SecWiki周刊(第153期)
2017/01/30-2017/02/05
安全资讯
世界上最大的黑客&网络安全导航网站
http://link-base.org/
http://link-base.org/
Chrome中“自动填充”安全性研究
http://mp.weixin.qq.com/s/ybeVF8caasBJ7xyzLyajbw
http://mp.weixin.qq.com/s/ybeVF8caasBJ7xyzLyajbw
Zimperium Announces Its Exploit Acquisition Program for N-Days
https://blog.zimperium.com/zimperium-announces-its-exploit-acquisition-program-for-n-days/
https://blog.zimperium.com/zimperium-announces-its-exploit-acquisition-program-for-n-days/
Gitlab从删库到恢复:丢失6小时生产数据,操作员应该被开除?
https://mp.weixin.qq.com/s?__biz=MzA4Nzg5Nzc5OA==&mid=2651663996&idx=1&sn=7c1eb9a34993ea50a943c73caa8bf4cb&chksm=8bcbedd5bcbc64c34f506c843d56180c65a64d36c1d9f5361d5f0e8445f8ebff57ff94db82da
https://mp.weixin.qq.com/s?__biz=MzA4Nzg5Nzc5OA==&mid=2651663996&idx=1&sn=7c1eb9a34993ea50a943c73caa8bf4cb&chksm=8bcbedd5bcbc64c34f506c843d56180c65a64d36c1d9f5361d5f0e8445f8ebff57ff94db82da
法庭文件揭秘:美国联邦调查局是如何监听汽车15年的
https://mp.weixin.qq.com/s?__biz=MjM5NjA0NjgyMA==&mid=2651062785&idx=1&sn=e3a037b1ce21925145fb07eff6597e55&chksm=bd1f908a8a68199c0a1c4df8fb431dc26cff629abca0d76ea92f0ca19b842b2ab539bdcd4e1c
https://mp.weixin.qq.com/s?__biz=MjM5NjA0NjgyMA==&mid=2651062785&idx=1&sn=e3a037b1ce21925145fb07eff6597e55&chksm=bd1f908a8a68199c0a1c4df8fb431dc26cff629abca0d76ea92f0ca19b842b2ab539bdcd4e1c
美国陆军战争学院-网络空间战略行动指南
https://info.publicintelligence.net/USArmy-StrategicCO.pdf
https://info.publicintelligence.net/USArmy-StrategicCO.pdf
推荐安全且匿名的邮箱 ProtonMail
http://mp.weixin.qq.com/s/DTgMZPGKL7BpUQ2l0L3CHg
http://mp.weixin.qq.com/s/DTgMZPGKL7BpUQ2l0L3CHg
The Growing Symbiosis of Insiders and the Dark Web
http://secure.redowl.com/rs/145-MYR-237/images/RedOwl_Intsights_Report.pdf
http://secure.redowl.com/rs/145-MYR-237/images/RedOwl_Intsights_Report.pdf
《网络产品和服务安全审查办法(征求意见稿)》公开征求意见
http://www.cac.gov.cn/2017-02/04/c_1120407082.htm?from=timeline&isappinstalled=0
http://www.cac.gov.cn/2017-02/04/c_1120407082.htm?from=timeline&isappinstalled=0
美国国防部DARPA想要创建安全数据共享技术
http://www.freebuf.com/news/125672.html
http://www.freebuf.com/news/125672.html
安全技术
Spring Boot RCE
https://deadpool.sh/2017/RCE-Springs/
https://deadpool.sh/2017/RCE-Springs/
余弦: 一种新型蠕虫-花瓣CORSBOT蠕虫
http://evilcos.me/?p=590
http://evilcos.me/?p=590
CVE-2017-5521: Bypassing Authentication on NETGEAR Routers
https://www.trustwave.com/Resources/SpiderLabs-Blog/CVE-2017-5521--Bypassing-Authentication-on-NETGEAR-Routers/
https://www.trustwave.com/Resources/SpiderLabs-Blog/CVE-2017-5521--Bypassing-Authentication-on-NETGEAR-Routers/
From Mimikatz to Kekeo, Passing by New Microsoft Security Technologies
https://onedrive.live.com/view.aspx?resid=A352EBC5934F0254!3316&ithint=file%2cpptx&app=PowerPoint
https://onedrive.live.com/view.aspx?resid=A352EBC5934F0254!3316&ithint=file%2cpptx&app=PowerPoint
OWASP Security Shepherd WEB和APP安全测试训练平台
https://github.com/OWASP/SecurityShepherd
https://github.com/OWASP/SecurityShepherd
携程是如何把大数据用于实时风控的
https://zhuanlan.zhihu.com/p/24795411
https://zhuanlan.zhihu.com/p/24795411
如何利用 LTE/4G 伪基站+GSM 中间人攻击攻破所有短信验证
https://zhuanlan.zhihu.com/p/24811129
https://zhuanlan.zhihu.com/p/24811129
.DS_Store文件泄漏利用脚本
https://github.com/lijiejie/ds_store_exp
https://github.com/lijiejie/ds_store_exp
针对埃及公民的大规模网络钓鱼活动
https://citizenlab.org/2017/02/nilephish-report/
https://citizenlab.org/2017/02/nilephish-report/
企业应该如何应对上报的安全漏洞报告
http://www.freebuf.com/articles/security-management/125606.html
http://www.freebuf.com/articles/security-management/125606.html
打印机漏洞利用框架
https://github.com/RUB-NDS/PRET
https://github.com/RUB-NDS/PRET
Improving Credential Abuse Threat Mitigation
https://blogs.akamai.com/2017/01/improving-credential-abuse-threat-mitigation.html?from=timeline
https://blogs.akamai.com/2017/01/improving-credential-abuse-threat-mitigation.html?from=timeline
2016年CNVD漏洞数据统计:高危漏洞占比持续递增
http://www.freebuf.com/vuls/125951.html
http://www.freebuf.com/vuls/125951.html
SecWiki周刊(第152期)
https://www.sec-wiki.com/weekly/152
https://www.sec-wiki.com/weekly/152
StreamAlert: 实时数据分析和告警1
https://medium.com/airbnb-engineering/streamalert-real-time-data-analysis-and-alerting-e8619e3e5043#.ya7h0gb2n
https://medium.com/airbnb-engineering/streamalert-real-time-data-analysis-and-alerting-e8619e3e5043#.ya7h0gb2n
BigDataAudit: security vulns detector for Hadoop and Spark 大数据安全检测工具
https://github.com/kotobukki/BigDataAudit
https://github.com/kotobukki/BigDataAudit
lightweight multi-architecture CPU emulator framework
https://alexaltea.github.io/unicorn.js/
https://alexaltea.github.io/unicorn.js/
美团点评Docker容器管理平台
http://tech.meituan.com/mt-docker-practice.html
http://tech.meituan.com/mt-docker-practice.html
Finding the RAT's Nest
https://blog.opendns.com/2017/01/18/finding-the-rats-nest/
https://blog.opendns.com/2017/01/18/finding-the-rats-nest/
美国的个人信息搜索引擎(基于公开合法数据)
http://radaris.com/
http://radaris.com/
DLP数据泄露防护系统测试样本
https://dlptest.com/sample-data/
https://dlptest.com/sample-data/
basicRAT - A Python Remote Access Trojanki
https://github.com/vesche/basicRAT
https://github.com/vesche/basicRAT
Deep Analysis of Android Rootnik Malware Part I
https://blog.fortinet.com/2017/01/26/deep-analysis-of-android-rootnik-malware-using-advanced-anti-debug-and-anti-hook-part-i-debugging-in-the-scope-of-native-layer
https://blog.fortinet.com/2017/01/26/deep-analysis-of-android-rootnik-malware-using-advanced-anti-debug-and-anti-hook-part-i-debugging-in-the-scope-of-native-layer
Cypher – Pythonic ransomware proof of concept
https://github.com/NullArray/Cypher
https://github.com/NullArray/Cypher
'Deep Thoughts' on Subdomain Takeover Vulnerabilities
http://blog.rubidus.com/2017/02/03/deep-thoughts-on-subdomain-takeovers/
http://blog.rubidus.com/2017/02/03/deep-thoughts-on-subdomain-takeovers/
KopiLuwak: A New JavaScript Payload from Turla
https://securelist.com/blog/research/77429/kopiluwak-a-new-javascript-payload-from-turla/
https://securelist.com/blog/research/77429/kopiluwak-a-new-javascript-payload-from-turla/
Collections of Malware source code 已泄露的恶意程序源码集合
https://github.com/gasgas4/Leaked_Malware_SourceCode
https://github.com/gasgas4/Leaked_Malware_SourceCode
Advanced Techniques for Detecting RAT Screen Control
http://blog.mindedsecurity.com/2016/02/rat-wars-20-advanced-techniques-for.html
http://blog.mindedsecurity.com/2016/02/rat-wars-20-advanced-techniques-for.html
从CVE-2016-7644回到CVE-2016-4669
http://turingh.github.io/2017/01/15/CVE-2016-7644-%E4%B8%89%E8%B0%88Mach-IPC/
http://turingh.github.io/2017/01/15/CVE-2016-7644-%E4%B8%89%E8%B0%88Mach-IPC/
APT Targets Russia and Belarus with ZeroT and PlugX
https://www.proofpoint.com/us/threat-insight/post/APT-targets-russia-belarus-zerot-plugx
https://www.proofpoint.com/us/threat-insight/post/APT-targets-russia-belarus-zerot-plugx
认知计算、区块链IoT、物联网安全…看懂的人将控制未来
https://mp.weixin.qq.com/s?__biz=MjM5MTM5ODQyMA==&mid=2651195423&idx=1&sn=59a0b358b16e402ffe62372c7ac539c8&chksm=bd4487648a330e72de3140294bed1a3dc2d3a84474701cbed2e2d3d47ad6827e8901a3708334e
https://mp.weixin.qq.com/s?__biz=MjM5MTM5ODQyMA==&mid=2651195423&idx=1&sn=59a0b358b16e402ffe62372c7ac539c8&chksm=bd4487648a330e72de3140294bed1a3dc2d3a84474701cbed2e2d3d47ad6827e8901a3708334e
浅谈区块链(上):区块链探究
http://www.arkteam.net/?p=1524
http://www.arkteam.net/?p=1524
XPath注入详解
http://www.mottoin.com/95785.html
http://www.mottoin.com/95785.html
AI技术大爆发背景下,开源深度学习框架的发展趋势如何?
https://mp.weixin.qq.com/s?__biz=MjM5MDE0Mjc4MA==&mid=2650995340&idx=1&sn=e4340848bd36288964b366092e1b6c80&chksm=bdbf02df8ac88bc9660fbe99ab80c2dd30774f6eb9aa90cad81e206a5f84c406798db1a7ee26
https://mp.weixin.qq.com/s?__biz=MjM5MDE0Mjc4MA==&mid=2650995340&idx=1&sn=e4340848bd36288964b366092e1b6c80&chksm=bdbf02df8ac88bc9660fbe99ab80c2dd30774f6eb9aa90cad81e206a5f84c406798db1a7ee26
实用工具:免费Zend 5.2 5.3 5.4解密工具
http://www.cnseay.com/4498/
http://www.cnseay.com/4498/
-----微信ID:SecWiki-----
SecWiki,13年来一直专注安全技术资讯分析!
SecWiki:https://www.sec-wiki.com
本期原文地址: SecWiki周刊(第153期)
