner for firmwares
https://github.com/misterch0c/firminator_backend
https://github.com/misterch0c/firminator_backend
Code Review最佳实践
https://github.com/hehonghui/android-tech-frontier/blob/master/issue-11/Code%20Review%E6%9C%80%E4%BD%B3%E5%AE%9E%E8%B7%B5.md
https://github.com/hehonghui/android-tech-frontier/blob/master/issue-11/Code%20Review%E6%9C%80%E4%BD%B3%E5%AE%9E%E8%B7%B5.md
BruteXSS - Cross-Site Scripting Bruteforcer
https://github.com/shawarkhanethicalhacker/BruteXSS
https://github.com/shawarkhanethicalhacker/BruteXSS
X86 Shellcode Obfuscation - Part 1
https://breakdev.org/x86-shellcode-obfuscation-part-1/
https://breakdev.org/x86-shellcode-obfuscation-part-1/
Radare2 Explorations: New book released!
http://radare.today/posts/radare2-explorations/?utm_content=buffer14401&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer
http://radare.today/posts/radare2-explorations/?utm_content=buffer14401&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer
物联网IoT产品安全checklist#密码: z78I
http://naotu.baidu.com/file/1687263a7055af3e44fb6ad10acef931
http://naotu.baidu.com/file/1687263a7055af3e44fb6ad10acef931
My_VBA_Bot - Writ ing Office Macro FUD encoder and other stuff
https://dl.packetstormsecurity.net/papers/general/My_VBA_Bot.pdf
https://dl.packetstormsecurity.net/papers/general/My_VBA_Bot.pdf
Gaining Control of a .int Domain Name With DNS Trickery
https://thehackerblog.com/the-international-incident-gaining-control-of-a-int-domain-name-with-dns-trickery/index.html
https://thehackerblog.com/the-international-incident-gaining-control-of-a-int-domain-name-with-dns-trickery/index.html
Official x64dbg blog
http://x64dbg.com/blog/
http://x64dbg.com/blog/
PEFix – simple PE file re-aligner
http://www.hexacorn.com/blog/2016/07/09/pefix-simple-pe-file-re-aligner/
http://www.hexacorn.com/blog/2016/07/09/pefix-simple-pe-file-re-aligner/
记一次WAF对抗赛详解&全方位绕过WAF
http://www.bugbank.cn/pwn/detail.html?pid=5775df28cbfaa97317a496a4
http://www.bugbank.cn/pwn/detail.html?pid=5775df28cbfaa97317a496a4
Writing your own shellcode.
https://paraschetal.in/writing-your-own-shellcode/
https://paraschetal.in/writing-your-own-shellcode/
Gracker level5 write-up
http://paraschetal.in/gracker-level05/
http://paraschetal.in/gracker-level05/
白象的舞步——来自南亚次大陆的网络攻击
http://mp.weixin.qq.com/s?__biz=MjM5MTA3Nzk4MQ==&mid=2650169803&idx=1&sn=b329ecfb9f42c67abaa95e6ee60329aa&scene=23
http://mp.weixin.qq.com/s?__biz=MjM5MTA3Nzk4MQ==&mid=2650169803&idx=1&sn=b329ecfb9f42c67abaa95e6ee60329aa&scene=23
Papertrail - Log management cloud service for free
https://papertrailapp.com/
https://papertrailapp.com/
[CVE-2016-4794/6162] Two linux kernel bugs
https://marcograss.github.io/security/linux/2016/07/06/two-linux-kernel-bugs.html
https://marcograss.github.io/security/linux/2016/07/06/two-linux-kernel-bugs.html
Gracker level0 write-up
http://paraschetal.in/gracker-level00/
http://paraschetal.in/gracker-level00/
FreeBSD encryption. Part 1
http://byinsecure.com/freebsd-crypto-protection/
http://byinsecure.com/freebsd-crypto-protection/
Project Keyhole - A python framework to automatically backdoor binaries or sour
http://seclist.us/project-keyhole-is-a-python-framework-to-automatically-backdoor-binaries-or-source-code.html
http://seclist.us/project-keyhole-is-a-python-framework-to-automatically-backdoor-binaries-or-source-code.html
ERTS – Exploit Reliability Testing System
http://www.darknet.org.uk/2016/07/erts-exploit-reliability-testing-system/
http://www.darknet.org.uk/2016/07/erts-exploit-reliability-testing-system/
X86 Shellcode Obfuscation - Part 2
https://breakdev.org/x86-shellcode-obfuscation-part-2/
https://breakdev.org/x86-shellcode-obfuscation-part-2/
小议安卓定位伪造-实战足不出户畅玩pokemon go
http://drops.wooyun.org/tips/17840
http://drops.wooyun.org/tips/17840
OpenIOC – Sharing Threat Intelligence
http://www.darknet.org.uk/2016/06/openioc-sharing-threat-intelligence/
http://www.darknet.org.uk/2016/06/openioc-sharing-threat-intelligence/
A Framework for the Analysis of Complex Code-Reuse Attacks
http://www.talosintelligence.com/files/publications_and_presentations/papers/ROPMEMU_graziano.pdf
http://www.talosintelligence.com/files/publications_and_presentations/papers/ROPMEMU_graziano.pdf
拥有300万安装量的应用是如何恶意推广刷榜的?
http://drops.wooyun.org/mobile/17675
http://drops.wooyun.org/mobile/17675
OWASP ZCR Shellcoder
http://paraschetal.in/owasp-zsc/
http://paraschetal.in/owasp-zsc/
This URL will crash your Ubuntu wget
https://marcograss.github.io/security/linux/2016/07/09/this-url-will-crash-wget.html
https://marcograss.github.io/security/linux/2016/07/09/this-url-will-crash-wget.html
勒索程序演化与发展趋势(14~16年)
https://mp.weixin.qq.com/s?__biz=MzI2MzM0NjcxNw==&mid=2247483786&idx=1&sn=4d3aff50c5722a887c4d111804f6a562
https://mp.weixin.qq.com/s?__biz=MzI2MzM0NjcxNw==&mid=2247483786&idx=1&sn=4d3aff50c5722a887c4d111804f6a562
InfoSecIITK Summer CTF 2016
http://paraschetal.in/infoseciitk-summerctf16/
http://paraschetal.in/infoseciitk-summerctf16/
AppSecEU 2016 Videos
https://www.youtube.com/playlist?list=PLpr-xdpM8wG-Kf1_BOnT2LFZU8_SXfpKL
https://www.youtube.com/playlist?list=PLpr-xdpM8wG-Kf1_BOnT2LFZU8_SXfpKL
Heap spraying high addresses in 32-bit Chrome/Firefox on 64-bit Windows
http://blog.skylined.nl/20160622001.html
http://blog.skylined.nl/20160622001.html
Gracker level2 write-up
http://paraschetal.in/gracker-level02/
http://paraschetal.in/gracker-level02/
tomcatWarDeployer
https://github.com/mgeeky/tomcatWarDeployer
https://github.com/mgeeky/tomcatWarDeployer
Gracker level1 write-up
http://paraschetal.in/gracker-level01/
http://paraschetal.in/gracker-level01/
NeutrinoEK来袭:爱拍网遭敲诈者病毒挂马
http://drops.wooyun.org/tips/17740
http://drops.wooyun.org/tips/17740
谈谈我这三年在前端技术上的成长
http://www.barretlee.com/blog/2016/07/11/learning-recent-years/
http://www.barretlee.com/blog/2016/07/11/learning-recent-years/
Introductory Intel x86: Architecture, Assembly, Applications, & Alliteration
http://opensecuritytraining.info/IntroX86.html
http://opensecuritytraining.info/IntroX86.html
FreeBSD encryption. Part 2: The subtleties of daily use. (ru)
http://byinsecure.com/freebsd-crypto-protection-2/
http://byinsecure.com/freebsd-crypto-protection-2/
Project to practice the basic at exploit bufferoverflow bugs.
https://github.com/mikaelkall/vuln
https://github.com/mikaelkall/vuln
Shellcode mapper
https://github.com/suraj-root/smap/
https://github.com/suraj-root/smap/
Android WebView 漏洞的利用、局限与终结
http://drops.wooyun.org/papers/17610
http://drops.wooyun.org/papers/17610
Adobe Flash Player prior 11.2.202.621/18.0.0.352/21.0.0.242 buffer overflow
https://vuldb.com/?id.88018
https://vuldb.com/?id.88018
HuntingTheHunters_2016
http://www.talosintelligence.com/files/publications_and_presentations/presentations/HuntingTheHunters_2016.pdf
http://www.talosintelligence.com/files/publications_and_presentations/presentations/HuntingTheHunters_2016.pdf
ppt exploits PPT Powerpoint Presentations and Slides
http://www.pptsearch365.com/ppt-exploits.html
http://www.pptsearch365.com/ppt-exploits.html
Fuzzing_and_Patch_Analysis-SAGEly_Advice
http://www.talosintelligence.com/files/publications_and_presentations/presentations/Fuzzing_and_Patch_Analysis-SAGEly_Advice.pdf
http://www.talosintelligence.com/files/publications_and_presentations/presentations/Fuzzing_and_Patch_Analysis-SAGEly_Advice.pdf
Gracker level3 write-up
http://paraschetal.in/gracker-level03/
http://paraschetal.in/gracker-level03/
The Tales of a Bug Bounty Hunter
https://www.youtube.com/watch?v=jnEZWuJ39Fw&list=PLpr-xdpM8wG-Kf1_BOnT2LFZU8_SXfpKL
https://www.youtube.com/watch?v=jnEZWuJ39Fw&list=PLpr-xdpM8wG-Kf1_BOnT2LFZU8_SXfpKL
Gracker level7 write-up
http://paraschetal.in/gracker-level07/
http://paraschetal.in/gracker-level07/
Gracker level4 write-up
http://paraschetal.in/gracker-level04/
http://paraschetal.in/gracker-level04/
Gracker level6 write-up
http://paraschetal.in/gracker-level06/
http://paraschetal.in/gracker-level06/
Gracker level9 write-up
http://paraschetal.in/gracker-level09/
http://paraschetal.in/gracker-level09/
-----微信ID:SecWiki-----
SecWiki,13年来一直专注安全技术资讯分析!
SecWiki:https://www.sec-wiki.com
本期原文地址: SecWiki周刊(第124期)
