SecWiki周刊(第144期)
2016/11/28-2016/12/04
安全资讯
Mirai现新的利用方式,开始扫描7547端口【需翻墙】
http://pastebin.com/eZrrLGzv
http://pastebin.com/eZrrLGzv
超过100万谷歌帐户被Gooligan恶意软件盗取
http://www.mottoin.com/92954.html
http://www.mottoin.com/92954.html
FIREEYE RESPONDS TO WAVE OF DESTRUCTIVE CYBER ATTACKS IN GULF REGION
https://www.fireeye.com/blog/threat-research/2016/11/fireeye_respondsto.html
https://www.fireeye.com/blog/threat-research/2016/11/fireeye_respondsto.html
网络空间安全蓝皮书:中国网络空间安全发展报告(2016)
http://mp.weixin.qq.com/s?__biz=MzA3OTA3NDkyNw==&mid=2653171023&idx=1&sn=d5721c33b9d6a4114c3dd0c033c33df7&chksm=84698e4fb31e0759ef220b21011a7c8d394fc63309bde44731bce4ef6230ec8a736a3a8e8f20&mpshare=1&scene=24&srcid=1130CIeqhSbOAk1q30hvuOqv#rd
http://mp.weixin.qq.com/s?__biz=MzA3OTA3NDkyNw==&mid=2653171023&idx=1&sn=d5721c33b9d6a4114c3dd0c033c33df7&chksm=84698e4fb31e0759ef220b21011a7c8d394fc63309bde44731bce4ef6230ec8a736a3a8e8f20&mpshare=1&scene=24&srcid=1130CIeqhSbOAk1q30hvuOqv#rd
以色列凭什么成为全球监控技术的中心?
http://www.freebuf.com/special/120592.html
http://www.freebuf.com/special/120592.html
2017年安全行业八大预测
http://www.aqniu.com/news-views/21474.html
http://www.aqniu.com/news-views/21474.html
中央网信办等下文:支持高校开设网络安全“特长班”
http://www.toutiao.com/i6304849503455281665/
http://www.toutiao.com/i6304849503455281665/
Firefox 0day被用于攻击Tor用户
http://www.solidot.org/story?sid=50554
http://www.solidot.org/story?sid=50554
访谈|通付盾CEO汪德嘉
http://www.aqniu.com/news-views/21423.html
http://www.aqniu.com/news-views/21423.html
黑客小说:杀手 (第十一章 新的阶段)
http://www.jianshu.com/p/a65e09fc5057
http://www.jianshu.com/p/a65e09fc5057
安全技术
玩转CSRF之挖洞实例分享
http://bbs.ichunqiu.com/thread-16169-1-1.html
http://bbs.ichunqiu.com/thread-16169-1-1.html
Bypassing CSP using polyglot JPEGs
http://blog.portswigger.net/2016/12/bypassing-csp-using-polyglot-jpegs.html
http://blog.portswigger.net/2016/12/bypassing-csp-using-polyglot-jpegs.html
AZScanner:自动漏洞扫描器
https://github.com/az0ne/AZScanner
https://github.com/az0ne/AZScanner
BadKernel----一个笔误引发的漏洞
https://github.com/secmob/BadKernel
https://github.com/secmob/BadKernel
Burp Suite security automation with Selenium and Jenkins
https://www.securify.nl/blog/SFY20160901/burp_suite_security_automation_with_selenium_and_jenkins.html
https://www.securify.nl/blog/SFY20160901/burp_suite_security_automation_with_selenium_and_jenkins.html
ArchSummit 北京 2016 PPT 下载合集
http://ppt.geekbang.org/archsummit?amp;isappinstalled=0&from=timeline&from=timeline&from=timeline&from=timeline
http://ppt.geekbang.org/archsummit?amp;isappinstalled=0&from=timeline&from=timeline&from=timeline&from=timeline
内网渗透定位技术总结
http://www.mottoin.com/92978.html
http://www.mottoin.com/92978.html
德国电信断网:mirai僵尸网络的新变种和旧主控
http://blog.netlab.360.com/a-mirai-botnet-evolvement-new-variant-and-old-c2/
http://blog.netlab.360.com/a-mirai-botnet-evolvement-new-variant-and-old-c2/
IE浏览器UAF漏洞CVE-2014-0282的分析与利用
http://www.mottoin.com/92909.html
http://www.mottoin.com/92909.html
hitcon2016 web writeup
http://lorexxar.cn/2016/10/10/hitcon2016/
http://lorexxar.cn/2016/10/10/hitcon2016/
【漏洞预警】Apache Tomcat远程代码执行漏洞(CVE-2016-8735)
http://www.mottoin.com/93100.html
http://www.mottoin.com/93100.html
在Empire中配置使用Tor
http://www.mottoin.com/92761.html
http://www.mottoin.com/92761.html
hduisa/HCTF2016: HCTF 2016 CHALLENGES
https://github.com/hduisa/HCTF2016
https://github.com/hduisa/HCTF2016
Fofa:三分钟完成全网漏洞报告
https://v.qq.com/x/page/q03509j9ak1.html
https://v.qq.com/x/page/q03509j9ak1.html
英国情报机GCHQ发布一款开源数据分析工具:CyberChef
http://www.mottoin.com/92941.html
http://www.mottoin.com/92941.html
企业常见服务漏洞检测&修复整理
http://www.mottoin.com/92742.html
http://www.mottoin.com/92742.html
Analysis of multiple vulnerabilities in AirDroid
https://blog.zimperium.com/analysis-of-multiple-vulnerabilities-in-airdroid/
https://blog.zimperium.com/analysis-of-multiple-vulnerabilities-in-airdroid/
Layer子域名挖掘机4.2纪念版
http://www.cnseay.com/4482/
http://www.cnseay.com/4482/
一个目录穿越引发的注入及后续——XG SDK漏洞回顾与思考
http://www.ms509.com/?p=474
http://www.ms509.com/?p=474
BitUnmap: Attacking Android Ashmem
https://googleprojectzero.blogspot.com/2016/12/bitunmap-attacking-android-ashmem.html
https://googleprojectzero.blogspot.com/2016/12/bitunmap-attacking-android-ashmem.html
Quick TR069 Botnet Writeup + Triage.
https://morris.guru/quick-tr069-botnet-writeup-triage/
https://morris.guru/quick-tr069-botnet-writeup-triage/
SharpMeter:Meterpreter反弹shell生成工具(绕过白名单限制)
http://www.mottoin.com/93059.html
http://www.mottoin.com/93059.html
2016 HCTF Crypto 出题总结
http://0x48.pw/2016/11/28/0x28/
http://0x48.pw/2016/11/28/0x28/
Mozilla SSL Configuration Generator HTTPS配置文件生成工具
https://mozilla.github.io/server-side-tls/ssl-config-generator/
https://mozilla.github.io/server-side-tls/ssl-config-generator/
最便捷的免费 SSL 证书解决方案
http://www.jianshu.com/p/4d1a795837d0?hmsr=toutiao.io&utm_medium=toutiao.io&utm_source=toutiao.io
http://www.jianshu.com/p/4d1a795837d0?hmsr=toutiao.io&utm_medium=toutiao.io&utm_source=toutiao.io
Google: Announcing OSS-Fuzz: Continuous Fuzzing for Open Source Software
https://security.googleblog.com/2016/12/announcing-oss-fuzz-continuous-fuzzing.html
https://security.googleblog.com/2016/12/announcing-oss-fuzz-continuous-fuzzing.html
专栏 | 中文分词工具测评
http://www.jiqizhixin.com/article/1916
http://www.jiqizhixin.com/article/1916
Anti-Anti-Spider: 反爬虫的技术攻关
https://github.com/luyishisi/Anti-Anti-Spider
https://github.com/luyishisi/Anti-Anti-Spider
Bypassing SAML 2.0 SSO with XML Signature Attacks
http://research.aurainfosec.io/bypassing-saml20-SSO/
http://research.aurainfosec.io/bypassing-saml20-SSO/
Android木马分析流程及实战
http://www.mottoin.com/93078.html
http://www.mottoin.com/93078.html
Three roads lead to Rome
http://blogs.360.cn/360safe/2016/11/29/three-roads-lead-to-rome/
http://blogs.360.cn/360safe/2016/11/29/three-roads-lead-to-rome/
Code Execution and Privilege Escalation – Databases
http://resources.infosecinstitute.com/code-execution-and-privilege-escalation-databases/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+infosecResources+%28InfoSec+Resources%29
http://resources.infosecinstitute.com/code-execution-and-privilege-escalation-databases/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+infosecResources+%28InfoSec+Resources%29
Google XSS Game Writeup
https://b1ngz.github.io/google-xss-game-writeup/
https://b1ngz.github.io/google-xss-game-writeup/
How WeChat uses one censorship policy in China and another internationally
https://citizenlab.org/2016/11/wechat-china-censorship-one-app-two-systems/
https://citizenlab.org/2016/11/wechat-china-censorship-one-app-two-systems/
单点登录原理与简单实现
http://www.cnblogs.com/ywlaker/p/6113927.htm
http://www.cnblogs.com/ywlaker/p/6113927.htm
Firefox 0day in the wild is being used to attack Tor users
http://arstechnica.com/security/2016/11/firefox-0day-used-against-tor-users-almost-identical-to-one-fbi-used-in-2013/
http://arstechnica.com/security/2016/11/firefox-0day-used-against-tor-users-almost-identical-to-one-fbi-used-in-2013/
JSON-handle DomXSS Vulnerability (Ver 1.4.11) 漏洞分析
http://linux.im/2016/11/29/firefox-addon-JSON-handle-DomXSS.html
http://linux.im/2016/11/29/firefox-addon-JSON-handle-DomXSS.html
One Bit To Rule A System: Analyzing CVE-2016-7255 Exploit In The Wild
http://blog.trendmicro.com/trendlabs-security-intelligence/one-bit-rule-system-analyzing-cve-2016-7255-exploit-wild/
http://blog.trendmicro.com/trendlabs-security-intelligence/one-bit-rule-system-analyzing-cve-2016-7255-exploit-wild/
WIFI安全之包结构解析
http://sccsec.com/2016/11/23/WIFI%E5%AE%89%E5%85%A8%E4%B9%8B%E5%8C%85%E7%BB%93%E6%9E%84%E8%A7%A3%E6%9E%90/
http://sccsec.com/2016/11/23/WIFI%E5%AE%89%E5%85%A8%E4%B9%8B%E5%8C%85%E7%BB%93%E6%9E%84%E8%A7%A3%E6%9E%90/
XSExtractor: 提取新闻、博客等长文本网页的正文工具
https://github.com/qingyu1229/XSExtractor
https://github.com/qingyu1229/XSExtractor
黑产揭秘:“打码平台”那点事儿
https://jaq.alibaba.com/community/art/show?articleid=628
https://jaq.alibaba.com/community/art/show?articleid=628
渗透Oracle 11g(续)
https://www.t00ls.net/articles-23609.html
https://www.t00ls.net/articles-23609.html
HOW I BYPASSED APPLE'S MOST SECURE ICLOUD ACTIVATION LOCK
http://www.hemanthjoseph.com/2016/11/how-i-bypassed-apples-most-secure-find.html?m=1
http://www.hemanthjoseph.com/2016/11/how-i-bypassed-apples-most-secure-find.html?m=1
DPAT:渗透测试者的域密码审计工具
https://github.com/clr2of8/DPAT
https://github.com/clr2of8/DPAT
More Than 1 Million Google Accounts Breached by Gooligan
http://blog.checkpoint.com/2016/11/30/1-million-google-accounts-breached-gooligan/?from=timeline
http://blog.checkpoint.com/2016/11/30/1-million-google-accounts-breached-gooligan/?from=timeline
I wrote a password cracking manual
http://www.netmux.com/blog/hash-crack
http://www.netmux.com/blog/hash-crack
cosa-nostra: 基于家族和图表显示的恶意程序分析工具
https://github.com/joxeankoret/cosa-nostra
https://github.com/joxeankoret/cosa-nostra
DNS-Shell: DNS-Shell is an interactive Shell over DNS channel
https://github.com/sensepost/DNS-Shell
https://github.com/sensepost/DNS-Shell
FreePBX 13: From Cross-Site Scripting to Remote Command Execution
https://blog.ripstech.com/2016/freepbx-from-cross-site-scripting-to-remote-command-execution/
https://blog.ripstech.com/2016/freepbx-from-cross-site-scripting-to-remote-command-execution/
重新来看变量注入,利用命令执行/提升权限,绕过UAC
https://breakingmalware.com/vulnerabilities/command-injection-and-elevation-environment-variables-revisited/
https://breakingmalware.com/vulnerabilities/command-injection-and-elevation-environment-variables-revisited/
SecWiki周刊(第143期)
https://www.sec-wiki.com/weekly/143
https://www.sec-wiki.com/weekly/143
-----微信ID:SecWiki-----
SecWiki,13年来一直专注安全技术资讯分析!
SecWiki:https://www.sec-wiki.com
本期原文地址: SecWiki周刊(第144期)
