SecWiki周刊(第139期)
2016/10/24-2016/10/30
安全资讯
DirtyCow 内核漏洞能被用于Root任何Android 设备
http://www.solidot.org/story?sid=50122
http://www.solidot.org/story?sid=50122
打造一款自动化渗透测试平台 – 天象
http://www.4dogs.cn
http://www.4dogs.cn
黑客攻破绝顶“安全”的无线键鼠,获取远程代码执行漏洞
http://www.aqniu.com/news-views/20648.html
http://www.aqniu.com/news-views/20648.html
黑客公开普京顾问的邮件存档
http://www.solidot.org/story?sid=50166
http://www.solidot.org/story?sid=50166
GeekPwn 2016 黑客盛会:攻破机器人、智能插座、电子轮椅
http://mp.weixin.qq.com/s?__biz=MzA4ODUxNjIwMg==&mid=2654323680&idx=1&sn=fdc1bedd68c37889164547ba94e1daf2&chksm=8be990e5bc9e19f3815d18780f896b46e3f4dc8655aae430b65b441e8813055f503948b4bc7a
http://mp.weixin.qq.com/s?__biz=MzA4ODUxNjIwMg==&mid=2654323680&idx=1&sn=fdc1bedd68c37889164547ba94e1daf2&chksm=8be990e5bc9e19f3815d18780f896b46e3f4dc8655aae430b65b441e8813055f503948b4bc7a
威胁情报的几个关键概念
http://yepeng.blog.51cto.com/3101105/1866485
http://yepeng.blog.51cto.com/3101105/1866485
美国网络司令部133支网络部队已拥有初步作战能力
http://mp.weixin.qq.com/s?__biz=MzI4MjA1MzkyNA==&mid=2655294532&idx=1&sn=bc58574e09cb095b58e07f7c1c1c9b3e&chksm=f02fe80fc75861195f6efcc3bb7128dfc1296fd02b5f743461a927dfa9c2a74a08e22fd728c2
http://mp.weixin.qq.com/s?__biz=MzI4MjA1MzkyNA==&mid=2655294532&idx=1&sn=bc58574e09cb095b58e07f7c1c1c9b3e&chksm=f02fe80fc75861195f6efcc3bb7128dfc1296fd02b5f743461a927dfa9c2a74a08e22fd728c2
Google Has Quietly Dropped Ban on Personally Identifiable Web Tracking
https://www.propublica.org/article/google-has-quietly-dropped-ban-on-personally-identifiable-web-tracking
https://www.propublica.org/article/google-has-quietly-dropped-ban-on-personally-identifiable-web-tracking
启明星辰安全网关基于威胁情报的实时防御
http://weibo.com/ttarticle/p/show?id=2309404034945172561212
http://weibo.com/ttarticle/p/show?id=2309404034945172561212
京东安全极客工场加油GeekPwn嘉年华 京东首席安全专家Tony现身助阵
http://www.mottoin.com/91032.html
http://www.mottoin.com/91032.html
安全技术
关于 mirai 僵尸网络控制主机的数据分析
http://blog.netlab.360.com/a-mirai-botnet-c2-data-analysis/
http://blog.netlab.360.com/a-mirai-botnet-c2-data-analysis/
Hack.lu 2016 - Hadoop safari - Hunting for vulnerabilities
http://archive.hack.lu/2016/Wavestone%20-%20Hack.lu%202016%20-%20Hadoop%20safari%20-%20Hunting%20for%20vulnerabilities%20-%20v1.0.pdf
http://archive.hack.lu/2016/Wavestone%20-%20Hack.lu%202016%20-%20Hadoop%20safari%20-%20Hunting%20for%20vulnerabilities%20-%20v1.0.pdf
U.S. DOT issues Federal guidance to the automotive industry for improving motor
http://www.nhtsa.gov/About-NHTSA/Press-Releases/nhtsa_cybersecurity_best_practices_10242016
http://www.nhtsa.gov/About-NHTSA/Press-Releases/nhtsa_cybersecurity_best_practices_10242016
Bypass unsafe-inline mode CSP
http://paper.seebug.org/91/
http://paper.seebug.org/91/
Attacking JavaScript Engines: A case study of JavaScriptCore and CVE-2016-4622
http://www.phrack.org/papers/attacking_javascript_engines.html
http://www.phrack.org/papers/attacking_javascript_engines.html
Deep Learning for Classification of Malware System Call Sequences
https://www.sec.in.tum.de/assets/Uploads/deeplearning.pdf
https://www.sec.in.tum.de/assets/Uploads/deeplearning.pdf
OWASP OWTF:WEB攻击测试框架
http://www.mottoin.com/91015.html
http://www.mottoin.com/91015.html
Redis Lua远程代码执行EXP
http://drops.wiki/index.php/2016/10/24/redis-lua/
http://drops.wiki/index.php/2016/10/24/redis-lua/
Ruler:一款利用Exchange服务渗透的安全工具
http://www.freebuf.com/sectool/117516.html
http://www.freebuf.com/sectool/117516.html
分析感染华硕路由器的P2P僵尸网络程序TheMoon
http://www.freebuf.com/articles/terminal/117437.html
http://www.freebuf.com/articles/terminal/117437.html
QConShanghai2016: QCon上海2016幻灯片
https://github.com/QConChina/QConShanghai2016
https://github.com/QConChina/QConShanghai2016
关于 dyn / twitter 受攻击情况的说明和 mirai 僵尸网络的回顾
http://blog.netlab.360.com/a-dyn-twitter-ddos-event-report-and-mirai-botnet-review/
http://blog.netlab.360.com/a-dyn-twitter-ddos-event-report-and-mirai-botnet-review/
Mirai DDoS Botnet: Source Code & Binary Analysis
http://www.simonroses.com/2016/10/mirai-ddos-botnet-source-code-binary-analysis/
http://www.simonroses.com/2016/10/mirai-ddos-botnet-source-code-binary-analysis/
XSS dynamic detection using PhantomJs
http://www.n0tr00t.com/2016/10/29/XSS_dynamic_detection_using_PhantomJs.html
http://www.n0tr00t.com/2016/10/29/XSS_dynamic_detection_using_PhantomJs.html
Win10在docker中运行GourdScanV2
http://xiaix.me/win10zai-dockerzhong-yun-xing-gourdscanv2/
http://xiaix.me/win10zai-dockerzhong-yun-xing-gourdscanv2/
Exploiting AMI Aptio firmware on example of Intel NUC
http://blog.cr4.sh/2016/10/exploiting-ami-aptio-firmware.html
http://blog.cr4.sh/2016/10/exploiting-ami-aptio-firmware.html
CodeWarrior:代码审计静态分析工具
http://www.mottoin.com/91088.html
http://www.mottoin.com/91088.html
Personal security checklist for securing your devices and accounts
https://github.com/alulsh/personal-security-checklist
https://github.com/alulsh/personal-security-checklist
Android逆向随笔之遇见MultiDex
http://drops.wiki/index.php/2016/10/26/android-multidex/
http://drops.wiki/index.php/2016/10/26/android-multidex/
Mirai过后,约1100万路由器和摄像头仍暴露在公网
http://mp.weixin.qq.com/s?__biz=MzIwMDk0MjcwNA==&mid=2247483854&idx=1&sn=a917e227e0321fefb2c30fcc40e04f62&chksm=96f434d1a183bdc7cfb31e07b09dd5462d45048b01e70f1757f6594f2b2105a60a577766423d
http://mp.weixin.qq.com/s?__biz=MzIwMDk0MjcwNA==&mid=2247483854&idx=1&sn=a917e227e0321fefb2c30fcc40e04f62&chksm=96f434d1a183bdc7cfb31e07b09dd5462d45048b01e70f1757f6594f2b2105a60a577766423d
Net-Creds:快速嗅探数据包及接口中的敏感信息
http://www.mottoin.com/91154.html
http://www.mottoin.com/91154.html
Moonlight – Targeted attacks in the Middle East
http://blog.vectranetworks.com/blog/moonlight-middle-east-targeted-attacks
http://blog.vectranetworks.com/blog/moonlight-middle-east-targeted-attacks
Solving GrrCon 2016 Memory Challenge
https://techanarchy.net/2016/10/solving-grrcon-2016-dfir-challenge/
https://techanarchy.net/2016/10/solving-grrcon-2016-dfir-challenge/
增长黑客:如何用数据来驱动产品增长
http://yedingding.com/2016/10/19/out-product-death-cycle.html
http://yedingding.com/2016/10/19/out-product-death-cycle.html
Inside the Gootkit C&C server
https://securelist.com/blog/research/76433/inside-the-gootkit-cc-server/
https://securelist.com/blog/research/76433/inside-the-gootkit-cc-server/
Joomla未授权创建特权用户漏洞(CVE-2016-8869)分析
http://paper.seebug.org/88/
http://paper.seebug.org/88/
安卓手机的后门控制工具SPADE
http://www.freebuf.com/articles/terminal/117347.html
http://www.freebuf.com/articles/terminal/117347.html
DATA REVELATIONS: Nominum Data Science Security Report
http://www.nominum.com/wp-content/uploads/2016/10/nominum-security-report.pdf
http://www.nominum.com/wp-content/uploads/2016/10/nominum-security-report.pdf
Google SpreadSheet的CSRF漏洞和JSON劫持漏洞导致数据窃取
http://www.mottoin.com/91113.html
http://www.mottoin.com/91113.html
模拟众测漏洞 write-up
http://d0n9.me/2016/10/23/%E6%A8%A1%E6%8B%9F%E4%BC%97%E6%B5%8B%E6%BC%8F%E6%B4%9E-write-up/
http://d0n9.me/2016/10/23/%E6%A8%A1%E6%8B%9F%E4%BC%97%E6%B5%8B%E6%BC%8F%E6%B4%9E-write-up/
Nishang:PowerShell渗透测试工具
http://www.mottoin.com/91098.html
http://www.mottoin.com/91098.html
TuShare -免费、开源的Python财经数据接口包
http://tushare.org/index.html
http://tushare.org/index.html
使用DNS 预读取绕过Content Security Policy(CSP)
http://www.mottoin.com/91044.html
http://www.mottoin.com/91044.html
selenium webdriver 从入门到提高
https://www.gitbook.com/book/easonhan007/selenium-webdriver/details
https://www.gitbook.com/book/easonhan007/selenium-webdriver/details
Android ChatSecure 即时通信应用的取证分析
https://arxiv.org/pdf/1610.06721v1.pdf
https://arxiv.org/pdf/1610.06721v1.pdf
路由器相关BlackHat议题
https://www.evernote.com/shard/s625/sh/f9e17f58-9902-4e3e-ae48-69f213b4d47a/12f7b4e4cb691536
https://www.evernote.com/shard/s625/sh/f9e17f58-9902-4e3e-ae48-69f213b4d47a/12f7b4e4cb691536
IOT后门程序Marai样本技术分析
http://blog.topsec.com.cn/ad_lab/iot%e5%90%8e%e9%97%a8%e7%a8%8b%e5%ba%8fmarai%e6%a0%b7%e6%9c%ac%e6%8a%80%e6%9c%af%e5%88%86%e6%9e%90/
http://blog.topsec.com.cn/ad_lab/iot%e5%90%8e%e9%97%a8%e7%a8%8b%e5%ba%8fmarai%e6%a0%b7%e6%9c%ac%e6%8a%80%e6%9c%af%e5%88%86%e6%9e%90/
Breaking Down the Surkov Leaks
https://medium.com/dfrlab/breaking-down-the-surkov-leaks-b2feec1423cb#.k6ip7u3ib
https://medium.com/dfrlab/breaking-down-the-surkov-leaks-b2feec1423cb#.k6ip7u3ib
SecWiki周刊(第138期)
https://www.sec-wiki.com/weekly/138
https://www.sec-wiki.com/weekly/138
2016 Google Summer of Code Projects
https://summerofcode.withgoogle.com/projects/?sp-page=2#!
https://summerofcode.withgoogle.com/projects/?sp-page=2#!
【漏洞预警】Joomla未授权创建账号/权限提升漏洞
http://www.mottoin.com/91059.html
http://www.mottoin.com/91059.html
年薪12万加税谣言——一次网络“蝴蝶效应”
http://weibo.com/ttarticle/p/show?id=2309404034796719336517
http://weibo.com/ttarticle/p/show?id=2309404034796719336517
mimikatz新版发布:支持Windows 10 AU & Server 2016
http://www.mottoin.com/90997.html
http://www.mottoin.com/90997.html
Detect TCP content injection attacks with findject
http://www.netresec.com/?page=Blog&month=2016-10&post=Detect-TCP-content-injection-attacks-with-findject
http://www.netresec.com/?page=Blog&month=2016-10&post=Detect-TCP-content-injection-attacks-with-findject
lonely-shell:使用Go实现的反向Shell
http://www.mottoin.com/90883.html
http://www.mottoin.com/90883.html
Full(er) House: Exposing high-end poker cheating devices
https://www.elie.net/blog/security/fuller-house-exposing-high-end-poker-cheating-devices
https://www.elie.net/blog/security/fuller-house-exposing-high-end-poker-cheating-devices
backdoor-apk: adding a backdoor to any Android APK file
https://github.com/dana-at-cp/backdoor-apk
https://github.com/dana-at-cp/backdoor-apk
分类之性能评估指标
https://www.52ml.net/20440.html
https://www.52ml.net/20440.html
Drammer漏洞源码分析
http://seclab.dbappsecurity.com.cn/?p=1491
http://seclab.dbappsecurity.com.cn/?p=1491
-----微信ID:SecWiki-----
SecWiki,13年来一直专注安全技术资讯分析!
SecWiki:https://www.sec-wiki.com
本期原文地址: SecWiki周刊(第139期)
